Message ID | 1515408521-31480-2-git-send-email-stefan@herbrechtsmeier.net |
---|---|
State | Changes Requested |
Headers | show |
Series | [1/3] progress_ipc: Add non-blocking receive support | expand |
Hi Stefan, On 08/01/2018 11:48, stefan@herbrechtsmeier.net wrote: > From: Stefan Herbrechtsmeier <stefan.herbrechtsmeier@weidmueller.com> > > Signed-off-by: Stefan Herbrechtsmeier <stefan.herbrechtsmeier@weidmueller.com> I cannot follow the patch because, as expected, the difference with old mongoose version are heavy. I agree to maintain the changes in a single patch to avoid breakages. Anyway, add some information to the commit message, that which version of mongoose you have taken, better with commit-id. I guess it is better (for now) that MONGOOSE_API_DEPRECATED is set as default. This should maintain compatibility with the past, as most users have their own version of website / defconfig. If it is not set, I am expecting a flow of compliants here :-). Is "-document_root .." still working ? I get running with "-r ./www2", but document_root is not recognized. Is it was intentional ? Best regards, Stefano Babic > --- > Makefile.flags | 9 +- > README.md | 4 +- > mongoose/Config.in | 14 +- > mongoose/Makefile | 4 + > mongoose/mongoose.c | 20092 +++++++++++++++++++++++++++++++--------- > mongoose/mongoose.h | 6444 ++++++++++++- > mongoose/mongoose_interface.c | 784 +- > 7 files changed, 22080 insertions(+), 5271 deletions(-) > > diff --git a/Makefile.flags b/Makefile.flags > index 041a08e..6c91a3b 100644 > --- a/Makefile.flags > +++ b/Makefile.flags > @@ -145,16 +145,11 @@ endif > # mongoose / webserver > ifneq ($(CONFIG_WEBSERVER),) > ifneq ($(CONFIG_MONGOOSESSL),) > -KBUILD_CFLAGS += -DNO_SSL_DL > +KBUILD_CFLAGS += -DMG_ENABLE_SSL > LDLIBS += crypto ssl > -else > -KBUILD_CFLAGS += -DNO_SSL > -endif > -ifneq ($(CONFIG_MONGOOSELUA),) > -KBUILD_CFLAGS += -DUSE_LUA > endif > ifneq ($(CONFIG_MONGOOSEIPV6),) > -KBUILD_CFLAGS += -DUSE_IPV6 > +KBUILD_CFLAGS += -DMG_ENABLE_IPV6 > endif > endif > > diff --git a/README.md b/README.md > index 53dc4d9..1c1b2e0 100644 > --- a/README.md > +++ b/README.md > @@ -41,7 +41,9 @@ Here a short list of the main features: > - Power-Off safe > - Hardware / Software compatibility. > > -This software is licensed under GPL Version 2.0+ > +Different components of this software are under different licenses (a mix > +of MIT, GPLv2 and GPLv2+). License information for any file is either explicitly stated > +or defaults to GPL version 2.0+. > > Please check inside doc directory for documentation or > the online documentation (generated from doc/) at: > diff --git a/mongoose/Config.in b/mongoose/Config.in > index 27c98f3..133467c 100644 > --- a/mongoose/Config.in > +++ b/mongoose/Config.in > @@ -17,13 +17,6 @@ config MONGOOSE > menu "Mongoose Feature" > depends on MONGOOSE > > -config MONGOOSELUA > - bool "Lua interpreter" > - depends on LUA > - default y > - help > - It allows to use Lua scripts as CGI interpreter. > - > config MONGOOSEIPV6 > bool "ipv6" > default y > @@ -40,6 +33,13 @@ config MONGOOSESSL > comment "SSL support needs libcrypto, libssl" > depends on !HAVE_LIBSSL || !HAVE_LIBCRYPTO > > +config MONGOOSE_API_DEPRECATED > + bool "old web api" > + default n > + help > + Enable deprecated web api to support old web pages. > + > + > endmenu > > endmenu > diff --git a/mongoose/Makefile b/mongoose/Makefile > index 7f7fea2..d3fba39 100644 > --- a/mongoose/Makefile > +++ b/mongoose/Makefile > @@ -1,2 +1,6 @@ > +KBUILD_CFLAGS += -DMG_ENABLE_HTTP_WEBSOCKET=1 -DMG_ENABLE_HTTP_STREAMING_MULTIPART=1 > + > lib-$(CONFIG_MONGOOSE) += mongoose.o \ > mongoose_interface.o > + > +CFLAGS_REMOVE_mongoose.o := -Wstrict-prototypes -Wunused-parameter -Wmissing-prototypes -Wmissing-declarations -Wshadow -Wold-style-definition > diff --git a/mongoose/mongoose.c b/mongoose/mongoose.c > index 75bca06..7f2ef6e 100644 > --- a/mongoose/mongoose.c > +++ b/mongoose/mongoose.c > @@ -1,5402 +1,16324 @@ > -// Copyright (c) 2004-2013 Sergey Lyubka > -// > -// Permission is hereby granted, free of charge, to any person obtaining a copy > -// of this software and associated documentation files (the "Software"), to deal > -// in the Software without restriction, including without limitation the rights > -// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell > -// copies of the Software, and to permit persons to whom the Software is > -// furnished to do so, subject to the following conditions: > -// > -// The above copyright notice and this permission notice shall be included in > -// all copies or substantial portions of the Software. > -// > -// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR > -// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, > -// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE > -// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER > -// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, > -// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN > -// THE SOFTWARE. > - > -#if defined(_WIN32) > -#define _CRT_SECURE_NO_WARNINGS // Disable deprecation warning in VS2005 > -#else > -#ifdef __linux__ > -#define _XOPEN_SOURCE 600 // For flockfile() on Linux > -#endif > -#define _LARGEFILE_SOURCE // Enable 64-bit file offsets > -#define __STDC_FORMAT_MACROS // <inttypes.h> wants this for C++ > -#define __STDC_LIMIT_MACROS // C++ wants that for INT64_MAX > +#include "mongoose.h" > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/internal.h" > #endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_MONGOOSE_SRC_INTERNAL_H_ > +#define CS_MONGOOSE_SRC_INTERNAL_H_ > > -#if defined (_MSC_VER) > -// conditional expression is constant: introduced by FD_SET(..) > -#pragma warning (disable : 4127) > -// non-constant aggregate initializer: issued due to missing C99 support > -#pragma warning (disable : 4204) > +/* Amalgamated: #include "common/mg_mem.h" */ > + > +#ifndef MBUF_REALLOC > +#define MBUF_REALLOC MG_REALLOC > #endif > > -// Disable WIN32_LEAN_AND_MEAN. > -// This makes windows.h always include winsock2.h > -#ifdef WIN32_LEAN_AND_MEAN > -#undef WIN32_LEAN_AND_MEAN > +#ifndef MBUF_FREE > +#define MBUF_FREE MG_FREE > #endif > > -#if defined(__SYMBIAN32__) > -#define NO_SSL // SSL is not supported > -#define NO_CGI // CGI is not supported > -#define PATH_MAX FILENAME_MAX > -#endif // __SYMBIAN32__ > +#define MG_SET_PTRPTR(_ptr, _v) \ > + do { \ > + if (_ptr) *(_ptr) = _v; \ > + } while (0) > > -#ifndef _WIN32_WCE // Some ANSI #includes are not available on Windows CE > -#include <sys/types.h> > -#include <sys/stat.h> > -#include <errno.h> > -#include <signal.h> > -#include <fcntl.h> > -#endif // !_WIN32_WCE > +#ifndef MG_INTERNAL > +#define MG_INTERNAL static > +#endif > > -#include <time.h> > -#include <stdlib.h> > -#include <stdarg.h> > -#include <assert.h> > -#include <string.h> > -#include <ctype.h> > -#include <limits.h> > -#include <stddef.h> > -#include <stdio.h> > +#ifdef PICOTCP > +#define NO_LIBC > +#define MG_DISABLE_PFS > +#endif > > -#if defined(_WIN32) && !defined(__SYMBIAN32__) // Windows specific > -#undef _WIN32_WINNT > -#define _WIN32_WINNT 0x0400 // To make it link in VS2005 > -#include <windows.h> > +/* Amalgamated: #include "common/cs_dbg.h" */ > +/* Amalgamated: #include "mongoose/src/http.h" */ > +/* Amalgamated: #include "mongoose/src/net.h" */ > + > +#define MG_CTL_MSG_MESSAGE_SIZE 8192 > + > +/* internals that need to be accessible in unit tests */ > +MG_INTERNAL struct mg_connection *mg_do_connect(struct mg_connection *nc, > + int proto, > + union socket_address *sa); > + > +MG_INTERNAL int mg_parse_address(const char *str, union socket_address *sa, > + int *proto, char *host, size_t host_len); > +MG_INTERNAL void mg_call(struct mg_connection *nc, > + mg_event_handler_t ev_handler, void *user_data, int ev, > + void *ev_data); > +void mg_forward(struct mg_connection *from, struct mg_connection *to); > +MG_INTERNAL void mg_add_conn(struct mg_mgr *mgr, struct mg_connection *c); > +MG_INTERNAL void mg_remove_conn(struct mg_connection *c); > +MG_INTERNAL struct mg_connection *mg_create_connection( > + struct mg_mgr *mgr, mg_event_handler_t callback, > + struct mg_add_sock_opts opts); > +#ifdef _WIN32 > +/* Retur value is the same as for MultiByteToWideChar. */ > +int to_wchar(const char *path, wchar_t *wbuf, size_t wbuf_len); > +#endif > > -#ifndef PATH_MAX > -#define PATH_MAX MAX_PATH > -#endif > - > -#ifndef _WIN32_WCE > -#include <process.h> > -#include <direct.h> > -#include <io.h> > -#else // _WIN32_WCE > -#define NO_CGI // WinCE has no pipes > - > -typedef long off_t; > - > -#define errno GetLastError() > -#define strerror(x) _ultoa(x, (char *) _alloca(sizeof(x) *3 ), 10) > -#endif // _WIN32_WCE > - > -#define MAKEUQUAD(lo, hi) ((uint64_t)(((uint32_t)(lo)) | \ > - ((uint64_t)((uint32_t)(hi))) << 32)) > -#define RATE_DIFF 10000000 // 100 nsecs > -#define EPOCH_DIFF MAKEUQUAD(0xd53e8000, 0x019db1de) > -#define SYS2UNIX_TIME(lo, hi) \ > - (time_t) ((MAKEUQUAD((lo), (hi)) - EPOCH_DIFF) / RATE_DIFF) > - > -// Visual Studio 6 does not know __func__ or __FUNCTION__ > -// The rest of MS compilers use __FUNCTION__, not C99 __func__ > -// Also use _strtoui64 on modern M$ compilers > -#if defined(_MSC_VER) && _MSC_VER < 1300 > -#define STRX(x) #x > -#define STR(x) STRX(x) > -#define __func__ __FILE__ ":" STR(__LINE__) > -#define strtoull(x, y, z) strtoul(x, y, z) > -#define strtoll(x, y, z) strtol(x, y, z) > -#else > -#define __func__ __FUNCTION__ > -#define strtoull(x, y, z) _strtoui64(x, y, z) > -#define strtoll(x, y, z) _strtoi64(x, y, z) > -#endif // _MSC_VER > - > -#define ERRNO GetLastError() > -#define NO_SOCKLEN_T > -#define SSL_LIB "ssleay32.dll" > -#define CRYPTO_LIB "libeay32.dll" > -#define O_NONBLOCK 0 > -#if !defined(EWOULDBLOCK) > -#define EWOULDBLOCK WSAEWOULDBLOCK > -#endif // !EWOULDBLOCK > -#define _POSIX_ > -#define INT64_FMT "I64d" > - > -#define WINCDECL __cdecl > -#define SHUT_WR 1 > -#define snprintf _snprintf > -#define vsnprintf _vsnprintf > -#define mg_sleep(x) Sleep(x) > - > -#define pipe(x) _pipe(x, MG_BUF_LEN, _O_BINARY) > -#ifndef popen > -#define popen(x, y) _popen(x, y) > -#endif > -#ifndef pclose > -#define pclose(x) _pclose(x) > -#endif > -#define close(x) _close(x) > -#define dlsym(x,y) GetProcAddress((HINSTANCE) (x), (y)) > -#define RTLD_LAZY 0 > -#define fseeko(x, y, z) _lseeki64(_fileno(x), (y), (z)) > -#define fdopen(x, y) _fdopen((x), (y)) > -#define write(x, y, z) _write((x), (y), (unsigned) z) > -#define read(x, y, z) _read((x), (y), (unsigned) z) > -#define flockfile(x) EnterCriticalSection(&global_log_file_lock) > -#define funlockfile(x) LeaveCriticalSection(&global_log_file_lock) > -#define sleep(x) Sleep((x) * 1000) > - > -#if !defined(va_copy) > -#define va_copy(x, y) x = y > -#endif // !va_copy MINGW #defines va_copy > - > -#if !defined(fileno) > -#define fileno(x) _fileno(x) > -#endif // !fileno MINGW #defines fileno > - > -typedef HANDLE pthread_mutex_t; > -typedef struct {HANDLE signal, broadcast;} pthread_cond_t; > -typedef DWORD pthread_t; > -#define pid_t HANDLE // MINGW typedefs pid_t to int. Using #define here. > - > -static int pthread_mutex_lock(pthread_mutex_t *); > -static int pthread_mutex_unlock(pthread_mutex_t *); > -static void to_unicode(const char *path, wchar_t *wbuf, size_t wbuf_len); > -struct file; > -static char *mg_fgets(char *buf, size_t size, struct file *filep, char **p); > - > -#if defined(HAVE_STDINT) > -#include <stdint.h> > -#else > -typedef unsigned int uint32_t; > -typedef unsigned short uint16_t; > -typedef unsigned __int64 uint64_t; > -typedef __int64 int64_t; > -#define INT64_MAX 9223372036854775807 > -#endif // HAVE_STDINT > - > -// POSIX dirent interface > -struct dirent { > - char d_name[PATH_MAX]; > +struct ctl_msg { > + mg_event_handler_t callback; > + char message[MG_CTL_MSG_MESSAGE_SIZE]; > }; > > -typedef struct DIR { > - HANDLE handle; > - WIN32_FIND_DATAW info; > - struct dirent result; > -} DIR; > - > -#ifndef HAS_POLL > -struct pollfd { > - int fd; > - short events; > - short revents; > -}; > -#define POLLIN 1 > +#if MG_ENABLE_MQTT > +struct mg_mqtt_message; > +MG_INTERNAL int parse_mqtt(struct mbuf *io, struct mg_mqtt_message *mm); > #endif > > +/* Forward declarations for testing. */ > +extern void *(*test_malloc)(size_t size); > +extern void *(*test_calloc)(size_t count, size_t size); > > -// Mark required libraries > -#ifdef _MSC_VER > -#pragma comment(lib, "Ws2_32.lib") > +#ifndef MIN > +#define MIN(a, b) ((a) < (b) ? (a) : (b)) > #endif > > -#else // UNIX specific > -#include <sys/wait.h> > -#include <sys/socket.h> > -#include <poll.h> > -#include <netinet/in.h> > -#include <arpa/inet.h> > -#include <sys/time.h> > -#include <stdint.h> > -#include <inttypes.h> > -#include <netdb.h> > - > -#include <pwd.h> > -#include <unistd.h> > -#include <dirent.h> > -#if !defined(NO_SSL_DL) && !defined(NO_SSL) > -#include <dlfcn.h> > -#endif > -#include <pthread.h> > -#if defined(__MACH__) > -#define SSL_LIB "libssl.dylib" > -#define CRYPTO_LIB "libcrypto.dylib" > -#else > -#if !defined(SSL_LIB) > -#define SSL_LIB "libssl.so" > +#if MG_ENABLE_HTTP > +struct mg_serve_http_opts; > + > +/* > + * Reassemble the content of the buffer (buf, blen) which should be > + * in the HTTP chunked encoding, by collapsing data chunks to the > + * beginning of the buffer. > + * > + * If chunks get reassembled, modify hm->body to point to the reassembled > + * body and fire MG_EV_HTTP_CHUNK event. If handler sets MG_F_DELETE_CHUNK > + * in nc->flags, delete reassembled body from the mbuf. > + * > + * Return reassembled body size. > + */ > +MG_INTERNAL size_t mg_handle_chunked(struct mg_connection *nc, > + struct http_message *hm, char *buf, > + size_t blen); > + > +#if MG_ENABLE_FILESYSTEM > +MG_INTERNAL int mg_uri_to_local_path(struct http_message *hm, > + const struct mg_serve_http_opts *opts, > + char **local_path, > + struct mg_str *remainder); > +MG_INTERNAL time_t mg_parse_date_string(const char *datetime); > +MG_INTERNAL int mg_is_not_modified(struct http_message *hm, cs_stat_t *st); > +#endif > +#if MG_ENABLE_HTTP_CGI > +MG_INTERNAL void mg_handle_cgi(struct mg_connection *nc, const char *prog, > + const struct mg_str *path_info, > + const struct http_message *hm, > + const struct mg_serve_http_opts *opts); > +struct mg_http_proto_data_cgi; > +MG_INTERNAL void mg_http_free_proto_data_cgi(struct mg_http_proto_data_cgi *d); > #endif > -#if !defined(CRYPTO_LIB) > -#define CRYPTO_LIB "libcrypto.so" > +#if MG_ENABLE_HTTP_SSI > +MG_INTERNAL void mg_handle_ssi_request(struct mg_connection *nc, > + struct http_message *hm, > + const char *path, > + const struct mg_serve_http_opts *opts); > #endif > +#if MG_ENABLE_HTTP_WEBDAV > +MG_INTERNAL int mg_is_dav_request(const struct mg_str *s); > +MG_INTERNAL void mg_handle_propfind(struct mg_connection *nc, const char *path, > + cs_stat_t *stp, struct http_message *hm, > + struct mg_serve_http_opts *opts); > +MG_INTERNAL void mg_handle_lock(struct mg_connection *nc, const char *path); > +MG_INTERNAL void mg_handle_mkcol(struct mg_connection *nc, const char *path, > + struct http_message *hm); > +MG_INTERNAL void mg_handle_move(struct mg_connection *c, > + const struct mg_serve_http_opts *opts, > + const char *path, struct http_message *hm); > +MG_INTERNAL void mg_handle_delete(struct mg_connection *nc, > + const struct mg_serve_http_opts *opts, > + const char *path); > +MG_INTERNAL void mg_handle_put(struct mg_connection *nc, const char *path, > + struct http_message *hm); > #endif > -#ifndef O_BINARY > -#define O_BINARY 0 > -#endif // O_BINARY > -#define closesocket(a) close(a) > -#define mg_mkdir(x, y) mkdir(x, y) > -#define mg_remove(x) remove(x) > -#define mg_sleep(x) usleep((x) * 1000) > -#define ERRNO errno > -#define INVALID_SOCKET (-1) > -#define INT64_FMT PRId64 > -typedef int SOCKET; > -#define WINCDECL > +#if MG_ENABLE_HTTP_WEBSOCKET > +MG_INTERNAL void mg_ws_handler(struct mg_connection *nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data)); > +MG_INTERNAL void mg_ws_handshake(struct mg_connection *nc, > + const struct mg_str *key, > + struct http_message *); > +#endif > +#endif /* MG_ENABLE_HTTP */ > > -#endif // End of Windows and UNIX specific includes > +MG_INTERNAL int mg_get_errno(void); > > -#include "mongoose.h" > -#include "mongoose_interface.h" > +MG_INTERNAL void mg_close_conn(struct mg_connection *conn); > > -#ifdef USE_LUA > -#include <lua.h> > -#include <lauxlib.h> > +#if MG_ENABLE_SNTP > +MG_INTERNAL int mg_sntp_parse_reply(const char *buf, int len, > + struct mg_sntp_message *msg); > #endif > > -#define MONGOOSE_VERSION "3.8" > -#define PASSWORDS_FILE_NAME ".htpasswd" > -#define CGI_ENVIRONMENT_SIZE 4096 > -#define MAX_CGI_ENVIR_VARS 64 > -#define MG_BUF_LEN 8192 > -#define MAX_REQUEST_SIZE 16384 > -#define ARRAY_SIZE(array) (sizeof(array) / sizeof(array[0])) > +#endif /* CS_MONGOOSE_SRC_INTERNAL_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/mg_mem.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > -#ifdef _WIN32 > -static CRITICAL_SECTION global_log_file_lock; > -static pthread_t pthread_self(void) { > - return GetCurrentThreadId(); > -} > -#endif // _WIN32 > +#ifndef CS_COMMON_MG_MEM_H_ > +#define CS_COMMON_MG_MEM_H_ > > -#ifdef DEBUG_TRACE > -#undef DEBUG_TRACE > -#define DEBUG_TRACE(x) > -#else > -#if defined(DEBUG) > -#define DEBUG_TRACE(x) do { \ > - flockfile(stdout); \ > - printf("*** %lu.%p.%s.%d: ", \ > - (unsigned long) time(NULL), (void *) pthread_self(), \ > - __func__, __LINE__); \ > - printf x; \ > - putchar('\n'); \ > - fflush(stdout); \ > - funlockfile(stdout); \ > -} while (0) > -#else > -#define DEBUG_TRACE(x) > -#endif // DEBUG > -#endif // DEBUG_TRACE > +#ifdef __cplusplus > +extern "C" { > +#endif > > -// Darwin prior to 7.0 and Win32 do not have socklen_t > -#ifdef NO_SOCKLEN_T > -typedef int socklen_t; > -#endif // NO_SOCKLEN_T > -#define _DARWIN_UNLIMITED_SELECT > +#ifndef MG_MALLOC > +#define MG_MALLOC malloc > +#endif > > -#if !defined(MSG_NOSIGNAL) > -#define MSG_NOSIGNAL 0 > +#ifndef MG_CALLOC > +#define MG_CALLOC calloc > #endif > > -#if !defined(SOMAXCONN) > -#define SOMAXCONN 100 > +#ifndef MG_REALLOC > +#define MG_REALLOC realloc > #endif > > -#if !defined(PATH_MAX) > -#define PATH_MAX 4096 > +#ifndef MG_FREE > +#define MG_FREE free > #endif > > -static const char *http_500_error = "Internal Server Error"; > +#ifdef __cplusplus > +} > +#endif > > -#if defined(NO_SSL_DL) > -#include <openssl/ssl.h> > -#include <openssl/err.h> > -#else > -// SSL loaded dynamically from DLL. > -// I put the prototypes here to be independent from OpenSSL source installation. > -typedef struct ssl_st SSL; > -typedef struct ssl_method_st SSL_METHOD; > -typedef struct ssl_ctx_st SSL_CTX; > - > -struct ssl_func { > - const char *name; // SSL function name > - void (*ptr)(void); // Function pointer > -}; > +#endif /* CS_COMMON_MG_MEM_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/cs_dbg.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > -#define SSL_free (* (void (*)(SSL *)) ssl_sw[0].ptr) > -#define SSL_accept (* (int (*)(SSL *)) ssl_sw[1].ptr) > -#define SSL_connect (* (int (*)(SSL *)) ssl_sw[2].ptr) > -#define SSL_read (* (int (*)(SSL *, void *, int)) ssl_sw[3].ptr) > -#define SSL_write (* (int (*)(SSL *, const void *,int)) ssl_sw[4].ptr) > -#define SSL_get_error (* (int (*)(SSL *, int)) ssl_sw[5].ptr) > -#define SSL_set_fd (* (int (*)(SSL *, SOCKET)) ssl_sw[6].ptr) > -#define SSL_new (* (SSL * (*)(SSL_CTX *)) ssl_sw[7].ptr) > -#define SSL_CTX_new (* (SSL_CTX * (*)(SSL_METHOD *)) ssl_sw[8].ptr) > -#define SSLv23_server_method (* (SSL_METHOD * (*)(void)) ssl_sw[9].ptr) > -#define SSL_library_init (* (int (*)(void)) ssl_sw[10].ptr) > -#define SSL_CTX_use_PrivateKey_file (* (int (*)(SSL_CTX *, \ > - const char *, int)) ssl_sw[11].ptr) > -#define SSL_CTX_use_certificate_file (* (int (*)(SSL_CTX *, \ > - const char *, int)) ssl_sw[12].ptr) > -#define SSL_CTX_set_default_passwd_cb \ > - (* (void (*)(SSL_CTX *, mg_callback_t)) ssl_sw[13].ptr) > -#define SSL_CTX_free (* (void (*)(SSL_CTX *)) ssl_sw[14].ptr) > -#define SSL_load_error_strings (* (void (*)(void)) ssl_sw[15].ptr) > -#define SSL_CTX_use_certificate_chain_file \ > - (* (int (*)(SSL_CTX *, const char *)) ssl_sw[16].ptr) > -#define SSLv23_client_method (* (SSL_METHOD * (*)(void)) ssl_sw[17].ptr) > -#define SSL_pending (* (int (*)(SSL *)) ssl_sw[18].ptr) > -#define SSL_CTX_set_verify (* (void (*)(SSL_CTX *, int, int)) ssl_sw[19].ptr) > - > -#define CRYPTO_num_locks (* (int (*)(void)) crypto_sw[0].ptr) > -#define CRYPTO_set_locking_callback \ > - (* (void (*)(void (*)(int, int, const char *, int))) crypto_sw[1].ptr) > -#define CRYPTO_set_id_callback \ > - (* (void (*)(unsigned long (*)(void))) crypto_sw[2].ptr) > -#define ERR_get_error (* (unsigned long (*)(void)) crypto_sw[3].ptr) > -#define ERR_error_string (* (char * (*)(unsigned long,char *)) crypto_sw[4].ptr) > - > -// set_ssl_option() function updates this array. > -// It loads SSL library dynamically and changes NULLs to the actual addresses > -// of respective functions. The macros above (like SSL_connect()) are really > -// just calling these functions indirectly via the pointer. > -static struct ssl_func ssl_sw[] = { > - {"SSL_free", NULL}, > - {"SSL_accept", NULL}, > - {"SSL_connect", NULL}, > - {"SSL_read", NULL}, > - {"SSL_write", NULL}, > - {"SSL_get_error", NULL}, > - {"SSL_set_fd", NULL}, > - {"SSL_new", NULL}, > - {"SSL_CTX_new", NULL}, > - {"SSLv23_server_method", NULL}, > - {"SSL_library_init", NULL}, > - {"SSL_CTX_use_PrivateKey_file", NULL}, > - {"SSL_CTX_use_certificate_file",NULL}, > - {"SSL_CTX_set_default_passwd_cb",NULL}, > - {"SSL_CTX_free", NULL}, > - {"SSL_load_error_strings", NULL}, > - {"SSL_CTX_use_certificate_chain_file", NULL}, > - {"SSLv23_client_method", NULL}, > - {"SSL_pending", NULL}, > - {"SSL_CTX_set_verify", NULL}, > - {NULL, NULL} > -}; > +#ifndef CS_COMMON_CS_DBG_H_ > +#define CS_COMMON_CS_DBG_H_ > > -// Similar array as ssl_sw. These functions could be located in different lib. > -#if !defined(NO_SSL) > -static struct ssl_func crypto_sw[] = { > - {"CRYPTO_num_locks", NULL}, > - {"CRYPTO_set_locking_callback", NULL}, > - {"CRYPTO_set_id_callback", NULL}, > - {"ERR_get_error", NULL}, > - {"ERR_error_string", NULL}, > - {NULL, NULL} > -}; > -#endif // NO_SSL > -#endif // NO_SSL_DL > +/* Amalgamated: #include "common/platform.h" */ > > -static const char *month_names[] = { > - "Jan", "Feb", "Mar", "Apr", "May", "Jun", > - "Jul", "Aug", "Sep", "Oct", "Nov", "Dec" > -}; > +#if CS_ENABLE_STDIO > +#include <stdio.h> > +#endif > > -// Unified socket address. For IPv6 support, add IPv6 address structure > -// in the union u. > -union usa { > - struct sockaddr sa; > - struct sockaddr_in sin; > -#if defined(USE_IPV6) > - struct sockaddr_in6 sin6; > +#ifndef CS_ENABLE_DEBUG > +#define CS_ENABLE_DEBUG 0 > #endif > -}; > > -// Describes a string (chunk of memory). > -struct vec { > - const char *ptr; > - size_t len; > -}; > +#ifndef CS_LOG_ENABLE_TS_DIFF > +#define CS_LOG_ENABLE_TS_DIFF 0 > +#endif > > -struct file { > - int is_directory; > - time_t modification_time; > - int64_t size; > - FILE *fp; > - const char *membuf; // Non-NULL if file data is in memory > -}; > -#define STRUCT_FILE_INITIALIZER {0, 0, 0, NULL, NULL} > - > -// Describes listening socket, or socket which was accept()-ed by the master > -// thread and queued for future handling by the worker thread. > -struct socket { > - SOCKET sock; // Listening socket > - union usa lsa; // Local socket address > - union usa rsa; // Remote socket address > - unsigned is_ssl:1; // Is port SSL-ed > - unsigned ssl_redir:1; // Is port supposed to redirect everything to SSL port > -}; > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > > -// NOTE(lsm): this enum shoulds be in sync with the config_options below. > -enum { > - CGI_EXTENSIONS, CGI_ENVIRONMENT, PUT_DELETE_PASSWORDS_FILE, CGI_INTERPRETER, > - PROTECT_URI, AUTHENTICATION_DOMAIN, SSI_EXTENSIONS, THROTTLE, > - ACCESS_LOG_FILE, ENABLE_DIRECTORY_LISTING, ERROR_LOG_FILE, > - GLOBAL_PASSWORDS_FILE, INDEX_FILES, ENABLE_KEEP_ALIVE, ACCESS_CONTROL_LIST, > - EXTRA_MIME_TYPES, LISTENING_PORTS, DOCUMENT_ROOT, SSL_CERTIFICATE, > - NUM_THREADS, RUN_AS_USER, REWRITE, HIDE_FILES, REQUEST_TIMEOUT, > - NUM_OPTIONS > -}; > +enum cs_log_level { > + LL_NONE = -1, > + LL_ERROR = 0, > + LL_WARN = 1, > + LL_INFO = 2, > + LL_DEBUG = 3, > + LL_VERBOSE_DEBUG = 4, > > -static const char *config_options[] = { > - "cgi_pattern", "**.cgi$|**.pl$|**.php$", > - "cgi_environment", NULL, > - "put_delete_auth_file", NULL, > - "cgi_interpreter", NULL, > - "protect_uri", NULL, > - "authentication_domain", "mydomain.com", > - "ssi_pattern", "**.shtml$|**.shtm$", > - "throttle", NULL, > - "access_log_file", NULL, > - "enable_directory_listing", "yes", > - "error_log_file", NULL, > - "global_auth_file", NULL, > - "index_files", > - "index.html,index.htm,index.cgi,index.shtml,index.php,index.lp", > - "enable_keep_alive", "no", > - "access_control_list", NULL, > - "extra_mime_types", NULL, > - "listening_ports", "8080", > - "document_root", ".", > - "ssl_certificate", NULL, > - "num_threads", "50", > - "run_as_user", NULL, > - "url_rewrite_patterns", NULL, > - "hide_files_patterns", NULL, > - "request_timeout_ms", "30000", > - NULL > + _LL_MIN = -2, > + _LL_MAX = 5, > }; > > -void mongoose_print_help(void) > -{ > - int i; > - > - fprintf( > - stdout, > - "\tmongoose arguments:\n"); > - > - for (i = 0; config_options[i] != NULL; i += 2) { > - fprintf(stdout, > - "\t -%s %s %s %s\n", > - config_options[i], > - (config_options[i + 1] != NULL) ? "(default : " : "", > - (config_options[i + 1] != NULL) ? config_options[i + 1] : "", > - (config_options[i + 1] != NULL) ? ")" : "" > - ); > - } > -} > - > -struct mg_context { > - volatile int stop_flag; // Should we stop event loop > - SSL_CTX *ssl_ctx; // SSL context > - char *config[NUM_OPTIONS]; // Mongoose configuration parameters > - struct mg_callbacks callbacks; // User-defined callback function > - void *user_data; // User-defined data > - > - struct socket *listening_sockets; > - int num_listening_sockets; > - > - volatile int num_threads; // Number of threads > - pthread_mutex_t mutex; // Protects (max|num)_threads > - pthread_cond_t cond; // Condvar for tracking workers terminations > - > - struct socket queue[20]; // Accepted sockets > - volatile int sq_head; // Head of the socket queue > - volatile int sq_tail; // Tail of the socket queue > - pthread_cond_t sq_full; // Signaled when socket is produced > - pthread_cond_t sq_empty; // Signaled when socket is consumed > -}; > +/* Set log level. */ > +void cs_log_set_level(enum cs_log_level level); > > -struct mg_connection { > - struct mg_request_info request_info; > - struct mg_context *ctx; > - SSL *ssl; // SSL descriptor > - SSL_CTX *client_ssl_ctx; // SSL context for client connections > - struct socket client; // Connected client > - time_t birth_time; // Time when request was received > - int64_t num_bytes_sent; // Total bytes sent to client > - int64_t content_len; // Content-Length header value > - int64_t consumed_content; // How many bytes of content have been read > - char *buf; // Buffer for received data > - char *path_info; // PATH_INFO part of the URL > - int must_close; // 1 if connection must be closed > - int buf_size; // Buffer size > - int request_len; // Size of the request + headers in a buffer > - int data_len; // Total size of data in a buffer > - int status_code; // HTTP reply status code, e.g. 200 > - int throttle; // Throttling, bytes/sec. <= 0 means no throttle > - time_t last_throttle_time; // Last time throttled data was sent > - int64_t last_throttle_bytes;// Bytes sent this second > -}; > +/* Set log filter. NULL (a default) logs everything. */ > +void cs_log_set_filter(const char *source_file_name); > > -const char **mg_get_valid_option_names(void) { > - return config_options; > -} > +int cs_log_print_prefix(enum cs_log_level level, const char *func, > + const char *filename); > > -static int is_file_in_memory(struct mg_connection *conn, const char *path, > - struct file *filep) { > - size_t size = 0; > - if ((filep->membuf = conn->ctx->callbacks.open_file == NULL ? NULL : > - conn->ctx->callbacks.open_file(conn, path, &size)) != NULL) { > - // NOTE: override filep->size only on success. Otherwise, it might break > - // constructs like if (!mg_stat() || !mg_fopen()) ... > - filep->size = size; > - } > - return filep->membuf != NULL; > -} > +extern enum cs_log_level cs_log_threshold; > > -static int is_file_opened(const struct file *filep) { > - return filep->membuf != NULL || filep->fp != NULL; > -} > +#if CS_ENABLE_STDIO > > -static int mg_fopen(struct mg_connection *conn, const char *path, > - const char *mode, struct file *filep) { > - if (!is_file_in_memory(conn, path, filep)) { > -#ifdef _WIN32 > - wchar_t wbuf[PATH_MAX], wmode[20]; > - to_unicode(path, wbuf, ARRAY_SIZE(wbuf)); > - MultiByteToWideChar(CP_UTF8, 0, mode, -1, wmode, ARRAY_SIZE(wmode)); > - filep->fp = _wfopen(wbuf, wmode); > -#else > - filep->fp = fopen(path, mode); > +void cs_log_set_file(FILE *file); > +void cs_log_printf(const char *fmt, ...) > +#ifdef __GNUC__ > + __attribute__((format(printf, 1, 2))) > #endif > - } > + ; > > - return is_file_opened(filep); > -} > +#define LOG(l, x) \ > + do { \ > + if (cs_log_print_prefix(l, __func__, __FILE__)) cs_log_printf x; \ > + } while (0) > > -static void mg_fclose(struct file *filep) { > - if (filep != NULL && filep->fp != NULL) { > - fclose(filep->fp); > - } > -} > +#ifndef CS_NDEBUG > > -static int get_option_index(const char *name) { > - int i; > +#define DBG(x) LOG(LL_VERBOSE_DEBUG, x) > > - for (i = 0; config_options[i * 2] != NULL; i++) { > - if (strcmp(config_options[i * 2], name) == 0) { > - return i; > - } > - } > - return -1; > -} > +#else /* NDEBUG */ > > -const char *mg_get_option(const struct mg_context *ctx, const char *name) { > - int i; > - if ((i = get_option_index(name)) == -1) { > - return NULL; > - } else if (ctx->config[i] == NULL) { > - return ""; > - } else { > - return ctx->config[i]; > - } > -} > +#define DBG(x) > > -static void sockaddr_to_string(char *buf, size_t len, > - const union usa *usa) { > - buf[0] = '\0'; > -#if defined(USE_IPV6) > - inet_ntop(usa->sa.sa_family, usa->sa.sa_family == AF_INET ? > - (void *) &usa->sin.sin_addr : > - (void *) &usa->sin6.sin6_addr, buf, len); > -#elif defined(_WIN32) > - // Only Windoze Vista (and newer) have inet_ntop() > - strncpy(buf, inet_ntoa(usa->sin.sin_addr), len); > -#else > - inet_ntop(usa->sa.sa_family, (void *) &usa->sin.sin_addr, buf, len); > #endif > -} > - > -static void cry(struct mg_connection *conn, > - PRINTF_FORMAT_STRING(const char *fmt), ...) PRINTF_ARGS(2, 3); > - > -// Print error message to the opened error log stream. > -static void cry(struct mg_connection *conn, const char *fmt, ...) { > - char buf[MG_BUF_LEN], src_addr[20]; > - va_list ap; > - FILE *fp; > - time_t timestamp; > - > - va_start(ap, fmt); > - (void) vsnprintf(buf, sizeof(buf), fmt, ap); > - va_end(ap); > - > - // Do not lock when getting the callback value, here and below. > - // I suppose this is fine, since function cannot disappear in the > - // same way string option can. > - if (conn->ctx->callbacks.log_message == NULL || > - conn->ctx->callbacks.log_message(conn, buf) == 0) { > - fp = conn->ctx == NULL || conn->ctx->config[ERROR_LOG_FILE] == NULL ? NULL : > - fopen(conn->ctx->config[ERROR_LOG_FILE], "a+"); > > - if (fp != NULL) { > - flockfile(fp); > - timestamp = time(NULL); > +#else /* CS_ENABLE_STDIO */ > > - sockaddr_to_string(src_addr, sizeof(src_addr), &conn->client.rsa); > - fprintf(fp, "[%010lu] [error] [client %s] ", (unsigned long) timestamp, > - src_addr); > +#define LOG(l, x) > +#define DBG(x) > > - if (conn->request_info.request_method != NULL) { > - fprintf(fp, "%s %s: ", conn->request_info.request_method, > - conn->request_info.uri); > - } > +#endif > > - fprintf(fp, "%s", buf); > - fputc('\n', fp); > - funlockfile(fp); > - fclose(fp); > - } > - } > +#ifdef __cplusplus > } > +#endif /* __cplusplus */ > > -// Return fake connection structure. Used for logging, if connection > -// is not applicable at the moment of logging. > -static struct mg_connection *fc(struct mg_context *ctx) { > - static struct mg_connection fake_connection; > - fake_connection.ctx = ctx; > - return &fake_connection; > -} > +#endif /* CS_COMMON_CS_DBG_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/cs_dbg.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > -const char *mg_version(void) { > - return MONGOOSE_VERSION; > -} > +/* Amalgamated: #include "common/cs_dbg.h" */ > > -struct mg_request_info *mg_get_request_info(struct mg_connection *conn) { > - return &conn->request_info; > -} > +#include <stdarg.h> > +#include <stdio.h> > +#include <string.h> > > -static void mg_strlcpy(register char *dst, register const char *src, size_t n) { > - for (; *src != '\0' && n > 1; n--) { > - *dst++ = *src++; > - } > - *dst = '\0'; > -} > +/* Amalgamated: #include "common/cs_time.h" */ > +/* Amalgamated: #include "common/str_util.h" */ > > -static int lowercase(const char *s) { > - return tolower(* (const unsigned char *) s); > -} > +enum cs_log_level cs_log_threshold WEAK = > +#if CS_ENABLE_DEBUG > + LL_VERBOSE_DEBUG; > +#else > + LL_ERROR; > +#endif > > -static int mg_strncasecmp(const char *s1, const char *s2, size_t len) { > - int diff = 0; > +static char *s_filter_pattern = NULL; > +static size_t s_filter_pattern_len; > > - if (len > 0) > - do { > - diff = lowercase(s1++) - lowercase(s2++); > - } while (diff == 0 && s1[-1] != '\0' && --len > 0); > +#if CS_ENABLE_STDIO > > - return diff; > -} > +FILE *cs_log_file WEAK = NULL; > > -static int mg_strcasecmp(const char *s1, const char *s2) { > - int diff; > +#if CS_LOG_ENABLE_TS_DIFF > +double cs_log_ts WEAK; > +#endif > > - do { > - diff = lowercase(s1++) - lowercase(s2++); > - } while (diff == 0 && s1[-1] != '\0'); > +enum cs_log_level cs_log_cur_msg_level WEAK = LL_NONE; > > - return diff; > +void cs_log_set_filter(const char *str) WEAK; > +void cs_log_set_filter(const char *str) { > + free(s_filter_pattern); > + if (str != NULL) { > + s_filter_pattern = strdup(str); > + s_filter_pattern_len = strlen(str); > + } else { > + s_filter_pattern = NULL; > + s_filter_pattern_len = 0; > + } > } > > -static char * mg_strndup(const char *ptr, size_t len) { > - char *p; > +int cs_log_print_prefix(enum cs_log_level, const char *, const char *) WEAK; > +int cs_log_print_prefix(enum cs_log_level level, const char *func, > + const char *filename) { > + char prefix[21]; > > - if ((p = (char *) malloc(len + 1)) != NULL) { > - mg_strlcpy(p, ptr, len + 1); > + if (level > cs_log_threshold) return 0; > + if (s_filter_pattern != NULL && > + mg_match_prefix(s_filter_pattern, s_filter_pattern_len, func) < 0 && > + mg_match_prefix(s_filter_pattern, s_filter_pattern_len, filename) < 0) { > + return 0; > } > > - return p; > + strncpy(prefix, func, 20); > + prefix[20] = '\0'; > + if (cs_log_file == NULL) cs_log_file = stderr; > + cs_log_cur_msg_level = level; > + fprintf(cs_log_file, "%-20s ", prefix); > +#if CS_LOG_ENABLE_TS_DIFF > + { > + double now = cs_time(); > + fprintf(cs_log_file, "%7u ", (unsigned int) ((now - cs_log_ts) * 1000000)); > + cs_log_ts = now; > + } > +#endif > + return 1; > } > > -static char * mg_strdup(const char *str) { > - return mg_strndup(str, strlen(str)); > +void cs_log_printf(const char *fmt, ...) WEAK; > +void cs_log_printf(const char *fmt, ...) { > + va_list ap; > + va_start(ap, fmt); > + vfprintf(cs_log_file, fmt, ap); > + va_end(ap); > + fputc('\n', cs_log_file); > + fflush(cs_log_file); > + cs_log_cur_msg_level = LL_NONE; > } > > -const char *mg_strcasestr(const char *big_str, const char *small_str) { > - int i, big_len = strlen(big_str), small_len = strlen(small_str); > +void cs_log_set_file(FILE *file) WEAK; > +void cs_log_set_file(FILE *file) { > + cs_log_file = file; > +} > > - for (i = 0; i <= big_len - small_len; i++) { > - if (mg_strncasecmp(big_str + i, small_str, small_len) == 0) { > - return big_str + i; > - } > - } > +#endif /* CS_ENABLE_STDIO */ > > - return NULL; > +void cs_log_set_level(enum cs_log_level level) WEAK; > +void cs_log_set_level(enum cs_log_level level) { > + cs_log_threshold = level; > +#if CS_LOG_ENABLE_TS_DIFF && CS_ENABLE_STDIO > + cs_log_ts = cs_time(); > +#endif > } > +#ifdef MG_MODULE_LINES > +#line 1 "common/base64.c" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > > -// Like snprintf(), but never returns negative value, or a value > -// that is larger than a supplied buffer. > -// Thanks to Adam Zeldis to pointing snprintf()-caused vulnerability > -// in his audit report. > -static int mg_vsnprintf(struct mg_connection *conn, char *buf, size_t buflen, > - const char *fmt, va_list ap) { > - int n; > +#ifndef EXCLUDE_COMMON > > - if (buflen == 0) > - return 0; > +/* Amalgamated: #include "common/base64.h" */ > > - n = vsnprintf(buf, buflen, fmt, ap); > +#include <string.h> > > - if (n < 0) { > - cry(conn, "vsnprintf error"); > - n = 0; > - } else if (n >= (int) buflen) { > - cry(conn, "truncating vsnprintf buffer: [%.*s]", > - n > 200 ? 200 : n, buf); > - n = (int) buflen - 1; > +/* Amalgamated: #include "common/cs_dbg.h" */ > + > +/* ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/ */ > + > +#define NUM_UPPERCASES ('Z' - 'A' + 1) > +#define NUM_LETTERS (NUM_UPPERCASES * 2) > +#define NUM_DIGITS ('9' - '0' + 1) > + > +/* > + * Emit a base64 code char. > + * > + * Doesn't use memory, thus it's safe to use to safely dump memory in crashdumps > + */ > +static void cs_base64_emit_code(struct cs_base64_ctx *ctx, int v) { > + if (v < NUM_UPPERCASES) { > + ctx->b64_putc(v + 'A', ctx->user_data); > + } else if (v < (NUM_LETTERS)) { > + ctx->b64_putc(v - NUM_UPPERCASES + 'a', ctx->user_data); > + } else if (v < (NUM_LETTERS + NUM_DIGITS)) { > + ctx->b64_putc(v - NUM_LETTERS + '0', ctx->user_data); > + } else { > + ctx->b64_putc(v - NUM_LETTERS - NUM_DIGITS == 0 ? '+' : '/', > + ctx->user_data); > } > - buf[n] = '\0'; > - > - return n; > } > > -static int mg_snprintf(struct mg_connection *conn, char *buf, size_t buflen, > - PRINTF_FORMAT_STRING(const char *fmt), ...) > - PRINTF_ARGS(4, 5); > +static void cs_base64_emit_chunk(struct cs_base64_ctx *ctx) { > + int a, b, c; > > -static int mg_snprintf(struct mg_connection *conn, char *buf, size_t buflen, > - const char *fmt, ...) { > - va_list ap; > - int n; > + a = ctx->chunk[0]; > + b = ctx->chunk[1]; > + c = ctx->chunk[2]; > > - va_start(ap, fmt); > - n = mg_vsnprintf(conn, buf, buflen, fmt, ap); > - va_end(ap); > + cs_base64_emit_code(ctx, a >> 2); > + cs_base64_emit_code(ctx, ((a & 3) << 4) | (b >> 4)); > + if (ctx->chunk_size > 1) { > + cs_base64_emit_code(ctx, (b & 15) << 2 | (c >> 6)); > + } > + if (ctx->chunk_size > 2) { > + cs_base64_emit_code(ctx, c & 63); > + } > +} > > - return n; > +void cs_base64_init(struct cs_base64_ctx *ctx, cs_base64_putc_t b64_putc, > + void *user_data) { > + ctx->chunk_size = 0; > + ctx->b64_putc = b64_putc; > + ctx->user_data = user_data; > } > > -// Skip the characters until one of the delimiters characters found. > -// 0-terminate resulting word. Skip the delimiter and following whitespaces. > -// Advance pointer to buffer to the next word. Return found 0-terminated word. > -// Delimiters can be quoted with quotechar. > -static char *skip_quoted(char **buf, const char *delimiters, > - const char *whitespace, char quotechar) { > - char *p, *begin_word, *end_word, *end_whitespace; > - > - begin_word = *buf; > - end_word = begin_word + strcspn(begin_word, delimiters); > - > - // Check for quotechar > - if (end_word > begin_word) { > - p = end_word - 1; > - while (*p == quotechar) { > - // If there is anything beyond end_word, copy it > - if (*end_word == '\0') { > - *p = '\0'; > - break; > - } else { > - size_t end_off = strcspn(end_word + 1, delimiters); > - memmove (p, end_word, end_off + 1); > - p += end_off; // p must correspond to end_word - 1 > - end_word += end_off + 1; > - } > +void cs_base64_update(struct cs_base64_ctx *ctx, const char *str, size_t len) { > + const unsigned char *src = (const unsigned char *) str; > + size_t i; > + for (i = 0; i < len; i++) { > + ctx->chunk[ctx->chunk_size++] = src[i]; > + if (ctx->chunk_size == 3) { > + cs_base64_emit_chunk(ctx); > + ctx->chunk_size = 0; > } > - for (p++; p < end_word; p++) { > - *p = '\0'; > + } > +} > + > +void cs_base64_finish(struct cs_base64_ctx *ctx) { > + if (ctx->chunk_size > 0) { > + int i; > + memset(&ctx->chunk[ctx->chunk_size], 0, 3 - ctx->chunk_size); > + cs_base64_emit_chunk(ctx); > + for (i = 0; i < (3 - ctx->chunk_size); i++) { > + ctx->b64_putc('=', ctx->user_data); > } > } > +} > > - if (*end_word == '\0') { > - *buf = end_word; > - } else { > - end_whitespace = end_word + 1 + strspn(end_word + 1, whitespace); > +#define BASE64_ENCODE_BODY \ > + static const char *b64 = \ > + "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; \ > + int i, j, a, b, c; \ > + \ > + for (i = j = 0; i < src_len; i += 3) { \ > + a = src[i]; \ > + b = i + 1 >= src_len ? 0 : src[i + 1]; \ > + c = i + 2 >= src_len ? 0 : src[i + 2]; \ > + \ > + BASE64_OUT(b64[a >> 2]); \ > + BASE64_OUT(b64[((a & 3) << 4) | (b >> 4)]); \ > + if (i + 1 < src_len) { \ > + BASE64_OUT(b64[(b & 15) << 2 | (c >> 6)]); \ > + } \ > + if (i + 2 < src_len) { \ > + BASE64_OUT(b64[c & 63]); \ > + } \ > + } \ > + \ > + while (j % 4 != 0) { \ > + BASE64_OUT('='); \ > + } \ > + BASE64_FLUSH() > + > +#define BASE64_OUT(ch) \ > + do { \ > + dst[j++] = (ch); \ > + } while (0) > + > +#define BASE64_FLUSH() \ > + do { \ > + dst[j++] = '\0'; \ > + } while (0) > + > +void cs_base64_encode(const unsigned char *src, int src_len, char *dst) { > + BASE64_ENCODE_BODY; > +} > + > +#undef BASE64_OUT > +#undef BASE64_FLUSH > + > +#if CS_ENABLE_STDIO > +#define BASE64_OUT(ch) \ > + do { \ > + fprintf(f, "%c", (ch)); \ > + j++; \ > + } while (0) > + > +#define BASE64_FLUSH() > + > +void cs_fprint_base64(FILE *f, const unsigned char *src, int src_len) { > + BASE64_ENCODE_BODY; > +} > + > +#undef BASE64_OUT > +#undef BASE64_FLUSH > +#endif /* CS_ENABLE_STDIO */ > + > +/* Convert one byte of encoded base64 input stream to 6-bit chunk */ > +static unsigned char from_b64(unsigned char ch) { > + /* Inverse lookup map */ > + static const unsigned char tab[128] = { > + 255, 255, 255, 255, > + 255, 255, 255, 255, /* 0 */ > + 255, 255, 255, 255, > + 255, 255, 255, 255, /* 8 */ > + 255, 255, 255, 255, > + 255, 255, 255, 255, /* 16 */ > + 255, 255, 255, 255, > + 255, 255, 255, 255, /* 24 */ > + 255, 255, 255, 255, > + 255, 255, 255, 255, /* 32 */ > + 255, 255, 255, 62, > + 255, 255, 255, 63, /* 40 */ > + 52, 53, 54, 55, > + 56, 57, 58, 59, /* 48 */ > + 60, 61, 255, 255, > + 255, 200, 255, 255, /* 56 '=' is 200, on index 61 */ > + 255, 0, 1, 2, > + 3, 4, 5, 6, /* 64 */ > + 7, 8, 9, 10, > + 11, 12, 13, 14, /* 72 */ > + 15, 16, 17, 18, > + 19, 20, 21, 22, /* 80 */ > + 23, 24, 25, 255, > + 255, 255, 255, 255, /* 88 */ > + 255, 26, 27, 28, > + 29, 30, 31, 32, /* 96 */ > + 33, 34, 35, 36, > + 37, 38, 39, 40, /* 104 */ > + 41, 42, 43, 44, > + 45, 46, 47, 48, /* 112 */ > + 49, 50, 51, 255, > + 255, 255, 255, 255, /* 120 */ > + }; > + return tab[ch & 127]; > +} > + > +int cs_base64_decode(const unsigned char *s, int len, char *dst, int *dec_len) { > + unsigned char a, b, c, d; > + int orig_len = len; > + char *orig_dst = dst; > + while (len >= 4 && (a = from_b64(s[0])) != 255 && > + (b = from_b64(s[1])) != 255 && (c = from_b64(s[2])) != 255 && > + (d = from_b64(s[3])) != 255) { > + s += 4; > + len -= 4; > + if (a == 200 || b == 200) break; /* '=' can't be there */ > + *dst++ = a << 2 | b >> 4; > + if (c == 200) break; > + *dst++ = b << 4 | c >> 2; > + if (d == 200) break; > + *dst++ = c << 6 | d; > + } > + *dst = 0; > + if (dec_len != NULL) *dec_len = (dst - orig_dst); > + return orig_len - len; > +} > + > +#endif /* EXCLUDE_COMMON */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/cs_dirent.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > - for (p = end_word; p < end_whitespace; p++) { > - *p = '\0'; > - } > +#ifndef CS_COMMON_CS_DIRENT_H_ > +#define CS_COMMON_CS_DIRENT_H_ > > - *buf = end_whitespace; > - } > +#include <limits.h> > > - return begin_word; > -} > +/* Amalgamated: #include "common/platform.h" */ > > -// Simplified version of skip_quoted without quote char > -// and whitespace == delimiters > -static char *skip(char **buf, const char *delimiters) { > - return skip_quoted(buf, delimiters, delimiters, 0); > -} > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > > +#ifdef CS_DEFINE_DIRENT > +typedef struct { int dummy; } DIR; > > -// Return HTTP header value, or NULL if not found. > -static const char *get_header(const struct mg_request_info *ri, > - const char *name) { > - int i; > +struct dirent { > + int d_ino; > +#ifdef _WIN32 > + char d_name[MAX_PATH]; > +#else > + /* TODO(rojer): Use PATH_MAX but make sure it's sane on every platform */ > + char d_name[256]; > +#endif > +}; > > - for (i = 0; i < ri->num_headers; i++) > - if (!mg_strcasecmp(name, ri->http_headers[i].name)) > - return ri->http_headers[i].value; > +DIR *opendir(const char *dir_name); > +int closedir(DIR *dir); > +struct dirent *readdir(DIR *dir); > +#endif /* CS_DEFINE_DIRENT */ > > - return NULL; > +#ifdef __cplusplus > } > +#endif /* __cplusplus */ > > -const char *mg_get_header(const struct mg_connection *conn, const char *name) { > - return get_header(&conn->request_info, name); > -} > +#endif /* CS_COMMON_CS_DIRENT_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/cs_dirent.c" > +#endif > +/* > + * Copyright (c) 2015 Cesanta Software Limited > + * All rights reserved > + */ > > -// A helper function for traversing a comma separated list of values. > -// It returns a list pointer shifted to the next value, or NULL if the end > -// of the list found. > -// Value is stored in val vector. If value has form "x=y", then eq_val > -// vector is initialized to point to the "y" part, and val vector length > -// is adjusted to point only to "x". > -static const char *next_option(const char *list, struct vec *val, > - struct vec *eq_val) { > - if (list == NULL || *list == '\0') { > - // End of the list > - list = NULL; > - } else { > - val->ptr = list; > - if ((list = strchr(val->ptr, ',')) != NULL) { > - // Comma found. Store length and shift the list ptr > - val->len = list - val->ptr; > - list++; > - } else { > - // This value is the last one > - list = val->ptr + strlen(val->ptr); > - val->len = list - val->ptr; > - } > +#ifndef EXCLUDE_COMMON > > - if (eq_val != NULL) { > - // Value has form "x=y", adjust pointers and lengths > - // so that val points to "x", and eq_val points to "y". > - eq_val->len = 0; > - eq_val->ptr = (const char *) memchr(val->ptr, '=', val->len); > - if (eq_val->ptr != NULL) { > - eq_val->ptr++; // Skip over '=' character > - eq_val->len = val->ptr + val->len - eq_val->ptr; > - val->len = (eq_val->ptr - val->ptr) - 1; > - } > - } > - } > +/* Amalgamated: #include "common/mg_mem.h" */ > +/* Amalgamated: #include "common/cs_dirent.h" */ > > - return list; > -} > +/* > + * This file contains POSIX opendir/closedir/readdir API implementation > + * for systems which do not natively support it (e.g. Windows). > + */ > > -static int match_prefix(const char *pattern, int pattern_len, const char *str) { > - const char *or_str; > - int i, j, len, res; > +#ifdef _WIN32 > +struct win32_dir { > + DIR d; > + HANDLE handle; > + WIN32_FIND_DATAW info; > + struct dirent result; > +}; > > - if ((or_str = (const char *) memchr(pattern, '|', pattern_len)) != NULL) { > - res = match_prefix(pattern, or_str - pattern, str); > - return res > 0 ? res : > - match_prefix(or_str + 1, (pattern + pattern_len) - (or_str + 1), str); > - } > +DIR *opendir(const char *name) { > + struct win32_dir *dir = NULL; > + wchar_t wpath[MAX_PATH]; > + DWORD attrs; > > - i = j = 0; > - res = -1; > - for (; i < pattern_len; i++, j++) { > - if (pattern[i] == '?' && str[j] != '\0') { > - continue; > - } else if (pattern[i] == '$') { > - return str[j] == '\0' ? j : -1; > - } else if (pattern[i] == '*') { > - i++; > - if (pattern[i] == '*') { > - i++; > - len = (int) strlen(str + j); > - } else { > - len = (int) strcspn(str + j, "/"); > - } > - if (i == pattern_len) { > - return j + len; > - } > - do { > - res = match_prefix(pattern + i, pattern_len - i, str + j + len); > - } while (res == -1 && len-- > 0); > - return res == -1 ? -1 : j + res + len; > - } else if (pattern[i] != str[j]) { > - return -1; > + if (name == NULL) { > + SetLastError(ERROR_BAD_ARGUMENTS); > + } else if ((dir = (struct win32_dir *) MG_MALLOC(sizeof(*dir))) == NULL) { > + SetLastError(ERROR_NOT_ENOUGH_MEMORY); > + } else { > + to_wchar(name, wpath, ARRAY_SIZE(wpath)); > + attrs = GetFileAttributesW(wpath); > + if (attrs != 0xFFFFFFFF && (attrs & FILE_ATTRIBUTE_DIRECTORY)) { > + (void) wcscat(wpath, L"\\*"); > + dir->handle = FindFirstFileW(wpath, &dir->info); > + dir->result.d_name[0] = '\0'; > + } else { > + MG_FREE(dir); > + dir = NULL; > } > } > - return j; > -} > > -// HTTP 1.1 assumes keep alive if "Connection:" header is not set > -// This function must tolerate situations when connection info is not > -// set up, for example if request parsing failed. > -static int should_keep_alive(const struct mg_connection *conn) { > - const char *http_version = conn->request_info.http_version; > - const char *header = mg_get_header(conn, "Connection"); > - if (conn->must_close || > - conn->status_code == 401 || > - mg_strcasecmp(conn->ctx->config[ENABLE_KEEP_ALIVE], "yes") != 0 || > - (header != NULL && mg_strcasecmp(header, "keep-alive") != 0) || > - (header == NULL && http_version && strcmp(http_version, "1.1"))) { > - return 0; > - } > - return 1; > + return (DIR *) dir; > } > > -static const char *suggest_connection_header(const struct mg_connection *conn) { > - return should_keep_alive(conn) ? "keep-alive" : "close"; > -} > +int closedir(DIR *d) { > + struct win32_dir *dir = (struct win32_dir *) d; > + int result = 0; > > -static void send_http_error(struct mg_connection *, int, const char *, > - PRINTF_FORMAT_STRING(const char *fmt), ...) > - PRINTF_ARGS(4, 5); > + if (dir != NULL) { > + if (dir->handle != INVALID_HANDLE_VALUE) > + result = FindClose(dir->handle) ? 0 : -1; > + MG_FREE(dir); > + } else { > + result = -1; > + SetLastError(ERROR_BAD_ARGUMENTS); > + } > > + return result; > +} > > -static void send_http_error(struct mg_connection *conn, int status, > - const char *reason, const char *fmt, ...) { > - char buf[MG_BUF_LEN]; > - va_list ap; > - int len = 0; > +struct dirent *readdir(DIR *d) { > + struct win32_dir *dir = (struct win32_dir *) d; > + struct dirent *result = NULL; > > - conn->status_code = status; > - if (conn->ctx->callbacks.http_error == NULL || > - conn->ctx->callbacks.http_error(conn, status)) { > - buf[0] = '\0'; > + if (dir) { > + memset(&dir->result, 0, sizeof(dir->result)); > + if (dir->handle != INVALID_HANDLE_VALUE) { > + result = &dir->result; > + (void) WideCharToMultiByte(CP_UTF8, 0, dir->info.cFileName, -1, > + result->d_name, sizeof(result->d_name), NULL, > + NULL); > > - // Errors 1xx, 204 and 304 MUST NOT send a body > - if (status > 199 && status != 204 && status != 304) { > - len = mg_snprintf(conn, buf, sizeof(buf), "Error %d: %s", status, reason); > - buf[len++] = '\n'; > + if (!FindNextFileW(dir->handle, &dir->info)) { > + (void) FindClose(dir->handle); > + dir->handle = INVALID_HANDLE_VALUE; > + } > > - va_start(ap, fmt); > - len += mg_vsnprintf(conn, buf + len, sizeof(buf) - len, fmt, ap); > - va_end(ap); > + } else { > + SetLastError(ERROR_FILE_NOT_FOUND); > } > - DEBUG_TRACE(("[%s]", buf)); > - > - mg_printf(conn, "HTTP/1.1 %d %s\r\n" > - "Content-Length: %d\r\n" > - "Connection: %s\r\n\r\n", status, reason, len, > - suggest_connection_header(conn)); > - conn->num_bytes_sent += mg_printf(conn, "%s", buf); > + } else { > + SetLastError(ERROR_BAD_ARGUMENTS); > } > -} > - > -#if defined(_WIN32) && !defined(__SYMBIAN32__) > -static int pthread_mutex_init(pthread_mutex_t *mutex, void *unused) { > - (void) unused; > - *mutex = CreateMutex(NULL, FALSE, NULL); > - return *mutex == NULL ? -1 : 0; > -} > > -static int pthread_mutex_destroy(pthread_mutex_t *mutex) { > - return CloseHandle(*mutex) == 0 ? -1 : 0; > -} > - > -static int pthread_mutex_lock(pthread_mutex_t *mutex) { > - return WaitForSingleObject(*mutex, INFINITE) == WAIT_OBJECT_0? 0 : -1; > + return result; > } > +#endif > > -static int pthread_mutex_unlock(pthread_mutex_t *mutex) { > - return ReleaseMutex(*mutex) == 0 ? -1 : 0; > -} > +#endif /* EXCLUDE_COMMON */ > > -static int pthread_cond_init(pthread_cond_t *cv, const void *unused) { > - (void) unused; > - cv->signal = CreateEvent(NULL, FALSE, FALSE, NULL); > - cv->broadcast = CreateEvent(NULL, TRUE, FALSE, NULL); > - return cv->signal != NULL && cv->broadcast != NULL ? 0 : -1; > -} > +/* ISO C requires a translation unit to contain at least one declaration */ > +typedef int cs_dirent_dummy; > +#ifdef MG_MODULE_LINES > +#line 1 "common/cs_time.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > -static int pthread_cond_wait(pthread_cond_t *cv, pthread_mutex_t *mutex) { > - HANDLE handles[] = {cv->signal, cv->broadcast}; > - ReleaseMutex(*mutex); > - WaitForMultipleObjects(2, handles, FALSE, INFINITE); > - return WaitForSingleObject(*mutex, INFINITE) == WAIT_OBJECT_0? 0 : -1; > -} > +/* Amalgamated: #include "common/cs_time.h" */ > > -static int pthread_cond_signal(pthread_cond_t *cv) { > - return SetEvent(cv->signal) == 0 ? -1 : 0; > +#ifndef _WIN32 > +#include <stddef.h> > +/* > + * There is no sys/time.h on ARMCC. > + */ > +#if !(defined(__ARMCC_VERSION) || defined(__ICCARM__)) && \ > + !defined(__TI_COMPILER_VERSION__) && \ > + (!defined(CS_PLATFORM) || CS_PLATFORM != CS_P_NXP_LPC) > +#include <sys/time.h> > +#endif > +#else > +#include <windows.h> > +#endif > + > +double cs_time(void) WEAK; > +double cs_time(void) { > + double now; > +#ifndef _WIN32 > + struct timeval tv; > + if (gettimeofday(&tv, NULL /* tz */) != 0) return 0; > + now = (double) tv.tv_sec + (((double) tv.tv_usec) / 1000000.0); > +#else > + SYSTEMTIME sysnow; > + FILETIME ftime; > + GetLocalTime(&sysnow); > + SystemTimeToFileTime(&sysnow, &ftime); > + /* > + * 1. VC 6.0 doesn't support conversion uint64 -> double, so, using int64 > + * This should not cause a problems in this (21th) century > + * 2. Windows FILETIME is a number of 100-nanosecond intervals since January > + * 1, 1601 while time_t is a number of _seconds_ since January 1, 1970 UTC, > + * thus, we need to convert to seconds and adjust amount (subtract 11644473600 > + * seconds) > + */ > + now = (double) (((int64_t) ftime.dwLowDateTime + > + ((int64_t) ftime.dwHighDateTime << 32)) / > + 10000000.0) - > + 11644473600; > +#endif /* _WIN32 */ > + return now; > +} > + > +double cs_timegm(const struct tm *tm) { > + /* Month-to-day offset for non-leap-years. */ > + static const int month_day[12] = {0, 31, 59, 90, 120, 151, > + 181, 212, 243, 273, 304, 334}; > + > + /* Most of the calculation is easy; leap years are the main difficulty. */ > + int month = tm->tm_mon % 12; > + int year = tm->tm_year + tm->tm_mon / 12; > + int year_for_leap; > + int64_t rt; > + > + if (month < 0) { /* Negative values % 12 are still negative. */ > + month += 12; > + --year; > + } > + > + /* This is the number of Februaries since 1900. */ > + year_for_leap = (month > 1) ? year + 1 : year; > + > + rt = > + tm->tm_sec /* Seconds */ > + + > + 60 * > + (tm->tm_min /* Minute = 60 seconds */ > + + > + 60 * (tm->tm_hour /* Hour = 60 minutes */ > + + > + 24 * (month_day[month] + tm->tm_mday - 1 /* Day = 24 hours */ > + + 365 * (year - 70) /* Year = 365 days */ > + + (year_for_leap - 69) / 4 /* Every 4 years is leap... */ > + - (year_for_leap - 1) / 100 /* Except centuries... */ > + + (year_for_leap + 299) / 400))); /* Except 400s. */ > + return rt < 0 ? -1 : (double) rt; > +} > +#ifdef MG_MODULE_LINES > +#line 1 "common/cs_endian.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_CS_ENDIAN_H_ > +#define CS_COMMON_CS_ENDIAN_H_ > + > +#ifdef __cplusplus > +extern "C" { > +#endif > + > +/* > + * clang with std=-c99 uses __LITTLE_ENDIAN, by default > + * while for ex, RTOS gcc - LITTLE_ENDIAN, by default > + * it depends on __USE_BSD, but let's have everything > + */ > +#if !defined(BYTE_ORDER) && defined(__BYTE_ORDER) > +#define BYTE_ORDER __BYTE_ORDER > +#ifndef LITTLE_ENDIAN > +#define LITTLE_ENDIAN __LITTLE_ENDIAN > +#endif /* LITTLE_ENDIAN */ > +#ifndef BIG_ENDIAN > +#define BIG_ENDIAN __LITTLE_ENDIAN > +#endif /* BIG_ENDIAN */ > +#endif /* BYTE_ORDER */ > + > +#ifdef __cplusplus > +} > +#endif > + > +#endif /* CS_COMMON_CS_ENDIAN_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/cs_md5.c" > +#endif > +/* > + * This code implements the MD5 message-digest algorithm. > + * The algorithm is due to Ron Rivest. This code was > + * written by Colin Plumb in 1993, no copyright is claimed. > + * This code is in the public domain; do with it what you wish. > + * > + * Equivalent code is available from RSA Data Security, Inc. > + * This code has been tested against that, and is equivalent, > + * except that you don't need to include two pages of legalese > + * with every copy. > + * > + * To compute the message digest of a chunk of bytes, declare an > + * MD5Context structure, pass it to MD5Init, call MD5Update as > + * needed on buffers full of bytes, and then call MD5Final, which > + * will fill a supplied 16-byte array with the digest. > + */ > + > +/* Amalgamated: #include "common/cs_md5.h" */ > +/* Amalgamated: #include "common/str_util.h" */ > + > +#if !defined(EXCLUDE_COMMON) > +#if !CS_DISABLE_MD5 > + > +/* Amalgamated: #include "common/cs_endian.h" */ > + > +static void byteReverse(unsigned char *buf, unsigned longs) { > +/* Forrest: MD5 expect LITTLE_ENDIAN, swap if BIG_ENDIAN */ > +#if BYTE_ORDER == BIG_ENDIAN > + do { > + uint32_t t = (uint32_t)((unsigned) buf[3] << 8 | buf[2]) << 16 | > + ((unsigned) buf[1] << 8 | buf[0]); > + *(uint32_t *) buf = t; > + buf += 4; > + } while (--longs); > +#else > + (void) buf; > + (void) longs; > +#endif > +} > + > +#define F1(x, y, z) (z ^ (x & (y ^ z))) > +#define F2(x, y, z) F1(z, x, y) > +#define F3(x, y, z) (x ^ y ^ z) > +#define F4(x, y, z) (y ^ (x | ~z)) > + > +#define MD5STEP(f, w, x, y, z, data, s) \ > + (w += f(x, y, z) + data, w = w << s | w >> (32 - s), w += x) > + > +/* > + * Start MD5 accumulation. Set bit count to 0 and buffer to mysterious > + * initialization constants. > + */ > +void cs_md5_init(cs_md5_ctx *ctx) { > + ctx->buf[0] = 0x67452301; > + ctx->buf[1] = 0xefcdab89; > + ctx->buf[2] = 0x98badcfe; > + ctx->buf[3] = 0x10325476; > + > + ctx->bits[0] = 0; > + ctx->bits[1] = 0; > +} > + > +static void cs_md5_transform(uint32_t buf[4], uint32_t const in[16]) { > + register uint32_t a, b, c, d; > + > + a = buf[0]; > + b = buf[1]; > + c = buf[2]; > + d = buf[3]; > + > + MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); > + MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); > + MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); > + MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); > + MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); > + MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12); > + MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17); > + MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22); > + MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); > + MD5STEP(F1, d, a, b, c, in[9] + 0x8b44f7af, 12); > + MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17); > + MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22); > + MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7); > + MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12); > + MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17); > + MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22); > + > + MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); > + MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); > + MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14); > + MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20); > + MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5); > + MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9); > + MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14); > + MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20); > + MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5); > + MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9); > + MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14); > + MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20); > + MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5); > + MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9); > + MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14); > + MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20); > + > + MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4); > + MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11); > + MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16); > + MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23); > + MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4); > + MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11); > + MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16); > + MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23); > + MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4); > + MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11); > + MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16); > + MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23); > + MD5STEP(F3, a, b, c, d, in[9] + 0xd9d4d039, 4); > + MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11); > + MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16); > + MD5STEP(F3, b, c, d, a, in[2] + 0xc4ac5665, 23); > + > + MD5STEP(F4, a, b, c, d, in[0] + 0xf4292244, 6); > + MD5STEP(F4, d, a, b, c, in[7] + 0x432aff97, 10); > + MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15); > + MD5STEP(F4, b, c, d, a, in[5] + 0xfc93a039, 21); > + MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6); > + MD5STEP(F4, d, a, b, c, in[3] + 0x8f0ccc92, 10); > + MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15); > + MD5STEP(F4, b, c, d, a, in[1] + 0x85845dd1, 21); > + MD5STEP(F4, a, b, c, d, in[8] + 0x6fa87e4f, 6); > + MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10); > + MD5STEP(F4, c, d, a, b, in[6] + 0xa3014314, 15); > + MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21); > + MD5STEP(F4, a, b, c, d, in[4] + 0xf7537e82, 6); > + MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10); > + MD5STEP(F4, c, d, a, b, in[2] + 0x2ad7d2bb, 15); > + MD5STEP(F4, b, c, d, a, in[9] + 0xeb86d391, 21); > + > + buf[0] += a; > + buf[1] += b; > + buf[2] += c; > + buf[3] += d; > +} > + > +void cs_md5_update(cs_md5_ctx *ctx, const unsigned char *buf, size_t len) { > + uint32_t t; > + > + t = ctx->bits[0]; > + if ((ctx->bits[0] = t + ((uint32_t) len << 3)) < t) ctx->bits[1]++; > + ctx->bits[1] += (uint32_t) len >> 29; > + > + t = (t >> 3) & 0x3f; > + > + if (t) { > + unsigned char *p = (unsigned char *) ctx->in + t; > + > + t = 64 - t; > + if (len < t) { > + memcpy(p, buf, len); > + return; > + } > + memcpy(p, buf, t); > + byteReverse(ctx->in, 16); > + cs_md5_transform(ctx->buf, (uint32_t *) ctx->in); > + buf += t; > + len -= t; > + } > + > + while (len >= 64) { > + memcpy(ctx->in, buf, 64); > + byteReverse(ctx->in, 16); > + cs_md5_transform(ctx->buf, (uint32_t *) ctx->in); > + buf += 64; > + len -= 64; > + } > + > + memcpy(ctx->in, buf, len); > +} > + > +void cs_md5_final(unsigned char digest[16], cs_md5_ctx *ctx) { > + unsigned count; > + unsigned char *p; > + uint32_t *a; > + > + count = (ctx->bits[0] >> 3) & 0x3F; > + > + p = ctx->in + count; > + *p++ = 0x80; > + count = 64 - 1 - count; > + if (count < 8) { > + memset(p, 0, count); > + byteReverse(ctx->in, 16); > + cs_md5_transform(ctx->buf, (uint32_t *) ctx->in); > + memset(ctx->in, 0, 56); > + } else { > + memset(p, 0, count - 8); > + } > + byteReverse(ctx->in, 14); > + > + a = (uint32_t *) ctx->in; > + a[14] = ctx->bits[0]; > + a[15] = ctx->bits[1]; > + > + cs_md5_transform(ctx->buf, (uint32_t *) ctx->in); > + byteReverse((unsigned char *) ctx->buf, 4); > + memcpy(digest, ctx->buf, 16); > + memset((char *) ctx, 0, sizeof(*ctx)); > +} > + > +#endif /* CS_DISABLE_MD5 */ > +#endif /* EXCLUDE_COMMON */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/cs_sha1.c" > +#endif > +/* Copyright(c) By Steve Reid <steve@edmweb.com> */ > +/* 100% Public Domain */ > + > +/* Amalgamated: #include "common/cs_sha1.h" */ > + > +#if !CS_DISABLE_SHA1 && !defined(EXCLUDE_COMMON) > + > +/* Amalgamated: #include "common/cs_endian.h" */ > + > +#define SHA1HANDSOFF > +#if defined(__sun) > +/* Amalgamated: #include "common/solarisfixes.h" */ > +#endif > + > +union char64long16 { > + unsigned char c[64]; > + uint32_t l[16]; > +}; > + > +#define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) > + > +static uint32_t blk0(union char64long16 *block, int i) { > +/* Forrest: SHA expect BIG_ENDIAN, swap if LITTLE_ENDIAN */ > +#if BYTE_ORDER == LITTLE_ENDIAN > + block->l[i] = > + (rol(block->l[i], 24) & 0xFF00FF00) | (rol(block->l[i], 8) & 0x00FF00FF); > +#endif > + return block->l[i]; > +} > + > +/* Avoid redefine warning (ARM /usr/include/sys/ucontext.h define R0~R4) */ > +#undef blk > +#undef R0 > +#undef R1 > +#undef R2 > +#undef R3 > +#undef R4 > + > +#define blk(i) \ > + (block->l[i & 15] = rol(block->l[(i + 13) & 15] ^ block->l[(i + 8) & 15] ^ \ > + block->l[(i + 2) & 15] ^ block->l[i & 15], \ > + 1)) > +#define R0(v, w, x, y, z, i) \ > + z += ((w & (x ^ y)) ^ y) + blk0(block, i) + 0x5A827999 + rol(v, 5); \ > + w = rol(w, 30); > +#define R1(v, w, x, y, z, i) \ > + z += ((w & (x ^ y)) ^ y) + blk(i) + 0x5A827999 + rol(v, 5); \ > + w = rol(w, 30); > +#define R2(v, w, x, y, z, i) \ > + z += (w ^ x ^ y) + blk(i) + 0x6ED9EBA1 + rol(v, 5); \ > + w = rol(w, 30); > +#define R3(v, w, x, y, z, i) \ > + z += (((w | x) & y) | (w & x)) + blk(i) + 0x8F1BBCDC + rol(v, 5); \ > + w = rol(w, 30); > +#define R4(v, w, x, y, z, i) \ > + z += (w ^ x ^ y) + blk(i) + 0xCA62C1D6 + rol(v, 5); \ > + w = rol(w, 30); > + > +void cs_sha1_transform(uint32_t state[5], const unsigned char buffer[64]) { > + uint32_t a, b, c, d, e; > + union char64long16 block[1]; > + > + memcpy(block, buffer, 64); > + a = state[0]; > + b = state[1]; > + c = state[2]; > + d = state[3]; > + e = state[4]; > + R0(a, b, c, d, e, 0); > + R0(e, a, b, c, d, 1); > + R0(d, e, a, b, c, 2); > + R0(c, d, e, a, b, 3); > + R0(b, c, d, e, a, 4); > + R0(a, b, c, d, e, 5); > + R0(e, a, b, c, d, 6); > + R0(d, e, a, b, c, 7); > + R0(c, d, e, a, b, 8); > + R0(b, c, d, e, a, 9); > + R0(a, b, c, d, e, 10); > + R0(e, a, b, c, d, 11); > + R0(d, e, a, b, c, 12); > + R0(c, d, e, a, b, 13); > + R0(b, c, d, e, a, 14); > + R0(a, b, c, d, e, 15); > + R1(e, a, b, c, d, 16); > + R1(d, e, a, b, c, 17); > + R1(c, d, e, a, b, 18); > + R1(b, c, d, e, a, 19); > + R2(a, b, c, d, e, 20); > + R2(e, a, b, c, d, 21); > + R2(d, e, a, b, c, 22); > + R2(c, d, e, a, b, 23); > + R2(b, c, d, e, a, 24); > + R2(a, b, c, d, e, 25); > + R2(e, a, b, c, d, 26); > + R2(d, e, a, b, c, 27); > + R2(c, d, e, a, b, 28); > + R2(b, c, d, e, a, 29); > + R2(a, b, c, d, e, 30); > + R2(e, a, b, c, d, 31); > + R2(d, e, a, b, c, 32); > + R2(c, d, e, a, b, 33); > + R2(b, c, d, e, a, 34); > + R2(a, b, c, d, e, 35); > + R2(e, a, b, c, d, 36); > + R2(d, e, a, b, c, 37); > + R2(c, d, e, a, b, 38); > + R2(b, c, d, e, a, 39); > + R3(a, b, c, d, e, 40); > + R3(e, a, b, c, d, 41); > + R3(d, e, a, b, c, 42); > + R3(c, d, e, a, b, 43); > + R3(b, c, d, e, a, 44); > + R3(a, b, c, d, e, 45); > + R3(e, a, b, c, d, 46); > + R3(d, e, a, b, c, 47); > + R3(c, d, e, a, b, 48); > + R3(b, c, d, e, a, 49); > + R3(a, b, c, d, e, 50); > + R3(e, a, b, c, d, 51); > + R3(d, e, a, b, c, 52); > + R3(c, d, e, a, b, 53); > + R3(b, c, d, e, a, 54); > + R3(a, b, c, d, e, 55); > + R3(e, a, b, c, d, 56); > + R3(d, e, a, b, c, 57); > + R3(c, d, e, a, b, 58); > + R3(b, c, d, e, a, 59); > + R4(a, b, c, d, e, 60); > + R4(e, a, b, c, d, 61); > + R4(d, e, a, b, c, 62); > + R4(c, d, e, a, b, 63); > + R4(b, c, d, e, a, 64); > + R4(a, b, c, d, e, 65); > + R4(e, a, b, c, d, 66); > + R4(d, e, a, b, c, 67); > + R4(c, d, e, a, b, 68); > + R4(b, c, d, e, a, 69); > + R4(a, b, c, d, e, 70); > + R4(e, a, b, c, d, 71); > + R4(d, e, a, b, c, 72); > + R4(c, d, e, a, b, 73); > + R4(b, c, d, e, a, 74); > + R4(a, b, c, d, e, 75); > + R4(e, a, b, c, d, 76); > + R4(d, e, a, b, c, 77); > + R4(c, d, e, a, b, 78); > + R4(b, c, d, e, a, 79); > + state[0] += a; > + state[1] += b; > + state[2] += c; > + state[3] += d; > + state[4] += e; > + /* Erase working structures. The order of operations is important, > + * used to ensure that compiler doesn't optimize those out. */ > + memset(block, 0, sizeof(block)); > + a = b = c = d = e = 0; > + (void) a; > + (void) b; > + (void) c; > + (void) d; > + (void) e; > +} > + > +void cs_sha1_init(cs_sha1_ctx *context) { > + context->state[0] = 0x67452301; > + context->state[1] = 0xEFCDAB89; > + context->state[2] = 0x98BADCFE; > + context->state[3] = 0x10325476; > + context->state[4] = 0xC3D2E1F0; > + context->count[0] = context->count[1] = 0; > +} > + > +void cs_sha1_update(cs_sha1_ctx *context, const unsigned char *data, > + uint32_t len) { > + uint32_t i, j; > + > + j = context->count[0]; > + if ((context->count[0] += len << 3) < j) context->count[1]++; > + context->count[1] += (len >> 29); > + j = (j >> 3) & 63; > + if ((j + len) > 63) { > + memcpy(&context->buffer[j], data, (i = 64 - j)); > + cs_sha1_transform(context->state, context->buffer); > + for (; i + 63 < len; i += 64) { > + cs_sha1_transform(context->state, &data[i]); > + } > + j = 0; > + } else > + i = 0; > + memcpy(&context->buffer[j], &data[i], len - i); > +} > + > +void cs_sha1_final(unsigned char digest[20], cs_sha1_ctx *context) { > + unsigned i; > + unsigned char finalcount[8], c; > + > + for (i = 0; i < 8; i++) { > + finalcount[i] = (unsigned char) ((context->count[(i >= 4 ? 0 : 1)] >> > + ((3 - (i & 3)) * 8)) & > + 255); > + } > + c = 0200; > + cs_sha1_update(context, &c, 1); > + while ((context->count[0] & 504) != 448) { > + c = 0000; > + cs_sha1_update(context, &c, 1); > + } > + cs_sha1_update(context, finalcount, 8); > + for (i = 0; i < 20; i++) { > + digest[i] = > + (unsigned char) ((context->state[i >> 2] >> ((3 - (i & 3)) * 8)) & 255); > + } > + memset(context, '\0', sizeof(*context)); > + memset(&finalcount, '\0', sizeof(finalcount)); > +} > + > +void cs_hmac_sha1(const unsigned char *key, size_t keylen, > + const unsigned char *data, size_t datalen, > + unsigned char out[20]) { > + cs_sha1_ctx ctx; > + unsigned char buf1[64], buf2[64], tmp_key[20], i; > + > + if (keylen > sizeof(buf1)) { > + cs_sha1_init(&ctx); > + cs_sha1_update(&ctx, key, keylen); > + cs_sha1_final(tmp_key, &ctx); > + key = tmp_key; > + keylen = sizeof(tmp_key); > + } > + > + memset(buf1, 0, sizeof(buf1)); > + memset(buf2, 0, sizeof(buf2)); > + memcpy(buf1, key, keylen); > + memcpy(buf2, key, keylen); > + > + for (i = 0; i < sizeof(buf1); i++) { > + buf1[i] ^= 0x36; > + buf2[i] ^= 0x5c; > + } > + > + cs_sha1_init(&ctx); > + cs_sha1_update(&ctx, buf1, sizeof(buf1)); > + cs_sha1_update(&ctx, data, datalen); > + cs_sha1_final(out, &ctx); > + > + cs_sha1_init(&ctx); > + cs_sha1_update(&ctx, buf2, sizeof(buf2)); > + cs_sha1_update(&ctx, out, 20); > + cs_sha1_final(out, &ctx); > +} > + > +#endif /* EXCLUDE_COMMON */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/mbuf.c" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef EXCLUDE_COMMON > + > +#include <assert.h> > +#include <string.h> > +/* Amalgamated: #include "common/mbuf.h" */ > + > +#ifndef MBUF_REALLOC > +#define MBUF_REALLOC realloc > +#endif > + > +#ifndef MBUF_FREE > +#define MBUF_FREE free > +#endif > + > +void mbuf_init(struct mbuf *mbuf, size_t initial_size) WEAK; > +void mbuf_init(struct mbuf *mbuf, size_t initial_size) { > + mbuf->len = mbuf->size = 0; > + mbuf->buf = NULL; > + mbuf_resize(mbuf, initial_size); > +} > + > +void mbuf_free(struct mbuf *mbuf) WEAK; > +void mbuf_free(struct mbuf *mbuf) { > + if (mbuf->buf != NULL) { > + MBUF_FREE(mbuf->buf); > + mbuf_init(mbuf, 0); > + } > +} > + > +void mbuf_resize(struct mbuf *a, size_t new_size) WEAK; > +void mbuf_resize(struct mbuf *a, size_t new_size) { > + if (new_size > a->size || (new_size < a->size && new_size >= a->len)) { > + char *buf = (char *) MBUF_REALLOC(a->buf, new_size); > + /* > + * In case realloc fails, there's not much we can do, except keep things as > + * they are. Note that NULL is a valid return value from realloc when > + * size == 0, but that is covered too. > + */ > + if (buf == NULL && new_size != 0) return; > + a->buf = buf; > + a->size = new_size; > + } > +} > + > +void mbuf_trim(struct mbuf *mbuf) WEAK; > +void mbuf_trim(struct mbuf *mbuf) { > + mbuf_resize(mbuf, mbuf->len); > +} > + > +size_t mbuf_insert(struct mbuf *a, size_t off, const void *buf, size_t) WEAK; > +size_t mbuf_insert(struct mbuf *a, size_t off, const void *buf, size_t len) { > + char *p = NULL; > + > + assert(a != NULL); > + assert(a->len <= a->size); > + assert(off <= a->len); > + > + /* check overflow */ > + if (~(size_t) 0 - (size_t) a->buf < len) return 0; > + > + if (a->len + len <= a->size) { > + memmove(a->buf + off + len, a->buf + off, a->len - off); > + if (buf != NULL) { > + memcpy(a->buf + off, buf, len); > + } > + a->len += len; > + } else { > + size_t new_size = (size_t)((a->len + len) * MBUF_SIZE_MULTIPLIER); > + if ((p = (char *) MBUF_REALLOC(a->buf, new_size)) != NULL) { > + a->buf = p; > + memmove(a->buf + off + len, a->buf + off, a->len - off); > + if (buf != NULL) memcpy(a->buf + off, buf, len); > + a->len += len; > + a->size = new_size; > + } else { > + len = 0; > + } > + } > + > + return len; > +} > + > +size_t mbuf_append(struct mbuf *a, const void *buf, size_t len) WEAK; > +size_t mbuf_append(struct mbuf *a, const void *buf, size_t len) { > + return mbuf_insert(a, a->len, buf, len); > +} > + > +void mbuf_remove(struct mbuf *mb, size_t n) WEAK; > +void mbuf_remove(struct mbuf *mb, size_t n) { > + if (n > 0 && n <= mb->len) { > + memmove(mb->buf, mb->buf + n, mb->len - n); > + mb->len -= n; > + } > +} > + > +#endif /* EXCLUDE_COMMON */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/mg_str.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +/* Amalgamated: #include "common/mg_mem.h" */ > +/* Amalgamated: #include "common/mg_str.h" */ > + > +#include <stdlib.h> > +#include <string.h> > + > +int mg_ncasecmp(const char *s1, const char *s2, size_t len) WEAK; > + > +struct mg_str mg_mk_str(const char *s) WEAK; > +struct mg_str mg_mk_str(const char *s) { > + struct mg_str ret = {s, 0}; > + if (s != NULL) ret.len = strlen(s); > + return ret; > +} > + > +struct mg_str mg_mk_str_n(const char *s, size_t len) WEAK; > +struct mg_str mg_mk_str_n(const char *s, size_t len) { > + struct mg_str ret = {s, len}; > + return ret; > +} > + > +int mg_vcmp(const struct mg_str *str1, const char *str2) WEAK; > +int mg_vcmp(const struct mg_str *str1, const char *str2) { > + size_t n2 = strlen(str2), n1 = str1->len; > + int r = strncmp(str1->p, str2, (n1 < n2) ? n1 : n2); > + if (r == 0) { > + return n1 - n2; > + } > + return r; > +} > + > +int mg_vcasecmp(const struct mg_str *str1, const char *str2) WEAK; > +int mg_vcasecmp(const struct mg_str *str1, const char *str2) { > + size_t n2 = strlen(str2), n1 = str1->len; > + int r = mg_ncasecmp(str1->p, str2, (n1 < n2) ? n1 : n2); > + if (r == 0) { > + return n1 - n2; > + } > + return r; > +} > + > +static struct mg_str mg_strdup_common(const struct mg_str s, > + int nul_terminate) { > + struct mg_str r = {NULL, 0}; > + if (s.len > 0 && s.p != NULL) { > + char *sc = (char *) MG_MALLOC(s.len + (nul_terminate ? 1 : 0)); > + if (sc != NULL) { > + memcpy(sc, s.p, s.len); > + if (nul_terminate) sc[s.len] = '\0'; > + r.p = sc; > + r.len = s.len; > + } > + } > + return r; > +} > + > +struct mg_str mg_strdup(const struct mg_str s) WEAK; > +struct mg_str mg_strdup(const struct mg_str s) { > + return mg_strdup_common(s, 0 /* NUL-terminate */); > +} > + > +struct mg_str mg_strdup_nul(const struct mg_str s) WEAK; > +struct mg_str mg_strdup_nul(const struct mg_str s) { > + return mg_strdup_common(s, 1 /* NUL-terminate */); > +} > + > +const char *mg_strchr(const struct mg_str s, int c) WEAK; > +const char *mg_strchr(const struct mg_str s, int c) { > + size_t i; > + for (i = 0; i < s.len; i++) { > + if (s.p[i] == c) return &s.p[i]; > + } > + return NULL; > +} > + > +int mg_strcmp(const struct mg_str str1, const struct mg_str str2) WEAK; > +int mg_strcmp(const struct mg_str str1, const struct mg_str str2) { > + size_t i = 0; > + while (i < str1.len && i < str2.len) { > + if (str1.p[i] < str2.p[i]) return -1; > + if (str1.p[i] > str2.p[i]) return 1; > + i++; > + } > + if (i < str1.len) return 1; > + if (i < str2.len) return -1; > + return 0; > +} > + > +int mg_strncmp(const struct mg_str, const struct mg_str, size_t n) WEAK; > +int mg_strncmp(const struct mg_str str1, const struct mg_str str2, size_t n) { > + struct mg_str s1 = str1; > + struct mg_str s2 = str2; > + > + if (s1.len > n) { > + s1.len = n; > + } > + if (s2.len > n) { > + s2.len = n; > + } > + return mg_strcmp(s1, s2); > +} > + > +const char *mg_strstr(const struct mg_str haystack, > + const struct mg_str needle) WEAK; > +const char *mg_strstr(const struct mg_str haystack, > + const struct mg_str needle) { > + size_t i; > + if (needle.len > haystack.len) return NULL; > + for (i = 0; i <= haystack.len - needle.len; i++) { > + if (memcmp(haystack.p + i, needle.p, needle.len) == 0) { > + return haystack.p + i; > + } > + } > + return NULL; > +} > +#ifdef MG_MODULE_LINES > +#line 1 "common/str_util.c" > +#endif > +/* > + * Copyright (c) 2015 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef EXCLUDE_COMMON > + > +/* Amalgamated: #include "common/mg_mem.h" */ > +/* Amalgamated: #include "common/platform.h" */ > +/* Amalgamated: #include "common/str_util.h" */ > + > +#ifndef C_DISABLE_BUILTIN_SNPRINTF > +#define C_DISABLE_BUILTIN_SNPRINTF 0 > +#endif > + > +/* Amalgamated: #include "common/mg_mem.h" */ > + > +size_t c_strnlen(const char *s, size_t maxlen) WEAK; > +size_t c_strnlen(const char *s, size_t maxlen) { > + size_t l = 0; > + for (; l < maxlen && s[l] != '\0'; l++) { > + } > + return l; > +} > + > +#define C_SNPRINTF_APPEND_CHAR(ch) \ > + do { \ > + if (i < (int) buf_size) buf[i] = ch; \ > + i++; \ > + } while (0) > + > +#define C_SNPRINTF_FLAG_ZERO 1 > + > +#if C_DISABLE_BUILTIN_SNPRINTF > +int c_vsnprintf(char *buf, size_t buf_size, const char *fmt, va_list ap) WEAK; > +int c_vsnprintf(char *buf, size_t buf_size, const char *fmt, va_list ap) { > + return vsnprintf(buf, buf_size, fmt, ap); > +} > +#else > +static int c_itoa(char *buf, size_t buf_size, int64_t num, int base, int flags, > + int field_width) { > + char tmp[40]; > + int i = 0, k = 0, neg = 0; > + > + if (num < 0) { > + neg++; > + num = -num; > + } > + > + /* Print into temporary buffer - in reverse order */ > + do { > + int rem = num % base; > + if (rem < 10) { > + tmp[k++] = '0' + rem; > + } else { > + tmp[k++] = 'a' + (rem - 10); > + } > + num /= base; > + } while (num > 0); > + > + /* Zero padding */ > + if (flags && C_SNPRINTF_FLAG_ZERO) { > + while (k < field_width && k < (int) sizeof(tmp) - 1) { > + tmp[k++] = '0'; > + } > + } > + > + /* And sign */ > + if (neg) { > + tmp[k++] = '-'; > + } > + > + /* Now output */ > + while (--k >= 0) { > + C_SNPRINTF_APPEND_CHAR(tmp[k]); > + } > + > + return i; > +} > + > +int c_vsnprintf(char *buf, size_t buf_size, const char *fmt, va_list ap) WEAK; > +int c_vsnprintf(char *buf, size_t buf_size, const char *fmt, va_list ap) { > + int ch, i = 0, len_mod, flags, precision, field_width; > + > + while ((ch = *fmt++) != '\0') { > + if (ch != '%') { > + C_SNPRINTF_APPEND_CHAR(ch); > + } else { > + /* > + * Conversion specification: > + * zero or more flags (one of: # 0 - <space> + ') > + * an optional minimum field width (digits) > + * an optional precision (. followed by digits, or *) > + * an optional length modifier (one of: hh h l ll L q j z t) > + * conversion specifier (one of: d i o u x X e E f F g G a A c s p n) > + */ > + flags = field_width = precision = len_mod = 0; > + > + /* Flags. only zero-pad flag is supported. */ > + if (*fmt == '0') { > + flags |= C_SNPRINTF_FLAG_ZERO; > + } > + > + /* Field width */ > + while (*fmt >= '0' && *fmt <= '9') { > + field_width *= 10; > + field_width += *fmt++ - '0'; > + } > + /* Dynamic field width */ > + if (*fmt == '*') { > + field_width = va_arg(ap, int); > + fmt++; > + } > + > + /* Precision */ > + if (*fmt == '.') { > + fmt++; > + if (*fmt == '*') { > + precision = va_arg(ap, int); > + fmt++; > + } else { > + while (*fmt >= '0' && *fmt <= '9') { > + precision *= 10; > + precision += *fmt++ - '0'; > + } > + } > + } > + > + /* Length modifier */ > + switch (*fmt) { > + case 'h': > + case 'l': > + case 'L': > + case 'I': > + case 'q': > + case 'j': > + case 'z': > + case 't': > + len_mod = *fmt++; > + if (*fmt == 'h') { > + len_mod = 'H'; > + fmt++; > + } > + if (*fmt == 'l') { > + len_mod = 'q'; > + fmt++; > + } > + break; > + } > + > + ch = *fmt++; > + if (ch == 's') { > + const char *s = va_arg(ap, const char *); /* Always fetch parameter */ > + int j; > + int pad = field_width - (precision >= 0 ? c_strnlen(s, precision) : 0); > + for (j = 0; j < pad; j++) { > + C_SNPRINTF_APPEND_CHAR(' '); > + } > + > + /* `s` may be NULL in case of %.*s */ > + if (s != NULL) { > + /* Ignore negative and 0 precisions */ > + for (j = 0; (precision <= 0 || j < precision) && s[j] != '\0'; j++) { > + C_SNPRINTF_APPEND_CHAR(s[j]); > + } > + } > + } else if (ch == 'c') { > + ch = va_arg(ap, int); /* Always fetch parameter */ > + C_SNPRINTF_APPEND_CHAR(ch); > + } else if (ch == 'd' && len_mod == 0) { > + i += c_itoa(buf + i, buf_size - i, va_arg(ap, int), 10, flags, > + field_width); > + } else if (ch == 'd' && len_mod == 'l') { > + i += c_itoa(buf + i, buf_size - i, va_arg(ap, long), 10, flags, > + field_width); > +#ifdef SSIZE_MAX > + } else if (ch == 'd' && len_mod == 'z') { > + i += c_itoa(buf + i, buf_size - i, va_arg(ap, ssize_t), 10, flags, > + field_width); > +#endif > + } else if (ch == 'd' && len_mod == 'q') { > + i += c_itoa(buf + i, buf_size - i, va_arg(ap, int64_t), 10, flags, > + field_width); > + } else if ((ch == 'x' || ch == 'u') && len_mod == 0) { > + i += c_itoa(buf + i, buf_size - i, va_arg(ap, unsigned), > + ch == 'x' ? 16 : 10, flags, field_width); > + } else if ((ch == 'x' || ch == 'u') && len_mod == 'l') { > + i += c_itoa(buf + i, buf_size - i, va_arg(ap, unsigned long), > + ch == 'x' ? 16 : 10, flags, field_width); > + } else if ((ch == 'x' || ch == 'u') && len_mod == 'z') { > + i += c_itoa(buf + i, buf_size - i, va_arg(ap, size_t), > + ch == 'x' ? 16 : 10, flags, field_width); > + } else if (ch == 'p') { > + unsigned long num = (unsigned long) (uintptr_t) va_arg(ap, void *); > + C_SNPRINTF_APPEND_CHAR('0'); > + C_SNPRINTF_APPEND_CHAR('x'); > + i += c_itoa(buf + i, buf_size - i, num, 16, flags, 0); > + } else { > +#ifndef NO_LIBC > + /* > + * TODO(lsm): abort is not nice in a library, remove it > + * Also, ESP8266 SDK doesn't have it > + */ > + abort(); > +#endif > + } > + } > + } > + > + /* Zero-terminate the result */ > + if (buf_size > 0) { > + buf[i < (int) buf_size ? i : (int) buf_size - 1] = '\0'; > + } > + > + return i; > +} > +#endif > + > +int c_snprintf(char *buf, size_t buf_size, const char *fmt, ...) WEAK; > +int c_snprintf(char *buf, size_t buf_size, const char *fmt, ...) { > + int result; > + va_list ap; > + va_start(ap, fmt); > + result = c_vsnprintf(buf, buf_size, fmt, ap); > + va_end(ap); > + return result; > +} > + > +#ifdef _WIN32 > +int to_wchar(const char *path, wchar_t *wbuf, size_t wbuf_len) { > + int ret; > + char buf[MAX_PATH * 2], buf2[MAX_PATH * 2], *p; > + > + strncpy(buf, path, sizeof(buf)); > + buf[sizeof(buf) - 1] = '\0'; > + > + /* Trim trailing slashes. Leave backslash for paths like "X:\" */ > + p = buf + strlen(buf) - 1; > + while (p > buf && p[-1] != ':' && (p[0] == '\\' || p[0] == '/')) *p-- = '\0'; > + > + memset(wbuf, 0, wbuf_len * sizeof(wchar_t)); > + ret = MultiByteToWideChar(CP_UTF8, 0, buf, -1, wbuf, (int) wbuf_len); > + > + /* > + * Convert back to Unicode. If doubly-converted string does not match the > + * original, something is fishy, reject. > + */ > + WideCharToMultiByte(CP_UTF8, 0, wbuf, (int) wbuf_len, buf2, sizeof(buf2), > + NULL, NULL); > + if (strcmp(buf, buf2) != 0) { > + wbuf[0] = L'\0'; > + ret = 0; > + } > + > + return ret; > +} > +#endif /* _WIN32 */ > + > +/* The simplest O(mn) algorithm. Better implementation are GPLed */ > +const char *c_strnstr(const char *s, const char *find, size_t slen) WEAK; > +const char *c_strnstr(const char *s, const char *find, size_t slen) { > + size_t find_length = strlen(find); > + size_t i; > + > + for (i = 0; i < slen; i++) { > + if (i + find_length > slen) { > + return NULL; > + } > + > + if (strncmp(&s[i], find, find_length) == 0) { > + return &s[i]; > + } > + } > + > + return NULL; > +} > + > +#if CS_ENABLE_STRDUP > +char *strdup(const char *src) WEAK; > +char *strdup(const char *src) { > + size_t len = strlen(src) + 1; > + char *ret = MG_MALLOC(len); > + if (ret != NULL) { > + strcpy(ret, src); > + } > + return ret; > +} > +#endif > + > +void cs_to_hex(char *to, const unsigned char *p, size_t len) WEAK; > +void cs_to_hex(char *to, const unsigned char *p, size_t len) { > + static const char *hex = "0123456789abcdef"; > + > + for (; len--; p++) { > + *to++ = hex[p[0] >> 4]; > + *to++ = hex[p[0] & 0x0f]; > + } > + *to = '\0'; > +} > + > +static int fourbit(int ch) { > + if (ch >= '0' && ch <= '9') { > + return ch - '0'; > + } else if (ch >= 'a' && ch <= 'f') { > + return ch - 'a' + 10; > + } else if (ch >= 'A' && ch <= 'F') { > + return ch - 'A' + 10; > + } > + return 0; > +} > + > +void cs_from_hex(char *to, const char *p, size_t len) WEAK; > +void cs_from_hex(char *to, const char *p, size_t len) { > + size_t i; > + > + for (i = 0; i < len; i += 2) { > + *to++ = (fourbit(p[i]) << 4) + fourbit(p[i + 1]); > + } > + *to = '\0'; > +} > + > +#if CS_ENABLE_TO64 > +int64_t cs_to64(const char *s) WEAK; > +int64_t cs_to64(const char *s) { > + int64_t result = 0; > + int64_t neg = 1; > + while (*s && isspace((unsigned char) *s)) s++; > + if (*s == '-') { > + neg = -1; > + s++; > + } > + while (isdigit((unsigned char) *s)) { > + result *= 10; > + result += (*s - '0'); > + s++; > + } > + return result * neg; > +} > +#endif > + > +static int str_util_lowercase(const char *s) { > + return tolower(*(const unsigned char *) s); > +} > + > +int mg_ncasecmp(const char *s1, const char *s2, size_t len) WEAK; > +int mg_ncasecmp(const char *s1, const char *s2, size_t len) { > + int diff = 0; > + > + if (len > 0) do { > + diff = str_util_lowercase(s1++) - str_util_lowercase(s2++); > + } while (diff == 0 && s1[-1] != '\0' && --len > 0); > + > + return diff; > +} > + > +int mg_casecmp(const char *s1, const char *s2) WEAK; > +int mg_casecmp(const char *s1, const char *s2) { > + return mg_ncasecmp(s1, s2, (size_t) ~0); > +} > + > +int mg_asprintf(char **buf, size_t size, const char *fmt, ...) WEAK; > +int mg_asprintf(char **buf, size_t size, const char *fmt, ...) { > + int ret; > + va_list ap; > + va_start(ap, fmt); > + ret = mg_avprintf(buf, size, fmt, ap); > + va_end(ap); > + return ret; > +} > + > +int mg_avprintf(char **buf, size_t size, const char *fmt, va_list ap) WEAK; > +int mg_avprintf(char **buf, size_t size, const char *fmt, va_list ap) { > + va_list ap_copy; > + int len; > + > + va_copy(ap_copy, ap); > + len = vsnprintf(*buf, size, fmt, ap_copy); > + va_end(ap_copy); > + > + if (len < 0) { > + /* eCos and Windows are not standard-compliant and return -1 when > + * the buffer is too small. Keep allocating larger buffers until we > + * succeed or out of memory. */ > + *buf = NULL; /* LCOV_EXCL_START */ > + while (len < 0) { > + MG_FREE(*buf); > + size *= 2; > + if ((*buf = (char *) MG_MALLOC(size)) == NULL) break; > + va_copy(ap_copy, ap); > + len = vsnprintf(*buf, size, fmt, ap_copy); > + va_end(ap_copy); > + } > + /* LCOV_EXCL_STOP */ > + } else if (len >= (int) size) { > + /* Standard-compliant code path. Allocate a buffer that is large enough. */ > + if ((*buf = (char *) MG_MALLOC(len + 1)) == NULL) { > + len = -1; /* LCOV_EXCL_LINE */ > + } else { /* LCOV_EXCL_LINE */ > + va_copy(ap_copy, ap); > + len = vsnprintf(*buf, len + 1, fmt, ap_copy); > + va_end(ap_copy); > + } > + } > + > + return len; > +} > + > +const char *mg_next_comma_list_entry(const char *, struct mg_str *, > + struct mg_str *) WEAK; > +const char *mg_next_comma_list_entry(const char *list, struct mg_str *val, > + struct mg_str *eq_val) { > + struct mg_str ret = mg_next_comma_list_entry_n(mg_mk_str(list), val, eq_val); > + return ret.p; > +} > + > +struct mg_str mg_next_comma_list_entry_n(struct mg_str list, struct mg_str *val, > + struct mg_str *eq_val) WEAK; > +struct mg_str mg_next_comma_list_entry_n(struct mg_str list, struct mg_str *val, > + struct mg_str *eq_val) { > + if (list.len == 0) { > + /* End of the list */ > + list = mg_mk_str(NULL); > + } else { > + const char *chr = NULL; > + *val = list; > + > + if ((chr = mg_strchr(*val, ',')) != NULL) { > + /* Comma found. Store length and shift the list ptr */ > + val->len = chr - val->p; > + chr++; > + list.len -= (chr - list.p); > + list.p = chr; > + } else { > + /* This value is the last one */ > + list = mg_mk_str_n(list.p + list.len, 0); > + } > + > + if (eq_val != NULL) { > + /* Value has form "x=y", adjust pointers and lengths */ > + /* so that val points to "x", and eq_val points to "y". */ > + eq_val->len = 0; > + eq_val->p = (const char *) memchr(val->p, '=', val->len); > + if (eq_val->p != NULL) { > + eq_val->p++; /* Skip over '=' character */ > + eq_val->len = val->p + val->len - eq_val->p; > + val->len = (eq_val->p - val->p) - 1; > + } > + } > + } > + > + return list; > +} > + > +int mg_match_prefix_n(const struct mg_str, const struct mg_str) WEAK; > +int mg_match_prefix_n(const struct mg_str pattern, const struct mg_str str) { > + const char *or_str; > + size_t len, i = 0, j = 0; > + int res; > + > + if ((or_str = (const char *) memchr(pattern.p, '|', pattern.len)) != NULL || > + (or_str = (const char *) memchr(pattern.p, ',', pattern.len)) != NULL) { > + struct mg_str pstr = {pattern.p, (size_t)(or_str - pattern.p)}; > + res = mg_match_prefix_n(pstr, str); > + if (res > 0) return res; > + pstr.p = or_str + 1; > + pstr.len = (pattern.p + pattern.len) - (or_str + 1); > + return mg_match_prefix_n(pstr, str); > + } > + > + for (; i < pattern.len; i++, j++) { > + if (pattern.p[i] == '?' && j != str.len) { > + continue; > + } else if (pattern.p[i] == '$') { > + return j == str.len ? (int) j : -1; > + } else if (pattern.p[i] == '*') { > + i++; > + if (i < pattern.len && pattern.p[i] == '*') { > + i++; > + len = str.len - j; > + } else { > + len = 0; > + while (j + len != str.len && str.p[j + len] != '/') { > + len++; > + } > + } > + if (i == pattern.len) { > + return j + len; > + } > + do { > + const struct mg_str pstr = {pattern.p + i, pattern.len - i}; > + const struct mg_str sstr = {str.p + j + len, str.len - j - len}; > + res = mg_match_prefix_n(pstr, sstr); > + } while (res == -1 && len-- > 0); > + return res == -1 ? -1 : (int) (j + res + len); > + } else if (str_util_lowercase(&pattern.p[i]) != > + str_util_lowercase(&str.p[j])) { > + return -1; > + } > + } > + return j; > +} > + > +int mg_match_prefix(const char *, int, const char *) WEAK; > +int mg_match_prefix(const char *pattern, int pattern_len, const char *str) { > + const struct mg_str pstr = {pattern, (size_t) pattern_len}; > + struct mg_str s = {str, 0}; > + if (str != NULL) s.len = strlen(str); > + return mg_match_prefix_n(pstr, s); > +} > + > +#endif /* EXCLUDE_COMMON */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/tun.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_MONGOOSE_SRC_TUN_H_ > +#define CS_MONGOOSE_SRC_TUN_H_ > + > +#if MG_ENABLE_TUN > + > +/* Amalgamated: #include "mongoose/src/net.h" */ > +/* Amalgamated: #include "common/mg_str.h" */ > + > +#ifndef MG_TUN_RECONNECT_INTERVAL > +#define MG_TUN_RECONNECT_INTERVAL 1 > +#endif > + > +#define MG_TUN_PROTO_NAME "mg_tun" > + > +#define MG_TUN_DATA_FRAME 0x0 > +#define MG_TUN_F_END_STREAM 0x1 > + > +/* > + * MG TUN frame format is loosely based on HTTP/2. > + * However since the communication happens via WebSocket > + * there is no need to encode the frame length, since that's > + * solved by WebSocket framing. > + * > + * TODO(mkm): Detailed description of the protocol. > + */ > +struct mg_tun_frame { > + uint8_t type; > + uint8_t flags; > + uint32_t stream_id; /* opaque stream identifier */ > + struct mg_str body; > +}; > + > +struct mg_tun_ssl_opts { > +#if MG_ENABLE_SSL > + const char *ssl_cert; > + const char *ssl_key; > + const char *ssl_ca_cert; > +#else > + int dummy; /* some compilers don't like empty structs */ > +#endif > +}; > + > +struct mg_tun_client { > + struct mg_mgr *mgr; > + struct mg_iface *iface; > + const char *disp_url; > + struct mg_tun_ssl_opts ssl; > + > + uint32_t last_stream_id; /* stream id of most recently accepted connection */ > + > + struct mg_connection *disp; > + struct mg_connection *listener; > + struct mg_connection *reconnect; > +}; > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +struct mg_connection *mg_tun_bind_opt(struct mg_mgr *mgr, > + const char *dispatcher, > + MG_CB(mg_event_handler_t handler, > + void *user_data), > + struct mg_bind_opts opts); > + > +int mg_tun_parse_frame(void *data, size_t len, struct mg_tun_frame *frame); > + > +void mg_tun_send_frame(struct mg_connection *ws, uint32_t stream_id, > + uint8_t type, uint8_t flags, struct mg_str msg); > + > +void mg_tun_destroy_client(struct mg_tun_client *client); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* MG_ENABLE_TUN */ > + > +#endif /* CS_MONGOOSE_SRC_TUN_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/net.c" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + * > + * This software is dual-licensed: you can redistribute it and/or modify > + * it under the terms of the GNU General Public License version 2 as > + * published by the Free Software Foundation. For the terms of this > + * license, see <http://www.gnu.org/licenses/>. > + * > + * You are free to use this software under the terms of the GNU General > + * Public License, but WITHOUT ANY WARRANTY; without even the implied > + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. > + * See the GNU General Public License for more details. > + * > + * Alternatively, you can license this software under a commercial > + * license, as set out in <https://www.cesanta.com/license>. > + */ > + > +/* Amalgamated: #include "common/cs_time.h" */ > +/* Amalgamated: #include "mongoose/src/dns.h" */ > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/resolv.h" */ > +/* Amalgamated: #include "mongoose/src/util.h" */ > +/* Amalgamated: #include "mongoose/src/tun.h" */ > + > +#define MG_MAX_HOST_LEN 200 > + > +#define MG_COPY_COMMON_CONNECTION_OPTIONS(dst, src) \ > + memcpy(dst, src, sizeof(*dst)); > + > +/* Which flags can be pre-set by the user at connection creation time. */ > +#define _MG_ALLOWED_CONNECT_FLAGS_MASK \ > + (MG_F_USER_1 | MG_F_USER_2 | MG_F_USER_3 | MG_F_USER_4 | MG_F_USER_5 | \ > + MG_F_USER_6 | MG_F_WEBSOCKET_NO_DEFRAG | MG_F_ENABLE_BROADCAST) > +/* Which flags should be modifiable by user's callbacks. */ > +#define _MG_CALLBACK_MODIFIABLE_FLAGS_MASK \ > + (MG_F_USER_1 | MG_F_USER_2 | MG_F_USER_3 | MG_F_USER_4 | MG_F_USER_5 | \ > + MG_F_USER_6 | MG_F_WEBSOCKET_NO_DEFRAG | MG_F_SEND_AND_CLOSE | \ > + MG_F_CLOSE_IMMEDIATELY | MG_F_IS_WEBSOCKET | MG_F_DELETE_CHUNK) > + > +#ifndef intptr_t > +#define intptr_t long > +#endif > + > +MG_INTERNAL void mg_add_conn(struct mg_mgr *mgr, struct mg_connection *c) { > + DBG(("%p %p", mgr, c)); > + c->mgr = mgr; > + c->next = mgr->active_connections; > + mgr->active_connections = c; > + c->prev = NULL; > + if (c->next != NULL) c->next->prev = c; > + if (c->sock != INVALID_SOCKET) { > + c->iface->vtable->add_conn(c); > + } > +} > + > +MG_INTERNAL void mg_remove_conn(struct mg_connection *conn) { > + if (conn->prev == NULL) conn->mgr->active_connections = conn->next; > + if (conn->prev) conn->prev->next = conn->next; > + if (conn->next) conn->next->prev = conn->prev; > + conn->prev = conn->next = NULL; > + conn->iface->vtable->remove_conn(conn); > +} > + > +MG_INTERNAL void mg_call(struct mg_connection *nc, > + mg_event_handler_t ev_handler, void *user_data, int ev, > + void *ev_data) { > + static int nesting_level = 0; > + nesting_level++; > + if (ev_handler == NULL) { > + /* > + * If protocol handler is specified, call it. Otherwise, call user-specified > + * event handler. > + */ > + ev_handler = nc->proto_handler ? nc->proto_handler : nc->handler; > + } > + if (ev != MG_EV_POLL) { > + DBG(("%p %s ev=%d ev_data=%p flags=%lu rmbl=%d smbl=%d", nc, > + ev_handler == nc->handler ? "user" : "proto", ev, ev_data, nc->flags, > + (int) nc->recv_mbuf.len, (int) nc->send_mbuf.len)); > + } > + > +#if !defined(NO_LIBC) && MG_ENABLE_HEXDUMP > + if (nc->mgr->hexdump_file != NULL && ev != MG_EV_POLL && ev != MG_EV_RECV && > + ev != MG_EV_SEND /* handled separately */) { > + mg_hexdump_connection(nc, nc->mgr->hexdump_file, NULL, 0, ev); > + } > +#endif > + if (ev_handler != NULL) { > + unsigned long flags_before = nc->flags; > + size_t recv_mbuf_before = nc->recv_mbuf.len, recved; > + ev_handler(nc, ev, ev_data MG_UD_ARG(user_data)); > + recved = (recv_mbuf_before - nc->recv_mbuf.len); > + /* Prevent user handler from fiddling with system flags. */ > + if (ev_handler == nc->handler && nc->flags != flags_before) { > + nc->flags = (flags_before & ~_MG_CALLBACK_MODIFIABLE_FLAGS_MASK) | > + (nc->flags & _MG_CALLBACK_MODIFIABLE_FLAGS_MASK); > + } > + /* It's important to not double-count recved bytes, and since mg_call can be > + * called recursively (e.g. proto_handler invokes user handler), we keep > + * track of recursion and only report received bytes at the top level. */ > + if (nesting_level == 1 && recved > 0 && !(nc->flags & MG_F_UDP)) { > + nc->iface->vtable->recved(nc, recved); > + } > + } > + if (ev != MG_EV_POLL) { > + DBG(("%p after %s flags=%lu rmbl=%d smbl=%d", nc, > + ev_handler == nc->handler ? "user" : "proto", nc->flags, > + (int) nc->recv_mbuf.len, (int) nc->send_mbuf.len)); > + } > + nesting_level--; > +#if !MG_ENABLE_CALLBACK_USERDATA > + (void) user_data; > +#endif > +} > + > +void mg_if_timer(struct mg_connection *c, double now) { > + if (c->ev_timer_time > 0 && now >= c->ev_timer_time) { > + double old_value = c->ev_timer_time; > + c->ev_timer_time = 0; > + mg_call(c, NULL, c->user_data, MG_EV_TIMER, &old_value); > + } > +} > + > +void mg_if_poll(struct mg_connection *nc, time_t now) { > + if (!(nc->flags & MG_F_SSL) || (nc->flags & MG_F_SSL_HANDSHAKE_DONE)) { > + mg_call(nc, NULL, nc->user_data, MG_EV_POLL, &now); > + } > +} > + > +void mg_destroy_conn(struct mg_connection *conn, int destroy_if) { > + if (destroy_if) conn->iface->vtable->destroy_conn(conn); > + if (conn->proto_data != NULL && conn->proto_data_destructor != NULL) { > + conn->proto_data_destructor(conn->proto_data); > + } > +#if MG_ENABLE_SSL > + mg_ssl_if_conn_free(conn); > +#endif > + mbuf_free(&conn->recv_mbuf); > + mbuf_free(&conn->send_mbuf); > + > + memset(conn, 0, sizeof(*conn)); > + MG_FREE(conn); > +} > + > +void mg_close_conn(struct mg_connection *conn) { > + DBG(("%p %lu %d", conn, conn->flags, conn->sock)); > +#if MG_ENABLE_SSL > + if (conn->flags & MG_F_SSL_HANDSHAKE_DONE) { > + mg_ssl_if_conn_close_notify(conn); > + } > +#endif > + mg_remove_conn(conn); > + conn->iface->vtable->destroy_conn(conn); > + mg_call(conn, NULL, conn->user_data, MG_EV_CLOSE, NULL); > + mg_destroy_conn(conn, 0 /* destroy_if */); > +} > + > +void mg_mgr_init(struct mg_mgr *m, void *user_data) { > + struct mg_mgr_init_opts opts; > + memset(&opts, 0, sizeof(opts)); > + mg_mgr_init_opt(m, user_data, opts); > +} > + > +void mg_mgr_init_opt(struct mg_mgr *m, void *user_data, > + struct mg_mgr_init_opts opts) { > + memset(m, 0, sizeof(*m)); > +#if MG_ENABLE_BROADCAST > + m->ctl[0] = m->ctl[1] = INVALID_SOCKET; > +#endif > + m->user_data = user_data; > + > +#ifdef _WIN32 > + { > + WSADATA data; > + WSAStartup(MAKEWORD(2, 2), &data); > + } > +#elif defined(__unix__) > + /* Ignore SIGPIPE signal, so if client cancels the request, it > + * won't kill the whole process. */ > + signal(SIGPIPE, SIG_IGN); > +#endif > + > +#if MG_ENABLE_SSL > + { > + static int init_done; > + if (!init_done) { > + mg_ssl_if_init(); > + init_done++; > + } > + } > +#endif > + { > + int i; > + if (opts.num_ifaces == 0) { > + opts.num_ifaces = mg_num_ifaces; > + opts.ifaces = mg_ifaces; > + } > + if (opts.main_iface != NULL) { > + opts.ifaces[MG_MAIN_IFACE] = opts.main_iface; > + } > + m->num_ifaces = opts.num_ifaces; > + m->ifaces = > + (struct mg_iface **) MG_MALLOC(sizeof(*m->ifaces) * opts.num_ifaces); > + for (i = 0; i < mg_num_ifaces; i++) { > + m->ifaces[i] = mg_if_create_iface(opts.ifaces[i], m); > + m->ifaces[i]->vtable->init(m->ifaces[i]); > + } > + } > + if (opts.nameserver != NULL) { > + m->nameserver = strdup(opts.nameserver); > + } > + DBG(("==================================")); > + DBG(("init mgr=%p", m)); > +} > + > +void mg_mgr_free(struct mg_mgr *m) { > + struct mg_connection *conn, *tmp_conn; > + > + DBG(("%p", m)); > + if (m == NULL) return; > + /* Do one last poll, see https://github.com/cesanta/mongoose/issues/286 */ > + mg_mgr_poll(m, 0); > + > +#if MG_ENABLE_BROADCAST > + if (m->ctl[0] != INVALID_SOCKET) closesocket(m->ctl[0]); > + if (m->ctl[1] != INVALID_SOCKET) closesocket(m->ctl[1]); > + m->ctl[0] = m->ctl[1] = INVALID_SOCKET; > +#endif > + > + for (conn = m->active_connections; conn != NULL; conn = tmp_conn) { > + tmp_conn = conn->next; > + mg_close_conn(conn); > + } > + > + { > + int i; > + for (i = 0; i < m->num_ifaces; i++) { > + m->ifaces[i]->vtable->free(m->ifaces[i]); > + MG_FREE(m->ifaces[i]); > + } > + MG_FREE(m->ifaces); > + } > + > + MG_FREE((char *) m->nameserver); > +} > + > +time_t mg_mgr_poll(struct mg_mgr *m, int timeout_ms) { > + int i; > + time_t now = 0; /* oh GCC, seriously ? */ > + > + if (m->num_ifaces == 0) { > + LOG(LL_ERROR, ("cannot poll: no interfaces")); > + return 0; > + } > + > + for (i = 0; i < m->num_ifaces; i++) { > + now = m->ifaces[i]->vtable->poll(m->ifaces[i], timeout_ms); > + } > + return now; > +} > + > +int mg_vprintf(struct mg_connection *nc, const char *fmt, va_list ap) { > + char mem[MG_VPRINTF_BUFFER_SIZE], *buf = mem; > + int len; > + > + if ((len = mg_avprintf(&buf, sizeof(mem), fmt, ap)) > 0) { > + mg_send(nc, buf, len); > + } > + if (buf != mem && buf != NULL) { > + MG_FREE(buf); /* LCOV_EXCL_LINE */ > + } /* LCOV_EXCL_LINE */ > + > + return len; > +} > + > +int mg_printf(struct mg_connection *conn, const char *fmt, ...) { > + int len; > + va_list ap; > + va_start(ap, fmt); > + len = mg_vprintf(conn, fmt, ap); > + va_end(ap); > + return len; > +} > + > +#if MG_ENABLE_SYNC_RESOLVER > +/* TODO(lsm): use non-blocking resolver */ > +static int mg_resolve2(const char *host, struct in_addr *ina) { > +#if MG_ENABLE_GETADDRINFO > + int rv = 0; > + struct addrinfo hints, *servinfo, *p; > + struct sockaddr_in *h = NULL; > + memset(&hints, 0, sizeof hints); > + hints.ai_family = AF_INET; > + hints.ai_socktype = SOCK_STREAM; > + if ((rv = getaddrinfo(host, NULL, NULL, &servinfo)) != 0) { > + DBG(("getaddrinfo(%s) failed: %s", host, strerror(mg_get_errno()))); > + return 0; > + } > + for (p = servinfo; p != NULL; p = p->ai_next) { > + memcpy(&h, &p->ai_addr, sizeof(struct sockaddr_in *)); > + memcpy(ina, &h->sin_addr, sizeof(ina)); > + } > + freeaddrinfo(servinfo); > + return 1; > +#else > + struct hostent *he; > + if ((he = gethostbyname(host)) == NULL) { > + DBG(("gethostbyname(%s) failed: %s", host, strerror(mg_get_errno()))); > + } else { > + memcpy(ina, he->h_addr_list[0], sizeof(*ina)); > + return 1; > + } > + return 0; > +#endif /* MG_ENABLE_GETADDRINFO */ > +} > + > +int mg_resolve(const char *host, char *buf, size_t n) { > + struct in_addr ad; > + return mg_resolve2(host, &ad) ? snprintf(buf, n, "%s", inet_ntoa(ad)) : 0; > +} > +#endif /* MG_ENABLE_SYNC_RESOLVER */ > + > +MG_INTERNAL struct mg_connection *mg_create_connection_base( > + struct mg_mgr *mgr, mg_event_handler_t callback, > + struct mg_add_sock_opts opts) { > + struct mg_connection *conn; > + > + if ((conn = (struct mg_connection *) MG_CALLOC(1, sizeof(*conn))) != NULL) { > + conn->sock = INVALID_SOCKET; > + conn->handler = callback; > + conn->mgr = mgr; > + conn->last_io_time = (time_t) mg_time(); > + conn->iface = > + (opts.iface != NULL ? opts.iface : mgr->ifaces[MG_MAIN_IFACE]); > + conn->flags = opts.flags & _MG_ALLOWED_CONNECT_FLAGS_MASK; > + conn->user_data = opts.user_data; > + /* > + * SIZE_MAX is defined as a long long constant in > + * system headers on some platforms and so it > + * doesn't compile with pedantic ansi flags. > + */ > + conn->recv_mbuf_limit = ~0; > + } else { > + MG_SET_PTRPTR(opts.error_string, "failed to create connection"); > + } > + > + return conn; > +} > + > +MG_INTERNAL struct mg_connection *mg_create_connection( > + struct mg_mgr *mgr, mg_event_handler_t callback, > + struct mg_add_sock_opts opts) { > + struct mg_connection *conn = mg_create_connection_base(mgr, callback, opts); > + > + if (conn != NULL && !conn->iface->vtable->create_conn(conn)) { > + MG_FREE(conn); > + conn = NULL; > + } > + if (conn == NULL) { > + MG_SET_PTRPTR(opts.error_string, "failed to init connection"); > + } > + > + return conn; > +} > + > +/* > + * Address format: [PROTO://][HOST]:PORT > + * > + * HOST could be IPv4/IPv6 address or a host name. > + * `host` is a destination buffer to hold parsed HOST part. Should be at least > + * MG_MAX_HOST_LEN bytes long. > + * `proto` is a returned socket type, either SOCK_STREAM or SOCK_DGRAM > + * > + * Return: > + * -1 on parse error > + * 0 if HOST needs DNS lookup > + * >0 length of the address string > + */ > +MG_INTERNAL int mg_parse_address(const char *str, union socket_address *sa, > + int *proto, char *host, size_t host_len) { > + unsigned int a, b, c, d, port = 0; > + int ch, len = 0; > +#if MG_ENABLE_IPV6 > + char buf[100]; > +#endif > + > + /* > + * MacOS needs that. If we do not zero it, subsequent bind() will fail. > + * Also, all-zeroes in the socket address means binding to all addresses > + * for both IPv4 and IPv6 (INADDR_ANY and IN6ADDR_ANY_INIT). > + */ > + memset(sa, 0, sizeof(*sa)); > + sa->sin.sin_family = AF_INET; > + > + *proto = SOCK_STREAM; > + > + if (strncmp(str, "udp://", 6) == 0) { > + str += 6; > + *proto = SOCK_DGRAM; > + } else if (strncmp(str, "tcp://", 6) == 0) { > + str += 6; > + } > + > + if (sscanf(str, "%u.%u.%u.%u:%u%n", &a, &b, &c, &d, &port, &len) == 5) { > + /* Bind to a specific IPv4 address, e.g. 192.168.1.5:8080 */ > + sa->sin.sin_addr.s_addr = > + htonl(((uint32_t) a << 24) | ((uint32_t) b << 16) | c << 8 | d); > + sa->sin.sin_port = htons((uint16_t) port); > +#if MG_ENABLE_IPV6 > + } else if (sscanf(str, "[%99[^]]]:%u%n", buf, &port, &len) == 2 && > + inet_pton(AF_INET6, buf, &sa->sin6.sin6_addr)) { > + /* IPv6 address, e.g. [3ffe:2a00:100:7031::1]:8080 */ > + sa->sin6.sin6_family = AF_INET6; > + sa->sin.sin_port = htons((uint16_t) port); > +#endif > +#if MG_ENABLE_ASYNC_RESOLVER > + } else if (strlen(str) < host_len && > + sscanf(str, "%[^ :]:%u%n", host, &port, &len) == 2) { > + sa->sin.sin_port = htons((uint16_t) port); > + if (mg_resolve_from_hosts_file(host, sa) != 0) { > + /* > + * if resolving from hosts file failed and the host > + * we are trying to resolve is `localhost` - we should > + * try to resolve it using `gethostbyname` and do not try > + * to resolve it via DNS server if gethostbyname has failed too > + */ > + if (mg_ncasecmp(host, "localhost", 9) != 0) { > + return 0; > + } > + > +#if MG_ENABLE_SYNC_RESOLVER > + if (!mg_resolve2(host, &sa->sin.sin_addr)) { > + return -1; > + } > +#else > + return -1; > +#endif > + } > +#endif > + } else if (sscanf(str, ":%u%n", &port, &len) == 1 || > + sscanf(str, "%u%n", &port, &len) == 1) { > + /* If only port is specified, bind to IPv4, INADDR_ANY */ > + sa->sin.sin_port = htons((uint16_t) port); > + } else { > + return -1; > + } > + > + /* Required for MG_ENABLE_ASYNC_RESOLVER=0 */ > + (void) host; > + (void) host_len; > + > + ch = str[len]; /* Character that follows the address */ > + return port < 0xffffUL && (ch == '\0' || ch == ',' || isspace(ch)) ? len : -1; > +} > + > +struct mg_connection *mg_if_accept_new_conn(struct mg_connection *lc) { > + struct mg_add_sock_opts opts; > + struct mg_connection *nc; > + memset(&opts, 0, sizeof(opts)); > + nc = mg_create_connection(lc->mgr, lc->handler, opts); > + if (nc == NULL) return NULL; > + nc->listener = lc; > + nc->proto_handler = lc->proto_handler; > + nc->user_data = lc->user_data; > + nc->recv_mbuf_limit = lc->recv_mbuf_limit; > + nc->iface = lc->iface; > + if (lc->flags & MG_F_SSL) nc->flags |= MG_F_SSL; > + mg_add_conn(nc->mgr, nc); > + DBG(("%p %p %d %d", lc, nc, nc->sock, (int) nc->flags)); > + return nc; > +} > + > +void mg_if_accept_tcp_cb(struct mg_connection *nc, union socket_address *sa, > + size_t sa_len) { > + (void) sa_len; > + nc->sa = *sa; > + mg_call(nc, NULL, nc->user_data, MG_EV_ACCEPT, &nc->sa); > +} > + > +void mg_send(struct mg_connection *nc, const void *buf, int len) { > + nc->last_io_time = (time_t) mg_time(); > + if (nc->flags & MG_F_UDP) { > + nc->iface->vtable->udp_send(nc, buf, len); > + } else { > + nc->iface->vtable->tcp_send(nc, buf, len); > + } > +} > + > +void mg_if_sent_cb(struct mg_connection *nc, int num_sent) { > + DBG(("%p %d", nc, num_sent)); > +#if !defined(NO_LIBC) && MG_ENABLE_HEXDUMP > + if (nc->mgr && nc->mgr->hexdump_file != NULL) { > + char *buf = nc->send_mbuf.buf; > + mg_hexdump_connection(nc, nc->mgr->hexdump_file, buf, num_sent, MG_EV_SEND); > + } > +#endif > + if (num_sent < 0) { > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + } else { > + mbuf_remove(&nc->send_mbuf, num_sent); > + mbuf_trim(&nc->send_mbuf); > + } > + mg_call(nc, NULL, nc->user_data, MG_EV_SEND, &num_sent); > +} > + > +MG_INTERNAL void mg_recv_common(struct mg_connection *nc, void *buf, int len, > + int own) { > + DBG(("%p %d %u", nc, len, (unsigned int) nc->recv_mbuf.len)); > + > +#if !defined(NO_LIBC) && MG_ENABLE_HEXDUMP > + if (nc->mgr && nc->mgr->hexdump_file != NULL) { > + mg_hexdump_connection(nc, nc->mgr->hexdump_file, buf, len, MG_EV_RECV); > + } > +#endif > + > + if (nc->flags & MG_F_CLOSE_IMMEDIATELY) { > + DBG(("%p discarded %d bytes", nc, len)); > + /* > + * This connection will not survive next poll. Do not deliver events, > + * send data to /dev/null without acking. > + */ > + if (own) { > + MG_FREE(buf); > + } > + return; > + } > + nc->last_io_time = (time_t) mg_time(); > + if (!own) { > + mbuf_append(&nc->recv_mbuf, buf, len); > + } else if (nc->recv_mbuf.len == 0) { > + /* Adopt buf as recv_mbuf's backing store. */ > + mbuf_free(&nc->recv_mbuf); > + nc->recv_mbuf.buf = (char *) buf; > + nc->recv_mbuf.size = nc->recv_mbuf.len = len; > + } else { > + mbuf_append(&nc->recv_mbuf, buf, len); > + MG_FREE(buf); > + } > + mg_call(nc, NULL, nc->user_data, MG_EV_RECV, &len); > +} > + > +void mg_if_recv_tcp_cb(struct mg_connection *nc, void *buf, int len, int own) { > + mg_recv_common(nc, buf, len, own); > +} > + > +void mg_if_recv_udp_cb(struct mg_connection *nc, void *buf, int len, > + union socket_address *sa, size_t sa_len) { > + assert(nc->flags & MG_F_UDP); > + DBG(("%p %u", nc, (unsigned int) len)); > + if (nc->flags & MG_F_LISTENING) { > + struct mg_connection *lc = nc; > + /* > + * Do we have an existing connection for this source? > + * This is very inefficient for long connection lists. > + */ > + for (nc = mg_next(lc->mgr, NULL); nc != NULL; nc = mg_next(lc->mgr, nc)) { > + if (memcmp(&nc->sa.sa, &sa->sa, sa_len) == 0 && nc->listener == lc) { > + break; > + } > + } > + if (nc == NULL) { > + struct mg_add_sock_opts opts; > + memset(&opts, 0, sizeof(opts)); > + /* Create fake connection w/out sock initialization */ > + nc = mg_create_connection_base(lc->mgr, lc->handler, opts); > + if (nc != NULL) { > + nc->sock = lc->sock; > + nc->listener = lc; > + nc->sa = *sa; > + nc->proto_handler = lc->proto_handler; > + nc->user_data = lc->user_data; > + nc->recv_mbuf_limit = lc->recv_mbuf_limit; > + nc->flags = MG_F_UDP; > + /* > + * Long-lived UDP "connections" i.e. interactions that involve more > + * than one request and response are rare, most are transactional: > + * response is sent and the "connection" is closed. Or - should be. > + * But users (including ourselves) tend to forget about that part, > + * because UDP is connectionless and one does not think about > + * processing a UDP request as handling a connection that needs to be > + * closed. Thus, we begin with SEND_AND_CLOSE flag set, which should > + * be a reasonable default for most use cases, but it is possible to > + * turn it off the connection should be kept alive after processing. > + */ > + nc->flags |= MG_F_SEND_AND_CLOSE; > + mg_add_conn(lc->mgr, nc); > + mg_call(nc, NULL, nc->user_data, MG_EV_ACCEPT, &nc->sa); > + } else { > + DBG(("OOM")); > + /* No return here, we still need to drop on the floor */ > + } > + } > + } > + if (nc != NULL) { > + mg_recv_common(nc, buf, len, 1); > + } else { > + /* Drop on the floor. */ > + MG_FREE(buf); > + nc->iface->vtable->recved(nc, len); > + } > +} > + > +/* > + * Schedules an async connect for a resolved address and proto. > + * Called from two places: `mg_connect_opt()` and from async resolver. > + * When called from the async resolver, it must trigger `MG_EV_CONNECT` event > + * with a failure flag to indicate connection failure. > + */ > +MG_INTERNAL struct mg_connection *mg_do_connect(struct mg_connection *nc, > + int proto, > + union socket_address *sa) { > + DBG(("%p %s://%s:%hu", nc, proto == SOCK_DGRAM ? "udp" : "tcp", > + inet_ntoa(sa->sin.sin_addr), ntohs(sa->sin.sin_port))); > + > + nc->flags |= MG_F_CONNECTING; > + if (proto == SOCK_DGRAM) { > + nc->iface->vtable->connect_udp(nc); > + } else { > + nc->iface->vtable->connect_tcp(nc, sa); > + } > + mg_add_conn(nc->mgr, nc); > + return nc; > +} > + > +void mg_if_connect_cb(struct mg_connection *nc, int err) { > + DBG(("%p connect, err=%d", nc, err)); > + nc->flags &= ~MG_F_CONNECTING; > + if (err != 0) { > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > + mg_call(nc, NULL, nc->user_data, MG_EV_CONNECT, &err); > +} > + > +#if MG_ENABLE_ASYNC_RESOLVER > +/* > + * Callback for the async resolver on mg_connect_opt() call. > + * Main task of this function is to trigger MG_EV_CONNECT event with > + * either failure (and dealloc the connection) > + * or success (and proceed with connect() > + */ > +static void resolve_cb(struct mg_dns_message *msg, void *data, > + enum mg_resolve_err e) { > + struct mg_connection *nc = (struct mg_connection *) data; > + int i; > + int failure = -1; > + > + nc->flags &= ~MG_F_RESOLVING; > + if (msg != NULL) { > + /* > + * Take the first DNS A answer and run... > + */ > + for (i = 0; i < msg->num_answers; i++) { > + if (msg->answers[i].rtype == MG_DNS_A_RECORD) { > + /* > + * Async resolver guarantees that there is at least one answer. > + * TODO(lsm): handle IPv6 answers too > + */ > + mg_dns_parse_record_data(msg, &msg->answers[i], &nc->sa.sin.sin_addr, > + 4); > + mg_do_connect(nc, nc->flags & MG_F_UDP ? SOCK_DGRAM : SOCK_STREAM, > + &nc->sa); > + return; > + } > + } > + } > + > + if (e == MG_RESOLVE_TIMEOUT) { > + double now = mg_time(); > + mg_call(nc, NULL, nc->user_data, MG_EV_TIMER, &now); > + } > + > + /* > + * If we get there was no MG_DNS_A_RECORD in the answer > + */ > + mg_call(nc, NULL, nc->user_data, MG_EV_CONNECT, &failure); > + mg_call(nc, NULL, nc->user_data, MG_EV_CLOSE, NULL); > + mg_destroy_conn(nc, 1 /* destroy_if */); > +} > +#endif > + > +struct mg_connection *mg_connect(struct mg_mgr *mgr, const char *address, > + MG_CB(mg_event_handler_t callback, > + void *user_data)) { > + struct mg_connect_opts opts; > + memset(&opts, 0, sizeof(opts)); > + return mg_connect_opt(mgr, address, MG_CB(callback, user_data), opts); > +} > + > +struct mg_connection *mg_connect_opt(struct mg_mgr *mgr, const char *address, > + MG_CB(mg_event_handler_t callback, > + void *user_data), > + struct mg_connect_opts opts) { > + struct mg_connection *nc = NULL; > + int proto, rc; > + struct mg_add_sock_opts add_sock_opts; > + char host[MG_MAX_HOST_LEN]; > + > + MG_COPY_COMMON_CONNECTION_OPTIONS(&add_sock_opts, &opts); > + > + if ((nc = mg_create_connection(mgr, callback, add_sock_opts)) == NULL) { > + return NULL; > + } > + > + if ((rc = mg_parse_address(address, &nc->sa, &proto, host, sizeof(host))) < > + 0) { > + /* Address is malformed */ > + MG_SET_PTRPTR(opts.error_string, "cannot parse address"); > + mg_destroy_conn(nc, 1 /* destroy_if */); > + return NULL; > + } > + > + nc->flags |= opts.flags & _MG_ALLOWED_CONNECT_FLAGS_MASK; > + nc->flags |= (proto == SOCK_DGRAM) ? MG_F_UDP : 0; > +#if MG_ENABLE_CALLBACK_USERDATA > + nc->user_data = user_data; > +#else > + nc->user_data = opts.user_data; > +#endif > + > +#if MG_ENABLE_SSL > + DBG(("%p %s %s,%s,%s", nc, address, (opts.ssl_cert ? opts.ssl_cert : "-"), > + (opts.ssl_key ? opts.ssl_key : "-"), > + (opts.ssl_ca_cert ? opts.ssl_ca_cert : "-"))); > + > + if (opts.ssl_cert != NULL || opts.ssl_ca_cert != NULL || > + opts.ssl_psk_identity != NULL) { > + const char *err_msg = NULL; > + struct mg_ssl_if_conn_params params; > + if (nc->flags & MG_F_UDP) { > + MG_SET_PTRPTR(opts.error_string, "SSL for UDP is not supported"); > + mg_destroy_conn(nc, 1 /* destroy_if */); > + return NULL; > + } > + memset(¶ms, 0, sizeof(params)); > + params.cert = opts.ssl_cert; > + params.key = opts.ssl_key; > + params.ca_cert = opts.ssl_ca_cert; > + params.cipher_suites = opts.ssl_cipher_suites; > + params.psk_identity = opts.ssl_psk_identity; > + params.psk_key = opts.ssl_psk_key; > + if (opts.ssl_ca_cert != NULL) { > + if (opts.ssl_server_name != NULL) { > + if (strcmp(opts.ssl_server_name, "*") != 0) { > + params.server_name = opts.ssl_server_name; > + } > + } else if (rc == 0) { /* If it's a DNS name, use host. */ > + params.server_name = host; > + } > + } > + if (mg_ssl_if_conn_init(nc, ¶ms, &err_msg) != MG_SSL_OK) { > + MG_SET_PTRPTR(opts.error_string, err_msg); > + mg_destroy_conn(nc, 1 /* destroy_if */); > + return NULL; > + } > + nc->flags |= MG_F_SSL; > + } > +#endif /* MG_ENABLE_SSL */ > + > + if (rc == 0) { > +#if MG_ENABLE_ASYNC_RESOLVER > + /* > + * DNS resolution is required for host. > + * mg_parse_address() fills port in nc->sa, which we pass to resolve_cb() > + */ > + struct mg_connection *dns_conn = NULL; > + struct mg_resolve_async_opts o; > + memset(&o, 0, sizeof(o)); > + o.dns_conn = &dns_conn; > + o.nameserver = opts.nameserver; > + if (mg_resolve_async_opt(nc->mgr, host, MG_DNS_A_RECORD, resolve_cb, nc, > + o) != 0) { > + MG_SET_PTRPTR(opts.error_string, "cannot schedule DNS lookup"); > + mg_destroy_conn(nc, 1 /* destroy_if */); > + return NULL; > + } > + nc->priv_2 = dns_conn; > + nc->flags |= MG_F_RESOLVING; > + return nc; > +#else > + MG_SET_PTRPTR(opts.error_string, "Resolver is disabled"); > + mg_destroy_conn(nc, 1 /* destroy_if */); > + return NULL; > +#endif > + } else { > + /* Address is parsed and resolved to IP. proceed with connect() */ > + return mg_do_connect(nc, proto, &nc->sa); > + } > +} > + > +struct mg_connection *mg_bind(struct mg_mgr *srv, const char *address, > + MG_CB(mg_event_handler_t event_handler, > + void *user_data)) { > + struct mg_bind_opts opts; > + memset(&opts, 0, sizeof(opts)); > + return mg_bind_opt(srv, address, MG_CB(event_handler, user_data), opts); > +} > + > +struct mg_connection *mg_bind_opt(struct mg_mgr *mgr, const char *address, > + MG_CB(mg_event_handler_t callback, > + void *user_data), > + struct mg_bind_opts opts) { > + union socket_address sa; > + struct mg_connection *nc = NULL; > + int proto, rc; > + struct mg_add_sock_opts add_sock_opts; > + char host[MG_MAX_HOST_LEN]; > + > +#if MG_ENABLE_CALLBACK_USERDATA > + opts.user_data = user_data; > +#endif > + > + MG_COPY_COMMON_CONNECTION_OPTIONS(&add_sock_opts, &opts); > + > +#if MG_ENABLE_TUN > + if (mg_strncmp(mg_mk_str(address), mg_mk_str("ws://"), 5) == 0 || > + mg_strncmp(mg_mk_str(address), mg_mk_str("wss://"), 6) == 0) { > + return mg_tun_bind_opt(mgr, address, MG_CB(callback, user_data), opts); > + } > +#endif > + > + if (mg_parse_address(address, &sa, &proto, host, sizeof(host)) <= 0) { > + MG_SET_PTRPTR(opts.error_string, "cannot parse address"); > + return NULL; > + } > + > + nc = mg_create_connection(mgr, callback, add_sock_opts); > + if (nc == NULL) { > + return NULL; > + } > + > + nc->sa = sa; > + nc->flags |= MG_F_LISTENING; > + if (proto == SOCK_DGRAM) nc->flags |= MG_F_UDP; > + > +#if MG_ENABLE_SSL > + DBG(("%p %s %s,%s,%s", nc, address, (opts.ssl_cert ? opts.ssl_cert : "-"), > + (opts.ssl_key ? opts.ssl_key : "-"), > + (opts.ssl_ca_cert ? opts.ssl_ca_cert : "-"))); > + > + if (opts.ssl_cert != NULL || opts.ssl_ca_cert != NULL) { > + const char *err_msg = NULL; > + struct mg_ssl_if_conn_params params; > + if (nc->flags & MG_F_UDP) { > + MG_SET_PTRPTR(opts.error_string, "SSL for UDP is not supported"); > + mg_destroy_conn(nc, 1 /* destroy_if */); > + return NULL; > + } > + memset(¶ms, 0, sizeof(params)); > + params.cert = opts.ssl_cert; > + params.key = opts.ssl_key; > + params.ca_cert = opts.ssl_ca_cert; > + params.cipher_suites = opts.ssl_cipher_suites; > + if (mg_ssl_if_conn_init(nc, ¶ms, &err_msg) != MG_SSL_OK) { > + MG_SET_PTRPTR(opts.error_string, err_msg); > + mg_destroy_conn(nc, 1 /* destroy_if */); > + return NULL; > + } > + nc->flags |= MG_F_SSL; > + } > +#endif /* MG_ENABLE_SSL */ > + > + if (nc->flags & MG_F_UDP) { > + rc = nc->iface->vtable->listen_udp(nc, &nc->sa); > + } else { > + rc = nc->iface->vtable->listen_tcp(nc, &nc->sa); > + } > + if (rc != 0) { > + DBG(("Failed to open listener: %d", rc)); > + MG_SET_PTRPTR(opts.error_string, "failed to open listener"); > + mg_destroy_conn(nc, 1 /* destroy_if */); > + return NULL; > + } > + mg_add_conn(nc->mgr, nc); > + > + return nc; > +} > + > +struct mg_connection *mg_next(struct mg_mgr *s, struct mg_connection *conn) { > + return conn == NULL ? s->active_connections : conn->next; > +} > + > +#if MG_ENABLE_BROADCAST > +void mg_broadcast(struct mg_mgr *mgr, mg_event_handler_t cb, void *data, > + size_t len) { > + struct ctl_msg ctl_msg; > + > + /* > + * Mongoose manager has a socketpair, `struct mg_mgr::ctl`, > + * where `mg_broadcast()` pushes the message. > + * `mg_mgr_poll()` wakes up, reads a message from the socket pair, and calls > + * specified callback for each connection. Thus the callback function executes > + * in event manager thread. > + */ > + if (mgr->ctl[0] != INVALID_SOCKET && data != NULL && > + len < sizeof(ctl_msg.message)) { > + size_t dummy; > + > + ctl_msg.callback = cb; > + memcpy(ctl_msg.message, data, len); > + dummy = MG_SEND_FUNC(mgr->ctl[0], (char *) &ctl_msg, > + offsetof(struct ctl_msg, message) + len, 0); > + dummy = MG_RECV_FUNC(mgr->ctl[0], (char *) &len, 1, 0); > + (void) dummy; /* https://gcc.gnu.org/bugzilla/show_bug.cgi?id=25509 */ > + } > +} > +#endif /* MG_ENABLE_BROADCAST */ > + > +static int isbyte(int n) { > + return n >= 0 && n <= 255; > +} > + > +static int parse_net(const char *spec, uint32_t *net, uint32_t *mask) { > + int n, a, b, c, d, slash = 32, len = 0; > + > + if ((sscanf(spec, "%d.%d.%d.%d/%d%n", &a, &b, &c, &d, &slash, &n) == 5 || > + sscanf(spec, "%d.%d.%d.%d%n", &a, &b, &c, &d, &n) == 4) && > + isbyte(a) && isbyte(b) && isbyte(c) && isbyte(d) && slash >= 0 && > + slash < 33) { > + len = n; > + *net = > + ((uint32_t) a << 24) | ((uint32_t) b << 16) | ((uint32_t) c << 8) | d; > + *mask = slash ? 0xffffffffU << (32 - slash) : 0; > + } > + > + return len; > +} > + > +int mg_check_ip_acl(const char *acl, uint32_t remote_ip) { > + int allowed, flag; > + uint32_t net, mask; > + struct mg_str vec; > + > + /* If any ACL is set, deny by default */ > + allowed = (acl == NULL || *acl == '\0') ? '+' : '-'; > + > + while ((acl = mg_next_comma_list_entry(acl, &vec, NULL)) != NULL) { > + flag = vec.p[0]; > + if ((flag != '+' && flag != '-') || > + parse_net(&vec.p[1], &net, &mask) == 0) { > + return -1; > + } > + > + if (net == (remote_ip & mask)) { > + allowed = flag; > + } > + } > + > + DBG(("%08x %c", (unsigned int) remote_ip, allowed)); > + return allowed == '+'; > +} > + > +/* Move data from one connection to another */ > +void mg_forward(struct mg_connection *from, struct mg_connection *to) { > + mg_send(to, from->recv_mbuf.buf, from->recv_mbuf.len); > + mbuf_remove(&from->recv_mbuf, from->recv_mbuf.len); > +} > + > +double mg_set_timer(struct mg_connection *c, double timestamp) { > + double result = c->ev_timer_time; > + c->ev_timer_time = timestamp; > + /* > + * If this connection is resolving, it's not in the list of active > + * connections, so not processed yet. It has a DNS resolver connection > + * linked to it. Set up a timer for the DNS connection. > + */ > + DBG(("%p %p %d -> %lu", c, c->priv_2, (c->flags & MG_F_RESOLVING ? 1 : 0), > + (unsigned long) timestamp)); > + if ((c->flags & MG_F_RESOLVING) && c->priv_2 != NULL) { > + ((struct mg_connection *) c->priv_2)->ev_timer_time = timestamp; > + } > + return result; > +} > + > +void mg_sock_set(struct mg_connection *nc, sock_t sock) { > + if (sock != INVALID_SOCKET) { > + nc->iface->vtable->sock_set(nc, sock); > + } > +} > + > +void mg_if_get_conn_addr(struct mg_connection *nc, int remote, > + union socket_address *sa) { > + nc->iface->vtable->get_conn_addr(nc, remote, sa); > +} > + > +struct mg_connection *mg_add_sock_opt(struct mg_mgr *s, sock_t sock, > + MG_CB(mg_event_handler_t callback, > + void *user_data), > + struct mg_add_sock_opts opts) { > +#if MG_ENABLE_CALLBACK_USERDATA > + opts.user_data = user_data; > +#endif > + > + struct mg_connection *nc = mg_create_connection_base(s, callback, opts); > + if (nc != NULL) { > + mg_sock_set(nc, sock); > + mg_add_conn(nc->mgr, nc); > + } > + return nc; > +} > + > +struct mg_connection *mg_add_sock(struct mg_mgr *s, sock_t sock, > + MG_CB(mg_event_handler_t callback, > + void *user_data)) { > + struct mg_add_sock_opts opts; > + memset(&opts, 0, sizeof(opts)); > + return mg_add_sock_opt(s, sock, MG_CB(callback, user_data), opts); > +} > + > +double mg_time(void) { > + return cs_time(); > +} > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/net_if_socket.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_MONGOOSE_SRC_NET_IF_SOCKET_H_ > +#define CS_MONGOOSE_SRC_NET_IF_SOCKET_H_ > + > +/* Amalgamated: #include "mongoose/src/net_if.h" */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +#ifndef MG_ENABLE_NET_IF_SOCKET > +#define MG_ENABLE_NET_IF_SOCKET MG_NET_IF == MG_NET_IF_SOCKET > +#endif > + > +extern const struct mg_iface_vtable mg_socket_iface_vtable; > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* CS_MONGOOSE_SRC_NET_IF_SOCKET_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/net_if_tun.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_MONGOOSE_SRC_NET_IF_TUN_H_ > +#define CS_MONGOOSE_SRC_NET_IF_TUN_H_ > + > +#if MG_ENABLE_TUN > + > +/* Amalgamated: #include "mongoose/src/net_if.h" */ > + > +struct mg_tun_client; > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +extern const struct mg_iface_vtable mg_tun_iface_vtable; > + > +struct mg_connection *mg_tun_if_find_conn(struct mg_tun_client *client, > + uint32_t stream_id); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* MG_ENABLE_TUN */ > + > +#endif /* CS_MONGOOSE_SRC_NET_IF_TUN_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/net_if_socks.h" > +#endif > +/* > +* Copyright (c) 2014-2017 Cesanta Software Limited > +* All rights reserved > +*/ > + > +#ifndef CS_MONGOOSE_SRC_NET_IF_SOCKS_H_ > +#define CS_MONGOOSE_SRC_NET_IF_SOCKS_H_ > + > +#if MG_ENABLE_SOCKS > +/* Amalgamated: #include "mongoose/src/net_if.h" */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +extern const struct mg_iface_vtable mg_socks_iface_vtable; > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > +#endif /* MG_ENABLE_SOCKS */ > +#endif /* CS_MONGOOSE_SRC_NET_IF_SOCKS_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/net_if.c" > +#endif > +/* Amalgamated: #include "mongoose/src/net_if.h" */ > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/net_if_socket.h" */ > +/* Amalgamated: #include "mongoose/src/net_if_tun.h" */ > + > +extern const struct mg_iface_vtable mg_default_iface_vtable; > + > +const struct mg_iface_vtable *mg_ifaces[] = { > + &mg_default_iface_vtable, > +#if MG_ENABLE_TUN > + &mg_tun_iface_vtable, > +#endif > +}; > + > +int mg_num_ifaces = (int) (sizeof(mg_ifaces) / sizeof(mg_ifaces[0])); > + > +struct mg_iface *mg_if_create_iface(const struct mg_iface_vtable *vtable, > + struct mg_mgr *mgr) { > + struct mg_iface *iface = (struct mg_iface *) MG_CALLOC(1, sizeof(*iface)); > + iface->mgr = mgr; > + iface->data = NULL; > + iface->vtable = vtable; > + return iface; > +} > + > +struct mg_iface *mg_find_iface(struct mg_mgr *mgr, > + const struct mg_iface_vtable *vtable, > + struct mg_iface *from) { > + int i = 0; > + if (from != NULL) { > + for (i = 0; i < mgr->num_ifaces; i++) { > + if (mgr->ifaces[i] == from) { > + i++; > + break; > + } > + } > + } > + > + for (; i < mgr->num_ifaces; i++) { > + if (mgr->ifaces[i]->vtable == vtable) { > + return mgr->ifaces[i]; > + } > + } > + return NULL; > +} > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/net_if_socket.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_NET_IF_SOCKET > + > +/* Amalgamated: #include "mongoose/src/net_if_socket.h" */ > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/util.h" */ > + > +#define MG_TCP_RECV_BUFFER_SIZE 1024 > +#define MG_UDP_RECV_BUFFER_SIZE 1500 > + > +static sock_t mg_open_listening_socket(union socket_address *sa, int type, > + int proto); > +#if MG_ENABLE_SSL > +static void mg_ssl_begin(struct mg_connection *nc); > +#endif > + > +void mg_set_non_blocking_mode(sock_t sock) { > +#ifdef _WIN32 > + unsigned long on = 1; > + ioctlsocket(sock, FIONBIO, &on); > +#else > + int flags = fcntl(sock, F_GETFL, 0); > + fcntl(sock, F_SETFL, flags | O_NONBLOCK); > +#endif > +} > + > +static int mg_is_error(void) { > + int err = mg_get_errno(); > + return err != EINPROGRESS && err != EWOULDBLOCK > +#ifndef WINCE > + && err != EAGAIN && err != EINTR > +#endif > +#ifdef _WIN32 > + && WSAGetLastError() != WSAEINTR && WSAGetLastError() != WSAEWOULDBLOCK > +#endif > + ; > +} > + > +void mg_socket_if_connect_tcp(struct mg_connection *nc, > + const union socket_address *sa) { > + int rc, proto = 0; > + nc->sock = socket(AF_INET, SOCK_STREAM, proto); > + if (nc->sock == INVALID_SOCKET) { > + nc->err = mg_get_errno() ? mg_get_errno() : 1; > + return; > + } > +#if !defined(MG_ESP8266) > + mg_set_non_blocking_mode(nc->sock); > +#endif > + rc = connect(nc->sock, &sa->sa, sizeof(sa->sin)); > + nc->err = rc < 0 && mg_is_error() ? mg_get_errno() : 0; > + DBG(("%p sock %d rc %d errno %d err %d", nc, nc->sock, rc, mg_get_errno(), > + nc->err)); > +} > + > +void mg_socket_if_connect_udp(struct mg_connection *nc) { > + nc->sock = socket(AF_INET, SOCK_DGRAM, 0); > + if (nc->sock == INVALID_SOCKET) { > + nc->err = mg_get_errno() ? mg_get_errno() : 1; > + return; > + } > + if (nc->flags & MG_F_ENABLE_BROADCAST) { > + int optval = 1; > + setsockopt(nc->sock, SOL_SOCKET, SO_BROADCAST, (const char *) &optval, > + sizeof(optval)); > + } > + nc->err = 0; > +} > + > +int mg_socket_if_listen_tcp(struct mg_connection *nc, > + union socket_address *sa) { > + int proto = 0; > + sock_t sock = mg_open_listening_socket(sa, SOCK_STREAM, proto); > + if (sock == INVALID_SOCKET) { > + return (mg_get_errno() ? mg_get_errno() : 1); > + } > + mg_sock_set(nc, sock); > + return 0; > +} > + > +int mg_socket_if_listen_udp(struct mg_connection *nc, > + union socket_address *sa) { > + sock_t sock = mg_open_listening_socket(sa, SOCK_DGRAM, 0); > + if (sock == INVALID_SOCKET) return (mg_get_errno() ? mg_get_errno() : 1); > + mg_sock_set(nc, sock); > + return 0; > +} > + > +void mg_socket_if_tcp_send(struct mg_connection *nc, const void *buf, > + size_t len) { > + mbuf_append(&nc->send_mbuf, buf, len); > +} > + > +void mg_socket_if_udp_send(struct mg_connection *nc, const void *buf, > + size_t len) { > + mbuf_append(&nc->send_mbuf, buf, len); > +} > + > +void mg_socket_if_recved(struct mg_connection *nc, size_t len) { > + (void) nc; > + (void) len; > +} > + > +int mg_socket_if_create_conn(struct mg_connection *nc) { > + (void) nc; > + return 1; > +} > + > +void mg_socket_if_destroy_conn(struct mg_connection *nc) { > + if (nc->sock == INVALID_SOCKET) return; > + if (!(nc->flags & MG_F_UDP)) { > + closesocket(nc->sock); > + } else { > + /* Only close outgoing UDP sockets or listeners. */ > + if (nc->listener == NULL) closesocket(nc->sock); > + } > + nc->sock = INVALID_SOCKET; > +} > + > +static int mg_accept_conn(struct mg_connection *lc) { > + struct mg_connection *nc; > + union socket_address sa; > + socklen_t sa_len = sizeof(sa); > + /* NOTE(lsm): on Windows, sock is always > FD_SETSIZE */ > + sock_t sock = accept(lc->sock, &sa.sa, &sa_len); > + if (sock == INVALID_SOCKET) { > + if (mg_is_error()) DBG(("%p: failed to accept: %d", lc, mg_get_errno())); > + return 0; > + } > + nc = mg_if_accept_new_conn(lc); > + if (nc == NULL) { > + closesocket(sock); > + return 0; > + } > + DBG(("%p conn from %s:%d", nc, inet_ntoa(sa.sin.sin_addr), > + ntohs(sa.sin.sin_port))); > + mg_sock_set(nc, sock); > +#if MG_ENABLE_SSL > + if (lc->flags & MG_F_SSL) { > + if (mg_ssl_if_conn_accept(nc, lc) != MG_SSL_OK) mg_close_conn(nc); > + } else > +#endif > + { > + mg_if_accept_tcp_cb(nc, &sa, sa_len); > + } > + return 1; > +} > + > +/* 'sa' must be an initialized address to bind to */ > +static sock_t mg_open_listening_socket(union socket_address *sa, int type, > + int proto) { > + socklen_t sa_len = > + (sa->sa.sa_family == AF_INET) ? sizeof(sa->sin) : sizeof(sa->sin6); > + sock_t sock = INVALID_SOCKET; > +#if !MG_LWIP > + int on = 1; > +#endif > + > + if ((sock = socket(sa->sa.sa_family, type, proto)) != INVALID_SOCKET && > +#if !MG_LWIP /* LWIP doesn't support either */ > +#if defined(_WIN32) && defined(SO_EXCLUSIVEADDRUSE) && !defined(WINCE) > + /* "Using SO_REUSEADDR and SO_EXCLUSIVEADDRUSE" http://goo.gl/RmrFTm */ > + !setsockopt(sock, SOL_SOCKET, SO_EXCLUSIVEADDRUSE, (void *) &on, > + sizeof(on)) && > +#endif > + > +#if !defined(_WIN32) || !defined(SO_EXCLUSIVEADDRUSE) > + /* > + * SO_RESUSEADDR is not enabled on Windows because the semantics of > + * SO_REUSEADDR on UNIX and Windows is different. On Windows, > + * SO_REUSEADDR allows to bind a socket to a port without error even if > + * the port is already open by another program. This is not the behavior > + * SO_REUSEADDR was designed for, and leads to hard-to-track failure > + * scenarios. Therefore, SO_REUSEADDR was disabled on Windows unless > + * SO_EXCLUSIVEADDRUSE is supported and set on a socket. > + */ > + !setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (void *) &on, sizeof(on)) && > +#endif > +#endif /* !MG_LWIP */ > + > + !bind(sock, &sa->sa, sa_len) && > + (type == SOCK_DGRAM || listen(sock, SOMAXCONN) == 0)) { > +#if !MG_LWIP > + mg_set_non_blocking_mode(sock); > + /* In case port was set to 0, get the real port number */ > + (void) getsockname(sock, &sa->sa, &sa_len); > +#endif > + } else if (sock != INVALID_SOCKET) { > + closesocket(sock); > + sock = INVALID_SOCKET; > + } > + > + return sock; > +} > + > +static void mg_write_to_socket(struct mg_connection *nc) { > + struct mbuf *io = &nc->send_mbuf; > + int n = 0; > + > +#if MG_LWIP > + /* With LWIP we don't know if the socket is ready */ > + if (io->len == 0) return; > +#endif > + > + assert(io->len > 0); > + > + if (nc->flags & MG_F_UDP) { > + int n = > + sendto(nc->sock, io->buf, io->len, 0, &nc->sa.sa, sizeof(nc->sa.sin)); > + DBG(("%p %d %d %d %s:%hu", nc, nc->sock, n, mg_get_errno(), > + inet_ntoa(nc->sa.sin.sin_addr), ntohs(nc->sa.sin.sin_port))); > + mg_if_sent_cb(nc, n); > + return; > + } > + > +#if MG_ENABLE_SSL > + if (nc->flags & MG_F_SSL) { > + if (nc->flags & MG_F_SSL_HANDSHAKE_DONE) { > + n = mg_ssl_if_write(nc, io->buf, io->len); > + DBG(("%p %d bytes -> %d (SSL)", nc, n, nc->sock)); > + if (n < 0) { > + if (n != MG_SSL_WANT_READ && n != MG_SSL_WANT_WRITE) { > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > + return; > + } else { > + /* Successful SSL operation, clear off SSL wait flags */ > + nc->flags &= ~(MG_F_WANT_READ | MG_F_WANT_WRITE); > + } > + } else { > + mg_ssl_begin(nc); > + return; > + } > + } else > +#endif > + { > + n = (int) MG_SEND_FUNC(nc->sock, io->buf, io->len, 0); > + DBG(("%p %d bytes -> %d", nc, n, nc->sock)); > + } > + > + mg_if_sent_cb(nc, n); > +} > + > +MG_INTERNAL size_t recv_avail_size(struct mg_connection *conn, size_t max) { > + size_t avail; > + if (conn->recv_mbuf_limit < conn->recv_mbuf.len) return 0; > + avail = conn->recv_mbuf_limit - conn->recv_mbuf.len; > + return avail > max ? max : avail; > +} > + > +static void mg_handle_tcp_read(struct mg_connection *conn) { > + int n = 0; > + char *buf = (char *) MG_MALLOC(MG_TCP_RECV_BUFFER_SIZE); > + > + if (buf == NULL) { > + DBG(("OOM")); > + return; > + } > + > +#if MG_ENABLE_SSL > + if (conn->flags & MG_F_SSL) { > + if (conn->flags & MG_F_SSL_HANDSHAKE_DONE) { > + /* SSL library may have more bytes ready to read than we ask to read. > + * Therefore, read in a loop until we read everything. Without the loop, > + * we skip to the next select() cycle which can just timeout. */ > + while ((n = mg_ssl_if_read(conn, buf, MG_TCP_RECV_BUFFER_SIZE)) > 0) { > + DBG(("%p %d bytes <- %d (SSL)", conn, n, conn->sock)); > + mg_if_recv_tcp_cb(conn, buf, n, 1 /* own */); > + buf = NULL; > + if (conn->flags & MG_F_CLOSE_IMMEDIATELY) break; > + /* buf has been freed, we need a new one. */ > + buf = (char *) MG_MALLOC(MG_TCP_RECV_BUFFER_SIZE); > + if (buf == NULL) break; > + } > + MG_FREE(buf); > + if (n < 0 && n != MG_SSL_WANT_READ) conn->flags |= MG_F_CLOSE_IMMEDIATELY; > + } else { > + MG_FREE(buf); > + mg_ssl_begin(conn); > + return; > + } > + } else > +#endif > + { > + n = (int) MG_RECV_FUNC(conn->sock, buf, > + recv_avail_size(conn, MG_TCP_RECV_BUFFER_SIZE), 0); > + DBG(("%p %d bytes (PLAIN) <- %d", conn, n, conn->sock)); > + if (n > 0) { > + mg_if_recv_tcp_cb(conn, buf, n, 1 /* own */); > + } else { > + MG_FREE(buf); > + } > + if (n == 0) { > + /* Orderly shutdown of the socket, try flushing output. */ > + conn->flags |= MG_F_SEND_AND_CLOSE; > + } else if (n < 0 && mg_is_error()) { > + conn->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > + } > +} > + > +static int mg_recvfrom(struct mg_connection *nc, union socket_address *sa, > + socklen_t *sa_len, char **buf) { > + int n; > + *buf = (char *) MG_MALLOC(MG_UDP_RECV_BUFFER_SIZE); > + if (*buf == NULL) { > + DBG(("Out of memory")); > + return -ENOMEM; > + } > + n = recvfrom(nc->sock, *buf, MG_UDP_RECV_BUFFER_SIZE, 0, &sa->sa, sa_len); > + if (n <= 0) { > + DBG(("%p recvfrom: %s", nc, strerror(mg_get_errno()))); > + MG_FREE(*buf); > + } > + return n; > +} > + > +static void mg_handle_udp_read(struct mg_connection *nc) { > + char *buf = NULL; > + union socket_address sa; > + socklen_t sa_len = sizeof(sa); > + int n = mg_recvfrom(nc, &sa, &sa_len, &buf); > + DBG(("%p %d bytes from %s:%d", nc, n, inet_ntoa(nc->sa.sin.sin_addr), > + ntohs(nc->sa.sin.sin_port))); > + mg_if_recv_udp_cb(nc, buf, n, &sa, sa_len); > +} > + > +#if MG_ENABLE_SSL > +static void mg_ssl_begin(struct mg_connection *nc) { > + int server_side = (nc->listener != NULL); > + enum mg_ssl_if_result res = mg_ssl_if_handshake(nc); > + DBG(("%p %d res %d", nc, server_side, res)); > + > + if (res == MG_SSL_OK) { > + nc->flags |= MG_F_SSL_HANDSHAKE_DONE; > + nc->flags &= ~(MG_F_WANT_READ | MG_F_WANT_WRITE); > + > + if (server_side) { > + union socket_address sa; > + socklen_t sa_len = sizeof(sa); > + (void) getpeername(nc->sock, &sa.sa, &sa_len); > + mg_if_accept_tcp_cb(nc, &sa, sa_len); > + } else { > + mg_if_connect_cb(nc, 0); > + } > + } else if (res != MG_SSL_WANT_READ && res != MG_SSL_WANT_WRITE) { > + if (!server_side) { > + mg_if_connect_cb(nc, res); > + } > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > +} > +#endif /* MG_ENABLE_SSL */ > + > +#define _MG_F_FD_CAN_READ 1 > +#define _MG_F_FD_CAN_WRITE 1 << 1 > +#define _MG_F_FD_ERROR 1 << 2 > + > +void mg_mgr_handle_conn(struct mg_connection *nc, int fd_flags, double now) { > + int worth_logging = > + fd_flags != 0 || (nc->flags & (MG_F_WANT_READ | MG_F_WANT_WRITE)); > + if (worth_logging) { > + DBG(("%p fd=%d fd_flags=%d nc_flags=%lu rmbl=%d smbl=%d", nc, nc->sock, > + fd_flags, nc->flags, (int) nc->recv_mbuf.len, > + (int) nc->send_mbuf.len)); > + } > + > + if (nc->flags & MG_F_CONNECTING) { > + if (fd_flags != 0) { > + int err = 0; > +#if !defined(MG_ESP8266) > + if (!(nc->flags & MG_F_UDP)) { > + socklen_t len = sizeof(err); > + int ret = > + getsockopt(nc->sock, SOL_SOCKET, SO_ERROR, (char *) &err, &len); > + if (ret != 0) { > + err = 1; > + } else if (err == EAGAIN || err == EWOULDBLOCK) { > + err = 0; > + } > + } > +#else > + /* > + * On ESP8266 we use blocking connect. > + */ > + err = nc->err; > +#endif > +#if MG_ENABLE_SSL > + if ((nc->flags & MG_F_SSL) && err == 0) { > + mg_ssl_begin(nc); > + } else { > + mg_if_connect_cb(nc, err); > + } > +#else > + mg_if_connect_cb(nc, err); > +#endif > + } else if (nc->err != 0) { > + mg_if_connect_cb(nc, nc->err); > + } > + } > + > + if (fd_flags & _MG_F_FD_CAN_READ) { > + if (nc->flags & MG_F_UDP) { > + mg_handle_udp_read(nc); > + } else { > + if (nc->flags & MG_F_LISTENING) { > + /* > + * We're not looping here, and accepting just one connection at > + * a time. The reason is that eCos does not respect non-blocking > + * flag on a listening socket and hangs in a loop. > + */ > + mg_accept_conn(nc); > + } else { > + mg_handle_tcp_read(nc); > + } > + } > + } > + > + if (!(nc->flags & MG_F_CLOSE_IMMEDIATELY)) { > + if ((fd_flags & _MG_F_FD_CAN_WRITE) && nc->send_mbuf.len > 0) { > + mg_write_to_socket(nc); > + } > + mg_if_poll(nc, (time_t) now); > + mg_if_timer(nc, now); > + } > + > + if (worth_logging) { > + DBG(("%p after fd=%d nc_flags=%lu rmbl=%d smbl=%d", nc, nc->sock, nc->flags, > + (int) nc->recv_mbuf.len, (int) nc->send_mbuf.len)); > + } > +} > + > +#if MG_ENABLE_BROADCAST > +static void mg_mgr_handle_ctl_sock(struct mg_mgr *mgr) { > + struct ctl_msg ctl_msg; > + int len = > + (int) MG_RECV_FUNC(mgr->ctl[1], (char *) &ctl_msg, sizeof(ctl_msg), 0); > + size_t dummy = MG_SEND_FUNC(mgr->ctl[1], ctl_msg.message, 1, 0); > + DBG(("read %d from ctl socket", len)); > + (void) dummy; /* https://gcc.gnu.org/bugzilla/show_bug.cgi?id=25509 */ > + if (len >= (int) sizeof(ctl_msg.callback) && ctl_msg.callback != NULL) { > + struct mg_connection *nc; > + for (nc = mg_next(mgr, NULL); nc != NULL; nc = mg_next(mgr, nc)) { > + ctl_msg.callback(nc, MG_EV_POLL, > + ctl_msg.message MG_UD_ARG(nc->user_data)); > + } > + } > +} > +#endif > + > +/* Associate a socket to a connection. */ > +void mg_socket_if_sock_set(struct mg_connection *nc, sock_t sock) { > + mg_set_non_blocking_mode(sock); > + mg_set_close_on_exec(sock); > + nc->sock = sock; > + DBG(("%p %d", nc, sock)); > +} > + > +void mg_socket_if_init(struct mg_iface *iface) { > + (void) iface; > + DBG(("%p using select()", iface->mgr)); > +#if MG_ENABLE_BROADCAST > + mg_socketpair(iface->mgr->ctl, SOCK_DGRAM); > +#endif > +} > + > +void mg_socket_if_free(struct mg_iface *iface) { > + (void) iface; > +} > + > +void mg_socket_if_add_conn(struct mg_connection *nc) { > + (void) nc; > +} > + > +void mg_socket_if_remove_conn(struct mg_connection *nc) { > + (void) nc; > +} > + > +void mg_add_to_set(sock_t sock, fd_set *set, sock_t *max_fd) { > + if (sock != INVALID_SOCKET > +#ifdef __unix__ > + && sock < (sock_t) FD_SETSIZE > +#endif > + ) { > + FD_SET(sock, set); > + if (*max_fd == INVALID_SOCKET || sock > *max_fd) { > + *max_fd = sock; > + } > + } > +} > + > +time_t mg_socket_if_poll(struct mg_iface *iface, int timeout_ms) { > + struct mg_mgr *mgr = iface->mgr; > + double now = mg_time(); > + double min_timer; > + struct mg_connection *nc, *tmp; > + struct timeval tv; > + fd_set read_set, write_set, err_set; > + sock_t max_fd = INVALID_SOCKET; > + int num_fds, num_ev, num_timers = 0; > +#ifdef __unix__ > + int try_dup = 1; > +#endif > + > + FD_ZERO(&read_set); > + FD_ZERO(&write_set); > + FD_ZERO(&err_set); > +#if MG_ENABLE_BROADCAST > + mg_add_to_set(mgr->ctl[1], &read_set, &max_fd); > +#endif > + > + /* > + * Note: it is ok to have connections with sock == INVALID_SOCKET in the list, > + * e.g. timer-only "connections". > + */ > + min_timer = 0; > + for (nc = mgr->active_connections, num_fds = 0; nc != NULL; nc = tmp) { > + tmp = nc->next; > + > + if (nc->sock != INVALID_SOCKET) { > + num_fds++; > + > +#ifdef __unix__ > + /* A hack to make sure all our file descriptos fit into FD_SETSIZE. */ > + if (nc->sock >= (sock_t) FD_SETSIZE && try_dup) { > + int new_sock = dup(nc->sock); > + if (new_sock >= 0 && new_sock < (sock_t) FD_SETSIZE) { > + closesocket(nc->sock); > + DBG(("new sock %d -> %d", nc->sock, new_sock)); > + nc->sock = new_sock; > + } else { > + try_dup = 0; > + } > + } > +#endif > + > + if (!(nc->flags & MG_F_WANT_WRITE) && > + nc->recv_mbuf.len < nc->recv_mbuf_limit && > + (!(nc->flags & MG_F_UDP) || nc->listener == NULL)) { > + mg_add_to_set(nc->sock, &read_set, &max_fd); > + } > + > + if (((nc->flags & MG_F_CONNECTING) && !(nc->flags & MG_F_WANT_READ)) || > + (nc->send_mbuf.len > 0 && !(nc->flags & MG_F_CONNECTING))) { > + mg_add_to_set(nc->sock, &write_set, &max_fd); > + mg_add_to_set(nc->sock, &err_set, &max_fd); > + } > + } > + > + if (nc->ev_timer_time > 0) { > + if (num_timers == 0 || nc->ev_timer_time < min_timer) { > + min_timer = nc->ev_timer_time; > + } > + num_timers++; > + } > + } > + > + /* > + * If there is a timer to be fired earlier than the requested timeout, > + * adjust the timeout. > + */ > + if (num_timers > 0) { > + double timer_timeout_ms = (min_timer - mg_time()) * 1000 + 1 /* rounding */; > + if (timer_timeout_ms < timeout_ms) { > + timeout_ms = (int) timer_timeout_ms; > + } > + } > + if (timeout_ms < 0) timeout_ms = 0; > + > + tv.tv_sec = timeout_ms / 1000; > + tv.tv_usec = (timeout_ms % 1000) * 1000; > + > + num_ev = select((int) max_fd + 1, &read_set, &write_set, &err_set, &tv); > + now = mg_time(); > +#if 0 > + DBG(("select @ %ld num_ev=%d of %d, timeout=%d", (long) now, num_ev, num_fds, > + timeout_ms)); > +#endif > + > +#if MG_ENABLE_BROADCAST > + if (num_ev > 0 && mgr->ctl[1] != INVALID_SOCKET && > + FD_ISSET(mgr->ctl[1], &read_set)) { > + mg_mgr_handle_ctl_sock(mgr); > + } > +#endif > + > + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { > + int fd_flags = 0; > + if (nc->sock != INVALID_SOCKET) { > + if (num_ev > 0) { > + fd_flags = (FD_ISSET(nc->sock, &read_set) && > + (!(nc->flags & MG_F_UDP) || nc->listener == NULL) > + ? _MG_F_FD_CAN_READ > + : 0) | > + (FD_ISSET(nc->sock, &write_set) ? _MG_F_FD_CAN_WRITE : 0) | > + (FD_ISSET(nc->sock, &err_set) ? _MG_F_FD_ERROR : 0); > + } > +#if MG_LWIP > + /* With LWIP socket emulation layer, we don't get write events for UDP */ > + if ((nc->flags & MG_F_UDP) && nc->listener == NULL) { > + fd_flags |= _MG_F_FD_CAN_WRITE; > + } > +#endif > + } > + tmp = nc->next; > + mg_mgr_handle_conn(nc, fd_flags, now); > + } > + > + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { > + tmp = nc->next; > + if ((nc->flags & MG_F_CLOSE_IMMEDIATELY) || > + (nc->send_mbuf.len == 0 && (nc->flags & MG_F_SEND_AND_CLOSE))) { > + mg_close_conn(nc); > + } > + } > + > + return (time_t) now; > +} > + > +#if MG_ENABLE_BROADCAST > +MG_INTERNAL void mg_socketpair_close(sock_t *sock) { > + while (1) { > + if (closesocket(*sock) == -1 && errno == EINTR) continue; > + break; > + } > + *sock = INVALID_SOCKET; > +} > + > +MG_INTERNAL sock_t > +mg_socketpair_accept(sock_t sock, union socket_address *sa, socklen_t sa_len) { > + sock_t rc; > + while (1) { > + if ((rc = accept(sock, &sa->sa, &sa_len)) == INVALID_SOCKET && > + errno == EINTR) > + continue; > + break; > + } > + return rc; > +} > + > +int mg_socketpair(sock_t sp[2], int sock_type) { > + union socket_address sa; > + sock_t sock; > + socklen_t len = sizeof(sa.sin); > + int ret = 0; > + > + sock = sp[0] = sp[1] = INVALID_SOCKET; > + > + (void) memset(&sa, 0, sizeof(sa)); > + sa.sin.sin_family = AF_INET; > + sa.sin.sin_port = htons(0); > + sa.sin.sin_addr.s_addr = htonl(0x7f000001); /* 127.0.0.1 */ > + > + if ((sock = socket(AF_INET, sock_type, 0)) == INVALID_SOCKET) { > + } else if (bind(sock, &sa.sa, len) != 0) { > + } else if (sock_type == SOCK_STREAM && listen(sock, 1) != 0) { > + } else if (getsockname(sock, &sa.sa, &len) != 0) { > + } else if ((sp[0] = socket(AF_INET, sock_type, 0)) == INVALID_SOCKET) { > + } else if (connect(sp[0], &sa.sa, len) != 0) { > + } else if (sock_type == SOCK_DGRAM && > + (getsockname(sp[0], &sa.sa, &len) != 0 || > + connect(sock, &sa.sa, len) != 0)) { > + } else if ((sp[1] = (sock_type == SOCK_DGRAM ? sock : mg_socketpair_accept( > + sock, &sa, len))) == > + INVALID_SOCKET) { > + } else { > + mg_set_close_on_exec(sp[0]); > + mg_set_close_on_exec(sp[1]); > + if (sock_type == SOCK_STREAM) mg_socketpair_close(&sock); > + ret = 1; > + } > + > + if (!ret) { > + if (sp[0] != INVALID_SOCKET) mg_socketpair_close(&sp[0]); > + if (sp[1] != INVALID_SOCKET) mg_socketpair_close(&sp[1]); > + if (sock != INVALID_SOCKET) mg_socketpair_close(&sock); > + } > + > + return ret; > +} > +#endif /* MG_ENABLE_BROADCAST */ > + > +static void mg_sock_get_addr(sock_t sock, int remote, > + union socket_address *sa) { > + socklen_t slen = sizeof(*sa); > + memset(sa, 0, slen); > + if (remote) { > + getpeername(sock, &sa->sa, &slen); > + } else { > + getsockname(sock, &sa->sa, &slen); > + } > +} > + > +void mg_sock_to_str(sock_t sock, char *buf, size_t len, int flags) { > + union socket_address sa; > + mg_sock_get_addr(sock, flags & MG_SOCK_STRINGIFY_REMOTE, &sa); > + mg_sock_addr_to_str(&sa, buf, len, flags); > +} > + > +void mg_socket_if_get_conn_addr(struct mg_connection *nc, int remote, > + union socket_address *sa) { > + if ((nc->flags & MG_F_UDP) && remote) { > + memcpy(sa, &nc->sa, sizeof(*sa)); > + return; > + } > + mg_sock_get_addr(nc->sock, remote, sa); > +} > + > +/* clang-format off */ > +#define MG_SOCKET_IFACE_VTABLE \ > + { \ > + mg_socket_if_init, \ > + mg_socket_if_free, \ > + mg_socket_if_add_conn, \ > + mg_socket_if_remove_conn, \ > + mg_socket_if_poll, \ > + mg_socket_if_listen_tcp, \ > + mg_socket_if_listen_udp, \ > + mg_socket_if_connect_tcp, \ > + mg_socket_if_connect_udp, \ > + mg_socket_if_tcp_send, \ > + mg_socket_if_udp_send, \ > + mg_socket_if_recved, \ > + mg_socket_if_create_conn, \ > + mg_socket_if_destroy_conn, \ > + mg_socket_if_sock_set, \ > + mg_socket_if_get_conn_addr, \ > + } > +/* clang-format on */ > + > +const struct mg_iface_vtable mg_socket_iface_vtable = MG_SOCKET_IFACE_VTABLE; > +#if MG_NET_IF == MG_NET_IF_SOCKET > +const struct mg_iface_vtable mg_default_iface_vtable = MG_SOCKET_IFACE_VTABLE; > +#endif > + > +#endif /* MG_ENABLE_NET_IF_SOCKET */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/net_if_socks.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_SOCKS > + > +struct socksdata { > + char *proxy_addr; /* HOST:PORT of the socks5 proxy server */ > + struct mg_connection *s; /* Respective connection to the server */ > + struct mg_connection *c; /* Connection to the client */ > + struct mbuf tmp; /* Temporary buffer for sent data */ > +}; > + > +static void socks_if_disband(struct socksdata *d) { > + LOG(LL_DEBUG, ("disbanding proxy %p %p", d->c, d->s)); > + if (d->c) d->c->flags |= MG_F_SEND_AND_CLOSE; > + if (d->s) d->s->flags |= MG_F_SEND_AND_CLOSE; > + d->c = d->s = NULL; > +} > + > +static void socks_if_handler(struct mg_connection *c, int ev, void *ev_data) { > + struct socksdata *d = (struct socksdata *) c->user_data; > + if (ev == MG_EV_CONNECT) { > + int res = *(int *) ev_data; > + if (res == 0) { > + /* Send handshake to the proxy server */ > + unsigned char buf[] = {MG_SOCKS_VERSION, 1, MG_SOCKS_HANDSHAKE_NOAUTH}; > + mg_send(d->s, buf, sizeof(buf)); > + LOG(LL_DEBUG, ("Sent handshake to %s", d->proxy_addr)); > + } else { > + LOG(LL_ERROR, ("Cannot connect to %s: %d", d->proxy_addr, res)); > + d->c->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > + } else if (ev == MG_EV_CLOSE) { > + socks_if_disband(d); > + } else if (ev == MG_EV_RECV) { > + /* Handle handshake reply */ > + if (!(c->flags & MG_SOCKS_HANDSHAKE_DONE)) { > + /* TODO(lsm): process IPv6 too */ > + unsigned char buf[10] = {MG_SOCKS_VERSION, MG_SOCKS_CMD_CONNECT, 0, > + MG_SOCKS_ADDR_IPV4}; > + if (c->recv_mbuf.len < 2) return; > + if ((unsigned char) c->recv_mbuf.buf[1] == MG_SOCKS_HANDSHAKE_FAILURE) { > + LOG(LL_ERROR, ("Server kicked us out")); > + socks_if_disband(d); > + return; > + } > + mbuf_remove(&c->recv_mbuf, 2); > + c->flags |= MG_SOCKS_HANDSHAKE_DONE; > + > + /* Send connect request */ > + memcpy(buf + 4, &d->c->sa.sin.sin_addr, 4); > + memcpy(buf + 8, &d->c->sa.sin.sin_port, 2); > + mg_send(c, buf, sizeof(buf)); > + } > + /* Process connect request */ > + if ((c->flags & MG_SOCKS_HANDSHAKE_DONE) && > + !(c->flags & MG_SOCKS_CONNECT_DONE)) { > + if (c->recv_mbuf.len < 10) return; > + if (c->recv_mbuf.buf[1] != MG_SOCKS_SUCCESS) { > + LOG(LL_ERROR, ("Socks connection error: %d", c->recv_mbuf.buf[1])); > + socks_if_disband(d); > + return; > + } > + mbuf_remove(&c->recv_mbuf, 10); > + c->flags |= MG_SOCKS_CONNECT_DONE; > + /* Connected. Move sent data from client, if any, to server */ > + if (d->s && d->c) { > + mbuf_append(&d->s->send_mbuf, d->tmp.buf, d->tmp.len); > + mbuf_free(&d->tmp); > + } > + } > + /* All flags are set, we're in relay mode */ > + if ((c->flags & MG_SOCKS_CONNECT_DONE) && d->c && d->s) { > + mbuf_append(&d->c->recv_mbuf, d->s->recv_mbuf.buf, d->s->recv_mbuf.len); > + mbuf_remove(&d->s->recv_mbuf, d->s->recv_mbuf.len); > + } > + } > +} > + > +static void mg_socks_if_connect_tcp(struct mg_connection *c, > + const union socket_address *sa) { > + struct socksdata *d = (struct socksdata *) c->iface->data; > + d->c = c; > + d->s = mg_connect(c->mgr, d->proxy_addr, socks_if_handler); > + d->s->user_data = d; > + LOG(LL_DEBUG, ("%p %s", c, d->proxy_addr)); > + (void) sa; > +} > + > +static void mg_socks_if_connect_udp(struct mg_connection *c) { > + (void) c; > +} > + > +static int mg_socks_if_listen_tcp(struct mg_connection *c, > + union socket_address *sa) { > + (void) c; > + (void) sa; > + return 0; > +} > + > +static int mg_socks_if_listen_udp(struct mg_connection *c, > + union socket_address *sa) { > + (void) c; > + (void) sa; > + return -1; > +} > + > +static void mg_socks_if_tcp_send(struct mg_connection *c, const void *buf, > + size_t len) { > + struct socksdata *d = (struct socksdata *) c->iface->data; > + LOG(LL_DEBUG, ("%p -> %p %d %d", c, buf, (int) len, (int) c->send_mbuf.len)); > + if (d && d->s && d->s->flags & MG_SOCKS_CONNECT_DONE) { > + mbuf_append(&d->s->send_mbuf, d->tmp.buf, d->tmp.len); > + mbuf_append(&d->s->send_mbuf, buf, len); > + mbuf_free(&d->tmp); > + } else { > + mbuf_append(&d->tmp, buf, len); > + } > +} > + > +static void mg_socks_if_udp_send(struct mg_connection *c, const void *buf, > + size_t len) { > + (void) c; > + (void) buf; > + (void) len; > +} > + > +static void mg_socks_if_recved(struct mg_connection *c, size_t len) { > + (void) c; > + (void) len; > +} > + > +static int mg_socks_if_create_conn(struct mg_connection *c) { > + (void) c; > + return 1; > +} > + > +static void mg_socks_if_destroy_conn(struct mg_connection *c) { > + c->iface->vtable->free(c->iface); > + MG_FREE(c->iface); > + c->iface = NULL; > + LOG(LL_DEBUG, ("%p", c)); > +} > + > +static void mg_socks_if_sock_set(struct mg_connection *c, sock_t sock) { > + (void) c; > + (void) sock; > +} > + > +static void mg_socks_if_init(struct mg_iface *iface) { > + (void) iface; > +} > + > +static void mg_socks_if_free(struct mg_iface *iface) { > + struct socksdata *d = (struct socksdata *) iface->data; > + LOG(LL_DEBUG, ("%p", iface)); > + if (d != NULL) { > + socks_if_disband(d); > + mbuf_free(&d->tmp); > + MG_FREE(d->proxy_addr); > + MG_FREE(d); > + iface->data = NULL; > + } > +} > + > +static void mg_socks_if_add_conn(struct mg_connection *c) { > + c->sock = INVALID_SOCKET; > +} > + > +static void mg_socks_if_remove_conn(struct mg_connection *c) { > + (void) c; > +} > + > +static time_t mg_socks_if_poll(struct mg_iface *iface, int timeout_ms) { > + LOG(LL_DEBUG, ("%p", iface)); > + (void) iface; > + (void) timeout_ms; > + return (time_t) cs_time(); > +} > + > +static void mg_socks_if_get_conn_addr(struct mg_connection *c, int remote, > + union socket_address *sa) { > + LOG(LL_DEBUG, ("%p", c)); > + (void) c; > + (void) remote; > + (void) sa; > +} > + > +const struct mg_iface_vtable mg_socks_iface_vtable = { > + mg_socks_if_init, mg_socks_if_free, > + mg_socks_if_add_conn, mg_socks_if_remove_conn, > + mg_socks_if_poll, mg_socks_if_listen_tcp, > + mg_socks_if_listen_udp, mg_socks_if_connect_tcp, > + mg_socks_if_connect_udp, mg_socks_if_tcp_send, > + mg_socks_if_udp_send, mg_socks_if_recved, > + mg_socks_if_create_conn, mg_socks_if_destroy_conn, > + mg_socks_if_sock_set, mg_socks_if_get_conn_addr, > +}; > + > +struct mg_iface *mg_socks_mk_iface(struct mg_mgr *mgr, const char *proxy_addr) { > + struct mg_iface *iface = mg_if_create_iface(&mg_socks_iface_vtable, mgr); > + iface->data = MG_CALLOC(1, sizeof(struct socksdata)); > + ((struct socksdata *) iface->data)->proxy_addr = strdup(proxy_addr); > + return iface; > +} > + > +#endif > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/net_if_tun.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_TUN > + > +/* Amalgamated: #include "common/cs_dbg.h" */ > +/* Amalgamated: #include "common/cs_time.h" */ > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/net_if_tun.h" */ > +/* Amalgamated: #include "mongoose/src/tun.h" */ > +/* Amalgamated: #include "mongoose/src/util.h" */ > + > +#define MG_TCP_RECV_BUFFER_SIZE 1024 > +#define MG_UDP_RECV_BUFFER_SIZE 1500 > + > +void mg_tun_if_connect_tcp(struct mg_connection *nc, > + const union socket_address *sa) { > + (void) nc; > + (void) sa; > +} > + > +void mg_tun_if_connect_udp(struct mg_connection *nc) { > + (void) nc; > +} > + > +int mg_tun_if_listen_tcp(struct mg_connection *nc, union socket_address *sa) { > + (void) nc; > + (void) sa; > + return 0; > +} > + > +int mg_tun_if_listen_udp(struct mg_connection *nc, union socket_address *sa) { > + (void) nc; > + (void) sa; > + return -1; > +} > + > +void mg_tun_if_tcp_send(struct mg_connection *nc, const void *buf, size_t len) { > + struct mg_tun_client *client = (struct mg_tun_client *) nc->iface->data; > + uint32_t stream_id = (uint32_t)(uintptr_t) nc->mgr_data; > + struct mg_str msg = {(char *) buf, len}; > +#if MG_ENABLE_HEXDUMP > + char hex[512]; > + mg_hexdump(buf, len, hex, sizeof(hex)); > + LOG(LL_DEBUG, ("sending to stream 0x%x:\n%s", (unsigned int) stream_id, hex)); > +#endif > + > + mg_tun_send_frame(client->disp, stream_id, MG_TUN_DATA_FRAME, 0, msg); > +} > + > +void mg_tun_if_udp_send(struct mg_connection *nc, const void *buf, size_t len) { > + (void) nc; > + (void) buf; > + (void) len; > +} > + > +void mg_tun_if_recved(struct mg_connection *nc, size_t len) { > + (void) nc; > + (void) len; > +} > + > +int mg_tun_if_create_conn(struct mg_connection *nc) { > + (void) nc; > + return 1; > +} > + > +void mg_tun_if_destroy_conn(struct mg_connection *nc) { > + struct mg_tun_client *client = (struct mg_tun_client *) nc->iface->data; > + > + if (nc->flags & MG_F_LISTENING) { > + mg_tun_destroy_client(client); > + } else if (client->disp) { > + uint32_t stream_id = (uint32_t)(uintptr_t) nc->mgr_data; > + struct mg_str msg = {NULL, 0}; > + > + LOG(LL_DEBUG, ("closing 0x%x:", (unsigned int) stream_id)); > + mg_tun_send_frame(client->disp, stream_id, MG_TUN_DATA_FRAME, > + MG_TUN_F_END_STREAM, msg); > + } > +} > + > +/* Associate a socket to a connection. */ > +void mg_tun_if_sock_set(struct mg_connection *nc, sock_t sock) { > + (void) nc; > + (void) sock; > +} > + > +void mg_tun_if_init(struct mg_iface *iface) { > + (void) iface; > +} > + > +void mg_tun_if_free(struct mg_iface *iface) { > + (void) iface; > +} > + > +void mg_tun_if_add_conn(struct mg_connection *nc) { > + nc->sock = INVALID_SOCKET; > +} > + > +void mg_tun_if_remove_conn(struct mg_connection *nc) { > + (void) nc; > +} > + > +time_t mg_tun_if_poll(struct mg_iface *iface, int timeout_ms) { > + (void) iface; > + (void) timeout_ms; > + return (time_t) cs_time(); > +} > + > +void mg_tun_if_get_conn_addr(struct mg_connection *nc, int remote, > + union socket_address *sa) { > + (void) nc; > + (void) remote; > + (void) sa; > +} > + > +struct mg_connection *mg_tun_if_find_conn(struct mg_tun_client *client, > + uint32_t stream_id) { > + struct mg_connection *nc = NULL; > + > + for (nc = client->mgr->active_connections; nc != NULL; nc = nc->next) { > + if (nc->iface != client->iface || (nc->flags & MG_F_LISTENING)) { > + continue; > + } > + if (stream_id == (uint32_t)(uintptr_t) nc->mgr_data) { > + return nc; > + } > + } > + > + if (stream_id > client->last_stream_id) { > + /* create a new connection */ > + LOG(LL_DEBUG, ("new stream 0x%x, accepting", (unsigned int) stream_id)); > + nc = mg_if_accept_new_conn(client->listener); > + nc->mgr_data = (void *) (uintptr_t) stream_id; > + client->last_stream_id = stream_id; > + } else { > + LOG(LL_DEBUG, > + ("Ignoring stream 0x%x (last_stream_id 0x%x)", (unsigned int) stream_id, > + (unsigned int) client->last_stream_id)); > + } > + > + return nc; > +} > + > +/* clang-format off */ > +#define MG_TUN_IFACE_VTABLE \ > + { \ > + mg_tun_if_init, \ > + mg_tun_if_free, \ > + mg_tun_if_add_conn, \ > + mg_tun_if_remove_conn, \ > + mg_tun_if_poll, \ > + mg_tun_if_listen_tcp, \ > + mg_tun_if_listen_udp, \ > + mg_tun_if_connect_tcp, \ > + mg_tun_if_connect_udp, \ > + mg_tun_if_tcp_send, \ > + mg_tun_if_udp_send, \ > + mg_tun_if_recved, \ > + mg_tun_if_create_conn, \ > + mg_tun_if_destroy_conn, \ > + mg_tun_if_sock_set, \ > + mg_tun_if_get_conn_addr, \ > + } > +/* clang-format on */ > + > +const struct mg_iface_vtable mg_tun_iface_vtable = MG_TUN_IFACE_VTABLE; > + > +#endif /* MG_ENABLE_TUN */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/ssl_if_openssl.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_SSL && MG_SSL_IF == MG_SSL_IF_OPENSSL > + > +#ifdef __APPLE__ > +#pragma GCC diagnostic ignored "-Wdeprecated-declarations" > +#endif > + > +#include <openssl/ssl.h> > + > +struct mg_ssl_if_ctx { > + SSL *ssl; > + SSL_CTX *ssl_ctx; > + struct mbuf psk; > + size_t identity_len; > +}; > + > +void mg_ssl_if_init() { > + SSL_library_init(); > +} > + > +enum mg_ssl_if_result mg_ssl_if_conn_accept(struct mg_connection *nc, > + struct mg_connection *lc) { > + struct mg_ssl_if_ctx *ctx = > + (struct mg_ssl_if_ctx *) MG_CALLOC(1, sizeof(*ctx)); > + struct mg_ssl_if_ctx *lc_ctx = (struct mg_ssl_if_ctx *) lc->ssl_if_data; > + nc->ssl_if_data = ctx; > + if (ctx == NULL || lc_ctx == NULL) return MG_SSL_ERROR; > + ctx->ssl_ctx = lc_ctx->ssl_ctx; > + if ((ctx->ssl = SSL_new(ctx->ssl_ctx)) == NULL) { > + return MG_SSL_ERROR; > + } > + return MG_SSL_OK; > +} > + > +static enum mg_ssl_if_result mg_use_cert(SSL_CTX *ctx, const char *cert, > + const char *key, const char **err_msg); > +static enum mg_ssl_if_result mg_use_ca_cert(SSL_CTX *ctx, const char *cert); > +static enum mg_ssl_if_result mg_set_cipher_list(SSL_CTX *ctx, const char *cl); > +static enum mg_ssl_if_result mg_ssl_if_ossl_set_psk(struct mg_ssl_if_ctx *ctx, > + const char *identity, > + const char *key_str); > + > +enum mg_ssl_if_result mg_ssl_if_conn_init( > + struct mg_connection *nc, const struct mg_ssl_if_conn_params *params, > + const char **err_msg) { > + struct mg_ssl_if_ctx *ctx = > + (struct mg_ssl_if_ctx *) MG_CALLOC(1, sizeof(*ctx)); > + DBG(("%p %s,%s,%s", nc, (params->cert ? params->cert : ""), > + (params->key ? params->key : ""), > + (params->ca_cert ? params->ca_cert : ""))); > + if (ctx == NULL) { > + MG_SET_PTRPTR(err_msg, "Out of memory"); > + return MG_SSL_ERROR; > + } > + nc->ssl_if_data = ctx; > + if (nc->flags & MG_F_LISTENING) { > + ctx->ssl_ctx = SSL_CTX_new(SSLv23_server_method()); > + } else { > + ctx->ssl_ctx = SSL_CTX_new(SSLv23_client_method()); > + } > + if (ctx->ssl_ctx == NULL) { > + MG_SET_PTRPTR(err_msg, "Failed to create SSL context"); > + return MG_SSL_ERROR; > + } > + > +#ifndef KR_VERSION > + /* Disable deprecated protocols. */ > + SSL_CTX_set_options(ctx->ssl_ctx, SSL_OP_NO_SSLv2); > + SSL_CTX_set_options(ctx->ssl_ctx, SSL_OP_NO_SSLv3); > + SSL_CTX_set_options(ctx->ssl_ctx, SSL_OP_NO_TLSv1); > +#ifdef MG_SSL_OPENSSL_NO_COMPRESSION > + SSL_CTX_set_options(ctx->ssl_ctx, SSL_OP_NO_COMPRESSION); > +#endif > +#ifdef MG_SSL_OPENSSL_CIPHER_SERVER_PREFERENCE > + SSL_CTX_set_options(ctx->ssl_ctx, SSL_OP_CIPHER_SERVER_PREFERENCE); > +#endif > +#else > +/* Krypton only supports TLSv1.2 anyway. */ > +#endif > + > + if (params->cert != NULL && > + mg_use_cert(ctx->ssl_ctx, params->cert, params->key, err_msg) != > + MG_SSL_OK) { > + return MG_SSL_ERROR; > + } > + > + if (params->ca_cert != NULL && > + mg_use_ca_cert(ctx->ssl_ctx, params->ca_cert) != MG_SSL_OK) { > + MG_SET_PTRPTR(err_msg, "Invalid SSL CA cert"); > + return MG_SSL_ERROR; > + } > + > + if (params->server_name != NULL) { > +#ifdef KR_VERSION > + SSL_CTX_kr_set_verify_name(ctx->ssl_ctx, params->server_name); > +#else > +/* TODO(rojer): Implement server name verification on OpenSSL. */ > +#endif > + } > + > + if (mg_set_cipher_list(ctx->ssl_ctx, params->cipher_suites) != MG_SSL_OK) { > + MG_SET_PTRPTR(err_msg, "Invalid cipher suite list"); > + return MG_SSL_ERROR; > + } > + > + mbuf_init(&ctx->psk, 0); > + if (mg_ssl_if_ossl_set_psk(ctx, params->psk_identity, params->psk_key) != > + MG_SSL_OK) { > + MG_SET_PTRPTR(err_msg, "Invalid PSK settings"); > + return MG_SSL_ERROR; > + } > + > + if (!(nc->flags & MG_F_LISTENING) && > + (ctx->ssl = SSL_new(ctx->ssl_ctx)) == NULL) { > + MG_SET_PTRPTR(err_msg, "Failed to create SSL session"); > + return MG_SSL_ERROR; > + } > + > + nc->flags |= MG_F_SSL; > + > + return MG_SSL_OK; > +} > + > +static enum mg_ssl_if_result mg_ssl_if_ssl_err(struct mg_connection *nc, > + int res) { > + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; > + int err = SSL_get_error(ctx->ssl, res); > + if (err == SSL_ERROR_WANT_READ) return MG_SSL_WANT_READ; > + if (err == SSL_ERROR_WANT_WRITE) return MG_SSL_WANT_WRITE; > + DBG(("%p %p SSL error: %d %d", nc, ctx->ssl_ctx, res, err)); > + nc->err = err; > + return MG_SSL_ERROR; > +} > + > +enum mg_ssl_if_result mg_ssl_if_handshake(struct mg_connection *nc) { > + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; > + int server_side = (nc->listener != NULL); > + int res; > + /* If descriptor is not yet set, do it now. */ > + if (SSL_get_fd(ctx->ssl) < 0) { > + if (SSL_set_fd(ctx->ssl, nc->sock) != 1) return MG_SSL_ERROR; > + } > + res = server_side ? SSL_accept(ctx->ssl) : SSL_connect(ctx->ssl); > + if (res != 1) return mg_ssl_if_ssl_err(nc, res); > + return MG_SSL_OK; > +} > + > +int mg_ssl_if_read(struct mg_connection *nc, void *buf, size_t buf_size) { > + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; > + int n = SSL_read(ctx->ssl, buf, buf_size); > + DBG(("%p %d -> %d", nc, (int) buf_size, n)); > + if (n < 0) return mg_ssl_if_ssl_err(nc, n); > + if (n == 0) nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + return n; > +} > + > +int mg_ssl_if_write(struct mg_connection *nc, const void *data, size_t len) { > + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; > + int n = SSL_write(ctx->ssl, data, len); > + DBG(("%p %d -> %d", nc, (int) len, n)); > + if (n <= 0) return mg_ssl_if_ssl_err(nc, n); > + return n; > +} > + > +void mg_ssl_if_conn_close_notify(struct mg_connection *nc) { > + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; > + if (ctx == NULL) return; > + SSL_shutdown(ctx->ssl); > +} > + > +void mg_ssl_if_conn_free(struct mg_connection *nc) { > + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; > + if (ctx == NULL) return; > + nc->ssl_if_data = NULL; > + if (ctx->ssl != NULL) SSL_free(ctx->ssl); > + if (ctx->ssl_ctx != NULL && nc->listener == NULL) SSL_CTX_free(ctx->ssl_ctx); > + mbuf_free(&ctx->psk); > + memset(ctx, 0, sizeof(*ctx)); > + MG_FREE(ctx); > +} > + > +/* > + * Cipher suite options used for TLS negotiation. > + * https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended_configurations > + */ > +static const char mg_s_cipher_list[] = > +#if defined(MG_SSL_CRYPTO_MODERN) > + "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:" > + "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:" > + "DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:" > + "ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:" > + "ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:" > + "ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:" > + "DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:" > + "DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:" > + "!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK" > +#elif defined(MG_SSL_CRYPTO_OLD) > + "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:" > + "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:" > + "DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:" > + "ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:" > + "ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:" > + "ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:" > + "DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:" > + "DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:" > + "ECDHE-ECDSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:" > + "AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:DES-CBC3-SHA:" > + "HIGH:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:" > + "!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA" > +#else /* Default - intermediate. */ > + "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:" > + "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:" > + "DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:" > + "ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:" > + "ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:" > + "ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:" > + "DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:" > + "DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:" > + "AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:" > + "DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:" > + "!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA" > +#endif > + ; > + > +/* > + * Default DH params for PFS cipher negotiation. This is a 2048-bit group. > + * Will be used if none are provided by the user in the certificate file. > + */ > +#if !MG_DISABLE_PFS && !defined(KR_VERSION) > +static const char mg_s_default_dh_params[] = > + "\ > +-----BEGIN DH PARAMETERS-----\n\ > +MIIBCAKCAQEAlvbgD/qh9znWIlGFcV0zdltD7rq8FeShIqIhkQ0C7hYFThrBvF2E\n\ > +Z9bmgaP+sfQwGpVlv9mtaWjvERbu6mEG7JTkgmVUJrUt/wiRzwTaCXBqZkdUO8Tq\n\ > ++E6VOEQAilstG90ikN1Tfo+K6+X68XkRUIlgawBTKuvKVwBhuvlqTGerOtnXWnrt\n\ > +ym//hd3cd5PBYGBix0i7oR4xdghvfR2WLVu0LgdThTBb6XP7gLd19cQ1JuBtAajZ\n\ > +wMuPn7qlUkEFDIkAZy59/Hue/H2Q2vU/JsvVhHWCQBL4F1ofEAt50il6ZxR1QfFK\n\ > +9VGKDC4oOgm9DlxwwBoC2FjqmvQlqVV3kwIBAg==\n\ > +-----END DH PARAMETERS-----\n"; > +#endif > + > +static enum mg_ssl_if_result mg_use_ca_cert(SSL_CTX *ctx, const char *cert) { > + if (cert == NULL || strcmp(cert, "*") == 0) { > + return MG_SSL_OK; > + } > + SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, 0); > + return SSL_CTX_load_verify_locations(ctx, cert, NULL) == 1 ? MG_SSL_OK > + : MG_SSL_ERROR; > +} > + > +static enum mg_ssl_if_result mg_use_cert(SSL_CTX *ctx, const char *cert, > + const char *key, > + const char **err_msg) { > + if (key == NULL) key = cert; > + if (cert == NULL || cert[0] == '\0' || key == NULL || key[0] == '\0') { > + return MG_SSL_OK; > + } else if (SSL_CTX_use_certificate_file(ctx, cert, 1) == 0) { > + MG_SET_PTRPTR(err_msg, "Invalid SSL cert"); > + return MG_SSL_ERROR; > + } else if (SSL_CTX_use_PrivateKey_file(ctx, key, 1) == 0) { > + MG_SET_PTRPTR(err_msg, "Invalid SSL key"); > + return MG_SSL_ERROR; > + } else if (SSL_CTX_use_certificate_chain_file(ctx, cert) == 0) { > + MG_SET_PTRPTR(err_msg, "Invalid CA bundle"); > + return MG_SSL_ERROR; > + } else { > + SSL_CTX_set_mode(ctx, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER); > +#if !MG_DISABLE_PFS && !defined(KR_VERSION) > + BIO *bio = NULL; > + DH *dh = NULL; > + > + /* Try to read DH parameters from the cert/key file. */ > + bio = BIO_new_file(cert, "r"); > + if (bio != NULL) { > + dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL); > + BIO_free(bio); > + } > + /* > + * If there are no DH params in the file, fall back to hard-coded ones. > + * Not ideal, but better than nothing. > + */ > + if (dh == NULL) { > + bio = BIO_new_mem_buf((void *) mg_s_default_dh_params, -1); > + dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL); > + BIO_free(bio); > + } > + if (dh != NULL) { > + SSL_CTX_set_tmp_dh(ctx, dh); > + SSL_CTX_set_options(ctx, SSL_OP_SINGLE_DH_USE); > + DH_free(dh); > + } > +#if OPENSSL_VERSION_NUMBER > 0x10002000L > + SSL_CTX_set_ecdh_auto(ctx, 1); > +#endif > +#endif > + } > + return MG_SSL_OK; > +} > + > +static enum mg_ssl_if_result mg_set_cipher_list(SSL_CTX *ctx, const char *cl) { > + return (SSL_CTX_set_cipher_list(ctx, cl ? cl : mg_s_cipher_list) == 1 > + ? MG_SSL_OK > + : MG_SSL_ERROR); > +} > + > +#ifndef KR_VERSION > +static unsigned int mg_ssl_if_ossl_psk_cb(SSL *ssl, const char *hint, > + char *identity, > + unsigned int max_identity_len, > + unsigned char *psk, > + unsigned int max_psk_len) { > + struct mg_ssl_if_ctx *ctx = > + (struct mg_ssl_if_ctx *) SSL_CTX_get_app_data(SSL_get_SSL_CTX(ssl)); > + size_t key_len = ctx->psk.len - ctx->identity_len - 1; > + DBG(("hint: '%s'", (hint ? hint : ""))); > + if (ctx->identity_len + 1 > max_identity_len) { > + DBG(("identity too long")); > + return 0; > + } > + if (key_len > max_psk_len) { > + DBG(("key too long")); > + return 0; > + } > + memcpy(identity, ctx->psk.buf, ctx->identity_len + 1); > + memcpy(psk, ctx->psk.buf + ctx->identity_len + 1, key_len); > + (void) ssl; > + return key_len; > +} > + > +static enum mg_ssl_if_result mg_ssl_if_ossl_set_psk(struct mg_ssl_if_ctx *ctx, > + const char *identity, > + const char *key_str) { > + unsigned char key[32]; > + size_t key_len; > + size_t i = 0; > + if (identity == NULL && key_str == NULL) return MG_SSL_OK; > + if (identity == NULL || key_str == NULL) return MG_SSL_ERROR; > + key_len = strlen(key_str); > + if (key_len != 32 && key_len != 64) return MG_SSL_ERROR; > + memset(key, 0, sizeof(key)); > + key_len = 0; > + for (i = 0; key_str[i] != '\0'; i++) { > + unsigned char c; > + char hc = tolower((int) key_str[i]); > + if (hc >= '0' && hc <= '9') { > + c = hc - '0'; > + } else if (hc >= 'a' && hc <= 'f') { > + c = hc - 'a' + 0xa; > + } else { > + return MG_SSL_ERROR; > + } > + key_len = i / 2; > + key[key_len] <<= 4; > + key[key_len] |= c; > + } > + key_len++; > + DBG(("identity = '%s', key = (%u)", identity, (unsigned int) key_len)); > + ctx->identity_len = strlen(identity); > + mbuf_append(&ctx->psk, identity, ctx->identity_len + 1); > + mbuf_append(&ctx->psk, key, key_len); > + SSL_CTX_set_psk_client_callback(ctx->ssl_ctx, mg_ssl_if_ossl_psk_cb); > + SSL_CTX_set_app_data(ctx->ssl_ctx, ctx); > + return MG_SSL_OK; > +} > +#else > +static enum mg_ssl_if_result mg_ssl_if_ossl_set_psk(struct mg_ssl_if_ctx *ctx, > + const char *identity, > + const char *key_str) { > + (void) ctx; > + (void) identity; > + (void) key_str; > + /* Krypton does not support PSK. */ > + return MG_SSL_ERROR; > +} > +#endif /* defined(KR_VERSION) */ > + > +const char *mg_set_ssl(struct mg_connection *nc, const char *cert, > + const char *ca_cert) { > + const char *err_msg = NULL; > + struct mg_ssl_if_conn_params params; > + memset(¶ms, 0, sizeof(params)); > + params.cert = cert; > + params.ca_cert = ca_cert; > + if (mg_ssl_if_conn_init(nc, ¶ms, &err_msg) != MG_SSL_OK) { > + return err_msg; > + } > + return NULL; > +} > + > +#endif /* MG_ENABLE_SSL && MG_SSL_IF == MG_SSL_IF_OPENSSL */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/ssl_if_mbedtls.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_SSL && MG_SSL_IF == MG_SSL_IF_MBEDTLS > + > +#include <mbedtls/debug.h> > +#include <mbedtls/ecp.h> > +#include <mbedtls/platform.h> > +#include <mbedtls/ssl.h> > +#include <mbedtls/x509_crt.h> > + > +static void mg_ssl_mbed_log(void *ctx, int level, const char *file, int line, > + const char *str) { > + enum cs_log_level cs_level; > + switch (level) { > + case 1: > + cs_level = LL_ERROR; > + break; > + case 2: > + case 3: > + cs_level = LL_DEBUG; > + break; > + default: > + cs_level = LL_VERBOSE_DEBUG; > + } > + /* mbedTLS passes strings with \n at the end, strip it. */ > + LOG(cs_level, ("%p %.*s", ctx, (int) (strlen(str) - 1), str)); > + (void) file; > + (void) line; > +} > + > +struct mg_ssl_if_ctx { > + mbedtls_ssl_config *conf; > + mbedtls_ssl_context *ssl; > + mbedtls_x509_crt *cert; > + mbedtls_pk_context *key; > + mbedtls_x509_crt *ca_cert; > + struct mbuf cipher_suites; > +}; > + > +/* Must be provided by the platform. ctx is struct mg_connection. */ > +extern int mg_ssl_if_mbed_random(void *ctx, unsigned char *buf, size_t len); > + > +void mg_ssl_if_init() { > +} > + > +enum mg_ssl_if_result mg_ssl_if_conn_accept(struct mg_connection *nc, > + struct mg_connection *lc) { > + struct mg_ssl_if_ctx *ctx = > + (struct mg_ssl_if_ctx *) MG_CALLOC(1, sizeof(*ctx)); > + struct mg_ssl_if_ctx *lc_ctx = (struct mg_ssl_if_ctx *) lc->ssl_if_data; > + nc->ssl_if_data = ctx; > + if (ctx == NULL || lc_ctx == NULL) return MG_SSL_ERROR; > + ctx->ssl = (mbedtls_ssl_context *) MG_CALLOC(1, sizeof(*ctx->ssl)); > + if (mbedtls_ssl_setup(ctx->ssl, lc_ctx->conf) != 0) { > + return MG_SSL_ERROR; > + } > + return MG_SSL_OK; > +} > + > +static enum mg_ssl_if_result mg_use_cert(struct mg_ssl_if_ctx *ctx, > + const char *cert, const char *key, > + const char **err_msg); > +static enum mg_ssl_if_result mg_use_ca_cert(struct mg_ssl_if_ctx *ctx, > + const char *cert); > +static enum mg_ssl_if_result mg_set_cipher_list(struct mg_ssl_if_ctx *ctx, > + const char *ciphers); > +static enum mg_ssl_if_result mg_ssl_if_mbed_set_psk(struct mg_ssl_if_ctx *ctx, > + const char *identity, > + const char *key); > + > +enum mg_ssl_if_result mg_ssl_if_conn_init( > + struct mg_connection *nc, const struct mg_ssl_if_conn_params *params, > + const char **err_msg) { > + struct mg_ssl_if_ctx *ctx = > + (struct mg_ssl_if_ctx *) MG_CALLOC(1, sizeof(*ctx)); > + DBG(("%p %s,%s,%s", nc, (params->cert ? params->cert : ""), > + (params->key ? params->key : ""), > + (params->ca_cert ? params->ca_cert : ""))); > + > + if (ctx == NULL) { > + MG_SET_PTRPTR(err_msg, "Out of memory"); > + return MG_SSL_ERROR; > + } > + nc->ssl_if_data = ctx; > + ctx->conf = (mbedtls_ssl_config *) MG_CALLOC(1, sizeof(*ctx->conf)); > + mbuf_init(&ctx->cipher_suites, 0); > + mbedtls_ssl_config_init(ctx->conf); > + mbedtls_ssl_conf_dbg(ctx->conf, mg_ssl_mbed_log, nc); > + if (mbedtls_ssl_config_defaults( > + ctx->conf, (nc->flags & MG_F_LISTENING ? MBEDTLS_SSL_IS_SERVER > + : MBEDTLS_SSL_IS_CLIENT), > + MBEDTLS_SSL_TRANSPORT_STREAM, MBEDTLS_SSL_PRESET_DEFAULT) != 0) { > + MG_SET_PTRPTR(err_msg, "Failed to init SSL config"); > + return MG_SSL_ERROR; > + } > + > + /* TLS 1.2 and up */ > + mbedtls_ssl_conf_min_version(ctx->conf, MBEDTLS_SSL_MAJOR_VERSION_3, > + MBEDTLS_SSL_MINOR_VERSION_3); > + mbedtls_ssl_conf_rng(ctx->conf, mg_ssl_if_mbed_random, nc); > + > + if (params->cert != NULL && > + mg_use_cert(ctx, params->cert, params->key, err_msg) != MG_SSL_OK) { > + return MG_SSL_ERROR; > + } > + > + if (params->ca_cert != NULL && > + mg_use_ca_cert(ctx, params->ca_cert) != MG_SSL_OK) { > + MG_SET_PTRPTR(err_msg, "Invalid SSL CA cert"); > + return MG_SSL_ERROR; > + } > + > + if (mg_set_cipher_list(ctx, params->cipher_suites) != MG_SSL_OK) { > + MG_SET_PTRPTR(err_msg, "Invalid cipher suite list"); > + return MG_SSL_ERROR; > + } > + > + if (mg_ssl_if_mbed_set_psk(ctx, params->psk_identity, params->psk_key) != > + MG_SSL_OK) { > + MG_SET_PTRPTR(err_msg, "Invalid PSK settings"); > + return MG_SSL_ERROR; > + } > + > + if (!(nc->flags & MG_F_LISTENING)) { > + ctx->ssl = (mbedtls_ssl_context *) MG_CALLOC(1, sizeof(*ctx->ssl)); > + mbedtls_ssl_init(ctx->ssl); > + if (mbedtls_ssl_setup(ctx->ssl, ctx->conf) != 0) { > + MG_SET_PTRPTR(err_msg, "Failed to create SSL session"); > + return MG_SSL_ERROR; > + } > + if (params->server_name != NULL && > + mbedtls_ssl_set_hostname(ctx->ssl, params->server_name) != 0) { > + return MG_SSL_ERROR; > + } > + } > + > +#ifdef MG_SSL_IF_MBEDTLS_MAX_FRAG_LEN > + if (mbedtls_ssl_conf_max_frag_len(ctx->conf, > +#if MG_SSL_IF_MBEDTLS_MAX_FRAG_LEN == 512 > + MBEDTLS_SSL_MAX_FRAG_LEN_512 > +#elif MG_SSL_IF_MBEDTLS_MAX_FRAG_LEN == 1024 > + MBEDTLS_SSL_MAX_FRAG_LEN_1024 > +#elif MG_SSL_IF_MBEDTLS_MAX_FRAG_LEN == 2048 > + MBEDTLS_SSL_MAX_FRAG_LEN_2048 > +#elif MG_SSL_IF_MBEDTLS_MAX_FRAG_LEN == 4096 > + MBEDTLS_SSL_MAX_FRAG_LEN_4096 > +#else > +#error Invalid MG_SSL_IF_MBEDTLS_MAX_FRAG_LEN > +#endif > + ) != 0) { > + return MG_SSL_ERROR; > + } > +#endif > + > + nc->flags |= MG_F_SSL; > + > + return MG_SSL_OK; > +} > + > +#if MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL > +int ssl_socket_send(void *ctx, const unsigned char *buf, size_t len); > +int ssl_socket_recv(void *ctx, unsigned char *buf, size_t len); > +#else > +static int ssl_socket_send(void *ctx, const unsigned char *buf, size_t len) { > + struct mg_connection *nc = (struct mg_connection *) ctx; > + int n = (int) MG_SEND_FUNC(nc->sock, buf, len, 0); > + LOG(LL_DEBUG, ("%p %d -> %d", nc, (int) len, n)); > + if (n >= 0) return n; > + n = mg_get_errno(); > + return ((n == EAGAIN || n == EINPROGRESS) ? MBEDTLS_ERR_SSL_WANT_WRITE : -1); > +} > + > +static int ssl_socket_recv(void *ctx, unsigned char *buf, size_t len) { > + struct mg_connection *nc = (struct mg_connection *) ctx; > + int n = (int) MG_RECV_FUNC(nc->sock, buf, len, 0); > + LOG(LL_DEBUG, ("%p %d <- %d", nc, (int) len, n)); > + if (n >= 0) return n; > + n = mg_get_errno(); > + return ((n == EAGAIN || n == EINPROGRESS) ? MBEDTLS_ERR_SSL_WANT_READ : -1); > +} > +#endif > + > +static enum mg_ssl_if_result mg_ssl_if_mbed_err(struct mg_connection *nc, > + int ret) { > + if (ret == MBEDTLS_ERR_SSL_WANT_READ) return MG_SSL_WANT_READ; > + if (ret == MBEDTLS_ERR_SSL_WANT_WRITE) return MG_SSL_WANT_WRITE; > + if (ret != > + MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY) { /* CLOSE_NOTIFY = Normal shutdown */ > + LOG(LL_ERROR, ("%p SSL error: %d", nc, ret)); > + } > + nc->err = ret; > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + return MG_SSL_ERROR; > +} > + > +static void mg_ssl_if_mbed_free_certs_and_keys(struct mg_ssl_if_ctx *ctx) { > + if (ctx->cert != NULL) { > + mbedtls_x509_crt_free(ctx->cert); > + MG_FREE(ctx->cert); > + ctx->cert = NULL; > + mbedtls_pk_free(ctx->key); > + MG_FREE(ctx->key); > + ctx->key = NULL; > + } > + if (ctx->ca_cert != NULL) { > + mbedtls_ssl_conf_ca_chain(ctx->conf, NULL, NULL); > +#ifdef MBEDTLS_X509_CA_CHAIN_ON_DISK > + if (ctx->ca_cert->ca_chain_file != NULL) { > + MG_FREE((void *) ctx->ca_cert->ca_chain_file); > + ctx->ca_cert->ca_chain_file = NULL; > + } > +#endif > + mbedtls_x509_crt_free(ctx->ca_cert); > + MG_FREE(ctx->ca_cert); > + ctx->ca_cert = NULL; > + } > +} > + > +enum mg_ssl_if_result mg_ssl_if_handshake(struct mg_connection *nc) { > + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; > + int err; > > + /* If bio is not yet set, do it now. */ > + if (ctx->ssl->p_bio == NULL) { > + mbedtls_ssl_set_bio(ctx->ssl, nc, ssl_socket_send, ssl_socket_recv, NULL); > + } > + err = mbedtls_ssl_handshake(ctx->ssl); > + if (err != 0) return mg_ssl_if_mbed_err(nc, err); > +#ifdef MG_SSL_IF_MBEDTLS_FREE_CERTS > + /* > + * Free the peer certificate, we don't need it after handshake. > + * Note that this effectively disables renegotiation. > + */ > + mbedtls_x509_crt_free(ctx->ssl->session->peer_cert); > + mbedtls_free(ctx->ssl->session->peer_cert); > + ctx->ssl->session->peer_cert = NULL; > + /* On a client connection we can also free our own and CA certs. */ > + if (nc->listener == NULL) { > + if (ctx->conf->key_cert != NULL) { > + /* Note that this assumes one key_cert entry, which matches our init. */ > + MG_FREE(ctx->conf->key_cert); > + ctx->conf->key_cert = NULL; > + } > + mbedtls_ssl_conf_ca_chain(ctx->conf, NULL, NULL); > + mg_ssl_if_mbed_free_certs_and_keys(ctx); > + } > +#endif > + return MG_SSL_OK; > +} > + > +int mg_ssl_if_read(struct mg_connection *nc, void *buf, size_t buf_size) { > + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; > + int n = mbedtls_ssl_read(ctx->ssl, (unsigned char *) buf, buf_size); > + DBG(("%p %d -> %d", nc, (int) buf_size, n)); > + if (n < 0) return mg_ssl_if_mbed_err(nc, n); > + if (n == 0) nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + return n; > +} > + > +int mg_ssl_if_write(struct mg_connection *nc, const void *data, size_t len) { > + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; > + int n = mbedtls_ssl_write(ctx->ssl, (const unsigned char *) data, len); > + DBG(("%p %d -> %d", nc, (int) len, n)); > + if (n < 0) return mg_ssl_if_mbed_err(nc, n); > + return n; > +} > + > +void mg_ssl_if_conn_close_notify(struct mg_connection *nc) { > + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; > + if (ctx == NULL) return; > + mbedtls_ssl_close_notify(ctx->ssl); > +} > + > +void mg_ssl_if_conn_free(struct mg_connection *nc) { > + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; > + if (ctx == NULL) return; > + nc->ssl_if_data = NULL; > + if (ctx->ssl != NULL) { > + mbedtls_ssl_free(ctx->ssl); > + MG_FREE(ctx->ssl); > + } > + mg_ssl_if_mbed_free_certs_and_keys(ctx); > + if (ctx->conf != NULL) { > + mbedtls_ssl_config_free(ctx->conf); > + MG_FREE(ctx->conf); > + } > + mbuf_free(&ctx->cipher_suites); > + memset(ctx, 0, sizeof(*ctx)); > + MG_FREE(ctx); > +} > + > +static enum mg_ssl_if_result mg_use_ca_cert(struct mg_ssl_if_ctx *ctx, > + const char *ca_cert) { > + if (ca_cert == NULL || strcmp(ca_cert, "*") == 0) { > + mbedtls_ssl_conf_authmode(ctx->conf, MBEDTLS_SSL_VERIFY_NONE); > + return MG_SSL_OK; > + } > + ctx->ca_cert = (mbedtls_x509_crt *) MG_CALLOC(1, sizeof(*ctx->ca_cert)); > + mbedtls_x509_crt_init(ctx->ca_cert); > +#ifdef MBEDTLS_X509_CA_CHAIN_ON_DISK > + ca_cert = strdup(ca_cert); > + if (mbedtls_x509_crt_set_ca_chain_file(ctx->ca_cert, ca_cert) != 0) { > + return MG_SSL_ERROR; > + } > +#else > + if (mbedtls_x509_crt_parse_file(ctx->ca_cert, ca_cert) != 0) { > + return MG_SSL_ERROR; > + } > +#endif > + mbedtls_ssl_conf_ca_chain(ctx->conf, ctx->ca_cert, NULL); > + mbedtls_ssl_conf_authmode(ctx->conf, MBEDTLS_SSL_VERIFY_REQUIRED); > + return MG_SSL_OK; > +} > + > +static enum mg_ssl_if_result mg_use_cert(struct mg_ssl_if_ctx *ctx, > + const char *cert, const char *key, > + const char **err_msg) { > + if (key == NULL) key = cert; > + if (cert == NULL || cert[0] == '\0' || key == NULL || key[0] == '\0') { > + return MG_SSL_OK; > + } > + ctx->cert = (mbedtls_x509_crt *) MG_CALLOC(1, sizeof(*ctx->cert)); > + mbedtls_x509_crt_init(ctx->cert); > + ctx->key = (mbedtls_pk_context *) MG_CALLOC(1, sizeof(*ctx->key)); > + mbedtls_pk_init(ctx->key); > + if (mbedtls_x509_crt_parse_file(ctx->cert, cert) != 0) { > + MG_SET_PTRPTR(err_msg, "Invalid SSL cert"); > + return MG_SSL_ERROR; > + } > + if (mbedtls_pk_parse_keyfile(ctx->key, key, NULL) != 0) { > + MG_SET_PTRPTR(err_msg, "Invalid SSL key"); > + return MG_SSL_ERROR; > + } > + if (mbedtls_ssl_conf_own_cert(ctx->conf, ctx->cert, ctx->key) != 0) { > + MG_SET_PTRPTR(err_msg, "Invalid SSL key or cert"); > + return MG_SSL_ERROR; > + } > + return MG_SSL_OK; > +} > + > +static const int mg_s_cipher_list[] = { > + MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, > + MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, > + MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, > + MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, > + MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, > + MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, > + MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, > + MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, > + MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, > + MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, > + MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, > + MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, > + MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256, > + MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256, > + MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA, 0}; > + > +/* > + * Ciphers can be specified as a colon-separated list of cipher suite names. > + * These can be found in > + * https://github.com/ARMmbed/mbedtls/blob/development/library/ssl_ciphersuites.c#L267 > + * E.g.: TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-256-CCM > + */ > +static enum mg_ssl_if_result mg_set_cipher_list(struct mg_ssl_if_ctx *ctx, > + const char *ciphers) { > + if (ciphers != NULL) { > + int l, id; > + const char *s = ciphers, *e; > + char tmp[50]; > + while (s != NULL) { > + e = strchr(s, ':'); > + l = (e != NULL ? (e - s) : (int) strlen(s)); > + strncpy(tmp, s, l); > + tmp[l] = '\0'; > + id = mbedtls_ssl_get_ciphersuite_id(tmp); > + DBG(("%s -> %04x", tmp, id)); > + if (id != 0) { > + mbuf_append(&ctx->cipher_suites, &id, sizeof(id)); > + } > + s = (e != NULL ? e + 1 : NULL); > + } > + if (ctx->cipher_suites.len == 0) return MG_SSL_ERROR; > + id = 0; > + mbuf_append(&ctx->cipher_suites, &id, sizeof(id)); > + mbuf_trim(&ctx->cipher_suites); > + mbedtls_ssl_conf_ciphersuites(ctx->conf, > + (const int *) ctx->cipher_suites.buf); > + } else { > + mbedtls_ssl_conf_ciphersuites(ctx->conf, mg_s_cipher_list); > + } > + return MG_SSL_OK; > +} > + > +static enum mg_ssl_if_result mg_ssl_if_mbed_set_psk(struct mg_ssl_if_ctx *ctx, > + const char *identity, > + const char *key_str) { > + unsigned char key[32]; > + size_t key_len; > + if (identity == NULL && key_str == NULL) return MG_SSL_OK; > + if (identity == NULL || key_str == NULL) return MG_SSL_ERROR; > + key_len = strlen(key_str); > + if (key_len != 32 && key_len != 64) return MG_SSL_ERROR; > + size_t i = 0; > + memset(key, 0, sizeof(key)); > + key_len = 0; > + for (i = 0; key_str[i] != '\0'; i++) { > + unsigned char c; > + char hc = tolower((int) key_str[i]); > + if (hc >= '0' && hc <= '9') { > + c = hc - '0'; > + } else if (hc >= 'a' && hc <= 'f') { > + c = hc - 'a' + 0xa; > + } else { > + return MG_SSL_ERROR; > + } > + key_len = i / 2; > + key[key_len] <<= 4; > + key[key_len] |= c; > + } > + key_len++; > + DBG(("identity = '%s', key = (%u)", identity, (unsigned int) key_len)); > + /* mbedTLS makes copies of psk and identity. */ > + if (mbedtls_ssl_conf_psk(ctx->conf, (const unsigned char *) key, key_len, > + (const unsigned char *) identity, > + strlen(identity)) != 0) { > + return MG_SSL_ERROR; > + } > + return MG_SSL_OK; > +} > + > +const char *mg_set_ssl(struct mg_connection *nc, const char *cert, > + const char *ca_cert) { > + const char *err_msg = NULL; > + struct mg_ssl_if_conn_params params; > + memset(¶ms, 0, sizeof(params)); > + params.cert = cert; > + params.ca_cert = ca_cert; > + if (mg_ssl_if_conn_init(nc, ¶ms, &err_msg) != MG_SSL_OK) { > + return err_msg; > + } > + return NULL; > +} > + > +/* Lazy RNG. Warning: it would be a bad idea to do this in production! */ > +#ifdef MG_SSL_MBED_DUMMY_RANDOM > +int mg_ssl_if_mbed_random(void *ctx, unsigned char *buf, size_t len) { > + (void) ctx; > + while (len--) *buf++ = rand(); > + return 0; > +} > +#endif > + > +#endif /* MG_ENABLE_SSL && MG_SSL_IF == MG_SSL_IF_MBEDTLS */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/uri.c" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/uri.h" */ > + > +/* > + * scan string until encountering one of `seps`, keeping track of component > + * boundaries in `res`. > + * > + * `p` will point to the char after the separator or it will be `end`. > + */ > +static void parse_uri_component(const char **p, const char *end, > + const char *seps, struct mg_str *res) { > + const char *q; > + res->p = *p; > + for (; *p < end; (*p)++) { > + for (q = seps; *q != '\0'; q++) { > + if (**p == *q) break; > + } > + if (*q != '\0') break; > + } > + res->len = (*p) - res->p; > + if (*p < end) (*p)++; > +} > + > +int mg_parse_uri(const struct mg_str uri, struct mg_str *scheme, > + struct mg_str *user_info, struct mg_str *host, > + unsigned int *port, struct mg_str *path, struct mg_str *query, > + struct mg_str *fragment) { > + struct mg_str rscheme = {0, 0}, ruser_info = {0, 0}, rhost = {0, 0}, > + rpath = {0, 0}, rquery = {0, 0}, rfragment = {0, 0}; > + unsigned int rport = 0; > + enum { > + P_START, > + P_SCHEME_OR_PORT, > + P_USER_INFO, > + P_HOST, > + P_PORT, > + P_REST > + } state = P_START; > + > + const char *p = uri.p, *end = p + uri.len; > + while (p < end) { > + switch (state) { > + case P_START: > + /* > + * expecting on of: > + * - `scheme://xxxx` > + * - `xxxx:port` > + * - `[a:b:c]:port` > + * - `xxxx/path` > + */ > + if (*p == '[') { > + state = P_HOST; > + break; > + } > + for (; p < end; p++) { > + if (*p == ':') { > + state = P_SCHEME_OR_PORT; > + break; > + } else if (*p == '/') { > + state = P_REST; > + break; > + } > + } > + if (state == P_START || state == P_REST) { > + rhost.p = uri.p; > + rhost.len = p - uri.p; > + } > + break; > + case P_SCHEME_OR_PORT: > + if (end - p >= 3 && strncmp(p, "://", 3) == 0) { > + rscheme.p = uri.p; > + rscheme.len = p - uri.p; > + state = P_USER_INFO; > + p += 3; > + } else { > + rhost.p = uri.p; > + rhost.len = p - uri.p; > + state = P_PORT; > + } > + break; > + case P_USER_INFO: > + ruser_info.p = p; > + for (; p < end; p++) { > + if (*p == '@' || *p == '[') { > + break; > + } > + } > + if (p == end || *p == '/' || *p == '[') { > + /* backtrack and parse as host */ > + p = ruser_info.p; > + } > + ruser_info.len = p - ruser_info.p; > + state = P_HOST; > + break; > + case P_HOST: > + if (*p == '@') p++; > + rhost.p = p; > + if (*p == '[') { > + int found = 0; > + for (; !found && p < end; p++) { > + found = (*p == ']'); > + } > + if (!found) return -1; > + } else { > + for (; p < end; p++) { > + if (*p == ':' || *p == '/') break; > + } > + } > + rhost.len = p - rhost.p; > + if (p < end) { > + if (*p == ':') { > + state = P_PORT; > + break; > + } else if (*p == '/') { > + state = P_REST; > + break; > + } > + } > + break; > + case P_PORT: > + p++; > + for (; p < end; p++) { > + if (*p == '/') { > + state = P_REST; > + break; > + } > + rport *= 10; > + rport += *p - '0'; > + } > + break; > + case P_REST: > + /* `p` points to separator. `path` includes the separator */ > + parse_uri_component(&p, end, "?#", &rpath); > + if (p < end && *(p - 1) == '?') { > + parse_uri_component(&p, end, "#", &rquery); > + } > + parse_uri_component(&p, end, "", &rfragment); > + break; > + } > + } > + > + if (scheme != 0) *scheme = rscheme; > + if (user_info != 0) *user_info = ruser_info; > + if (host != 0) *host = rhost; > + if (port != 0) *port = rport; > + if (path != 0) *path = rpath; > + if (query != 0) *query = rquery; > + if (fragment != 0) *fragment = rfragment; > + > + return 0; > +} > + > +/* Normalize the URI path. Remove/resolve "." and "..". */ > +int mg_normalize_uri_path(const struct mg_str *in, struct mg_str *out) { > + const char *s = in->p, *se = s + in->len; > + char *cp = (char *) out->p, *d; > + > + if (in->len == 0 || *s != '/') { > + out->len = 0; > + return 0; > + } > + > + d = cp; > + > + while (s < se) { > + const char *next = s; > + struct mg_str component; > + parse_uri_component(&next, se, "/", &component); > + if (mg_vcmp(&component, ".") == 0) { > + /* Yum. */ > + } else if (mg_vcmp(&component, "..") == 0) { > + /* Backtrack to previous slash. */ > + if (d > cp + 1 && *(d - 1) == '/') d--; > + while (d > cp && *(d - 1) != '/') d--; > + } else { > + memmove(d, s, next - s); > + d += next - s; > + } > + s = next; > + } > + if (d == cp) *d++ = '/'; > + > + out->p = cp; > + out->len = d - cp; > + return 1; > +} > + > +int mg_assemble_uri(const struct mg_str *scheme, const struct mg_str *user_info, > + const struct mg_str *host, unsigned int port, > + const struct mg_str *path, const struct mg_str *query, > + const struct mg_str *fragment, int normalize_path, > + struct mg_str *uri) { > + int result = -1; > + struct mbuf out; > + mbuf_init(&out, 0); > + > + if (scheme != NULL && scheme->len > 0) { > + mbuf_append(&out, scheme->p, scheme->len); > + mbuf_append(&out, "://", 3); > + } > + > + if (user_info != NULL && user_info->len > 0) { > + mbuf_append(&out, user_info->p, user_info->len); > + mbuf_append(&out, "@", 1); > + } > + > + if (host != NULL && host->len > 0) { > + mbuf_append(&out, host->p, host->len); > + } > + > + if (port != 0) { > + char port_str[20]; > + int port_str_len = sprintf(port_str, ":%u", port); > + mbuf_append(&out, port_str, port_str_len); > + } > + > + if (path != NULL && path->len > 0) { > + if (normalize_path) { > + struct mg_str npath = mg_strdup(*path); > + if (npath.len != path->len) goto out; > + if (!mg_normalize_uri_path(path, &npath)) { > + free((void *) npath.p); > + goto out; > + } > + mbuf_append(&out, npath.p, npath.len); > + free((void *) npath.p); > + } else { > + mbuf_append(&out, path->p, path->len); > + } > + } else if (normalize_path) { > + mbuf_append(&out, "/", 1); > + } > + > + if (query != NULL && query->len > 0) { > + mbuf_append(&out, "?", 1); > + mbuf_append(&out, query->p, query->len); > + } > + > + if (fragment != NULL && fragment->len > 0) { > + mbuf_append(&out, "#", 1); > + mbuf_append(&out, fragment->p, fragment->len); > + } > + > + result = 0; > + > +out: > + if (result == 0) { > + uri->p = out.buf; > + uri->len = out.len; > + } else { > + mbuf_free(&out); > + uri->p = NULL; > + uri->len = 0; > + } > + return result; > +} > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/http.c" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_HTTP > + > +/* Amalgamated: #include "common/md5.h" */ > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/util.h" */ > + > +static const char *mg_version_header = "Mongoose/" MG_VERSION; > + > +enum mg_http_proto_data_type { DATA_NONE, DATA_FILE, DATA_PUT }; > + > +struct mg_http_proto_data_file { > + FILE *fp; /* Opened file. */ > + int64_t cl; /* Content-Length. How many bytes to send. */ > + int64_t sent; /* How many bytes have been already sent. */ > + int keepalive; /* Keep connection open after sending. */ > + enum mg_http_proto_data_type type; > +}; > + > +#if MG_ENABLE_HTTP_CGI > +struct mg_http_proto_data_cgi { > + struct mg_connection *cgi_nc; > +}; > +#endif > + > +struct mg_http_proto_data_chuncked { > + int64_t body_len; /* How many bytes of chunked body was reassembled. */ > +}; > + > +struct mg_http_endpoint { > + struct mg_http_endpoint *next; > + struct mg_str uri_pattern; /* owned */ > + char *auth_domain; /* owned */ > + char *auth_file; /* owned */ > + > + mg_event_handler_t handler; > +#if MG_ENABLE_CALLBACK_USERDATA > + void *user_data; > +#endif > +}; > + > +enum mg_http_multipart_stream_state { > + MPS_BEGIN, > + MPS_WAITING_FOR_BOUNDARY, > + MPS_WAITING_FOR_CHUNK, > + MPS_GOT_CHUNK, > + MPS_GOT_BOUNDARY, > + MPS_FINALIZE, > + MPS_FINISHED > +}; > + > +struct mg_http_multipart_stream { > + const char *boundary; > + int boundary_len; > + const char *var_name; > + const char *file_name; > + void *user_data; > + int prev_io_len; > + enum mg_http_multipart_stream_state state; > + int processing_part; > +}; > + > +struct mg_reverse_proxy_data { > + struct mg_connection *linked_conn; > +}; > + > +struct mg_ws_proto_data { > + size_t reass_len; /* Defragmented size of the frame so far. */ > +}; > + > +struct mg_http_proto_data { > +#if MG_ENABLE_FILESYSTEM > + struct mg_http_proto_data_file file; > +#endif > +#if MG_ENABLE_HTTP_CGI > + struct mg_http_proto_data_cgi cgi; > +#endif > +#if MG_ENABLE_HTTP_STREAMING_MULTIPART > + struct mg_http_multipart_stream mp_stream; > +#endif > +#if MG_ENABLE_HTTP_WEBSOCKET > + struct mg_ws_proto_data ws_data; > +#endif > + struct mg_http_proto_data_chuncked chunk; > + struct mg_http_endpoint *endpoints; > + mg_event_handler_t endpoint_handler; > + struct mg_reverse_proxy_data reverse_proxy_data; > + size_t rcvd; /* How many bytes we have received. */ > +}; > + > +static void mg_http_conn_destructor(void *proto_data); > +struct mg_connection *mg_connect_http_base( > + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), > + struct mg_connect_opts opts, const char *scheme1, const char *scheme2, > + const char *scheme_ssl1, const char *scheme_ssl2, const char *url, > + struct mg_str *path, struct mg_str *user_info, struct mg_str *host); > + > +static struct mg_http_proto_data *mg_http_get_proto_data( > + struct mg_connection *c) { > + if (c->proto_data == NULL) { > + c->proto_data = MG_CALLOC(1, sizeof(struct mg_http_proto_data)); > + c->proto_data_destructor = mg_http_conn_destructor; > + } > + > + return (struct mg_http_proto_data *) c->proto_data; > +} > + > +#if MG_ENABLE_HTTP_STREAMING_MULTIPART > +static void mg_http_free_proto_data_mp_stream( > + struct mg_http_multipart_stream *mp) { > + MG_FREE((void *) mp->boundary); > + MG_FREE((void *) mp->var_name); > + MG_FREE((void *) mp->file_name); > + memset(mp, 0, sizeof(*mp)); > +} > +#endif > + > +#if MG_ENABLE_FILESYSTEM > +static void mg_http_free_proto_data_file(struct mg_http_proto_data_file *d) { > + if (d != NULL) { > + if (d->fp != NULL) { > + fclose(d->fp); > + } > + memset(d, 0, sizeof(struct mg_http_proto_data_file)); > + } > +} > +#endif > + > +static void mg_http_free_proto_data_endpoints(struct mg_http_endpoint **ep) { > + struct mg_http_endpoint *current = *ep; > + > + while (current != NULL) { > + struct mg_http_endpoint *tmp = current->next; > + MG_FREE((void *) current->uri_pattern.p); > + MG_FREE((void *) current->auth_domain); > + MG_FREE((void *) current->auth_file); > + MG_FREE(current); > + current = tmp; > + } > + > + ep = NULL; > +} > + > +static void mg_http_free_reverse_proxy_data(struct mg_reverse_proxy_data *rpd) { > + if (rpd->linked_conn != NULL) { > + /* > + * Connection has linked one, we have to unlink & close it > + * since _this_ connection is going to die and > + * it doesn't make sense to keep another one > + */ > + struct mg_http_proto_data *pd = mg_http_get_proto_data(rpd->linked_conn); > + if (pd->reverse_proxy_data.linked_conn != NULL) { > + pd->reverse_proxy_data.linked_conn->flags |= MG_F_SEND_AND_CLOSE; > + pd->reverse_proxy_data.linked_conn = NULL; > + } > + rpd->linked_conn = NULL; > + } > +} > + > +static void mg_http_conn_destructor(void *proto_data) { > + struct mg_http_proto_data *pd = (struct mg_http_proto_data *) proto_data; > +#if MG_ENABLE_FILESYSTEM > + mg_http_free_proto_data_file(&pd->file); > +#endif > +#if MG_ENABLE_HTTP_CGI > + mg_http_free_proto_data_cgi(&pd->cgi); > +#endif > +#if MG_ENABLE_HTTP_STREAMING_MULTIPART > + mg_http_free_proto_data_mp_stream(&pd->mp_stream); > +#endif > + mg_http_free_proto_data_endpoints(&pd->endpoints); > + mg_http_free_reverse_proxy_data(&pd->reverse_proxy_data); > + MG_FREE(proto_data); > +} > + > +#if MG_ENABLE_FILESYSTEM > + > +#define MIME_ENTRY(_ext, _type) \ > + { _ext, sizeof(_ext) - 1, _type } > +static const struct { > + const char *extension; > + size_t ext_len; > + const char *mime_type; > +} mg_static_builtin_mime_types[] = { > + MIME_ENTRY("html", "text/html"), > + MIME_ENTRY("html", "text/html"), > + MIME_ENTRY("htm", "text/html"), > + MIME_ENTRY("shtm", "text/html"), > + MIME_ENTRY("shtml", "text/html"), > + MIME_ENTRY("css", "text/css"), > + MIME_ENTRY("js", "application/x-javascript"), > + MIME_ENTRY("ico", "image/x-icon"), > + MIME_ENTRY("gif", "image/gif"), > + MIME_ENTRY("jpg", "image/jpeg"), > + MIME_ENTRY("jpeg", "image/jpeg"), > + MIME_ENTRY("png", "image/png"), > + MIME_ENTRY("svg", "image/svg+xml"), > + MIME_ENTRY("txt", "text/plain"), > + MIME_ENTRY("torrent", "application/x-bittorrent"), > + MIME_ENTRY("wav", "audio/x-wav"), > + MIME_ENTRY("mp3", "audio/x-mp3"), > + MIME_ENTRY("mid", "audio/mid"), > + MIME_ENTRY("m3u", "audio/x-mpegurl"), > + MIME_ENTRY("ogg", "application/ogg"), > + MIME_ENTRY("ram", "audio/x-pn-realaudio"), > + MIME_ENTRY("xml", "text/xml"), > + MIME_ENTRY("ttf", "application/x-font-ttf"), > + MIME_ENTRY("json", "application/json"), > + MIME_ENTRY("xslt", "application/xml"), > + MIME_ENTRY("xsl", "application/xml"), > + MIME_ENTRY("ra", "audio/x-pn-realaudio"), > + MIME_ENTRY("doc", "application/msword"), > + MIME_ENTRY("exe", "application/octet-stream"), > + MIME_ENTRY("zip", "application/x-zip-compressed"), > + MIME_ENTRY("xls", "application/excel"), > + MIME_ENTRY("tgz", "application/x-tar-gz"), > + MIME_ENTRY("tar", "application/x-tar"), > + MIME_ENTRY("gz", "application/x-gunzip"), > + MIME_ENTRY("arj", "application/x-arj-compressed"), > + MIME_ENTRY("rar", "application/x-rar-compressed"), > + MIME_ENTRY("rtf", "application/rtf"), > + MIME_ENTRY("pdf", "application/pdf"), > + MIME_ENTRY("swf", "application/x-shockwave-flash"), > + MIME_ENTRY("mpg", "video/mpeg"), > + MIME_ENTRY("webm", "video/webm"), > + MIME_ENTRY("mpeg", "video/mpeg"), > + MIME_ENTRY("mov", "video/quicktime"), > + MIME_ENTRY("mp4", "video/mp4"), > + MIME_ENTRY("m4v", "video/x-m4v"), > + MIME_ENTRY("asf", "video/x-ms-asf"), > + MIME_ENTRY("avi", "video/x-msvideo"), > + MIME_ENTRY("bmp", "image/bmp"), > + {NULL, 0, NULL}}; > + > +static struct mg_str mg_get_mime_type(const char *path, const char *dflt, > + const struct mg_serve_http_opts *opts) { > + const char *ext, *overrides; > + size_t i, path_len; > + struct mg_str r, k, v; > + > + path_len = strlen(path); > + > + overrides = opts->custom_mime_types; > + while ((overrides = mg_next_comma_list_entry(overrides, &k, &v)) != NULL) { > + ext = path + (path_len - k.len); > + if (path_len > k.len && mg_vcasecmp(&k, ext) == 0) { > + return v; > + } > + } > + > + for (i = 0; mg_static_builtin_mime_types[i].extension != NULL; i++) { > + ext = path + (path_len - mg_static_builtin_mime_types[i].ext_len); > + if (path_len > mg_static_builtin_mime_types[i].ext_len && ext[-1] == '.' && > + mg_casecmp(ext, mg_static_builtin_mime_types[i].extension) == 0) { > + r.p = mg_static_builtin_mime_types[i].mime_type; > + r.len = strlen(r.p); > + return r; > + } > + } > + > + r.p = dflt; > + r.len = strlen(r.p); > + return r; > +} > +#endif > + > +/* > + * Check whether full request is buffered. Return: > + * -1 if request is malformed > + * 0 if request is not yet fully buffered > + * >0 actual request length, including last \r\n\r\n > + */ > +static int mg_http_get_request_len(const char *s, int buf_len) { > + const unsigned char *buf = (unsigned char *) s; > + int i; > + > + for (i = 0; i < buf_len; i++) { > + if (!isprint(buf[i]) && buf[i] != '\r' && buf[i] != '\n' && buf[i] < 128) { > + return -1; > + } else if (buf[i] == '\n' && i + 1 < buf_len && buf[i + 1] == '\n') { > + return i + 2; > + } else if (buf[i] == '\n' && i + 2 < buf_len && buf[i + 1] == '\r' && > + buf[i + 2] == '\n') { > + return i + 3; > + } > + } > + > + return 0; > +} > + > +static const char *mg_http_parse_headers(const char *s, const char *end, > + int len, struct http_message *req) { > + int i = 0; > + while (i < (int) ARRAY_SIZE(req->header_names) - 1) { > + struct mg_str *k = &req->header_names[i], *v = &req->header_values[i]; > + > + s = mg_skip(s, end, ": ", k); > + s = mg_skip(s, end, "\r\n", v); > + > + while (v->len > 0 && v->p[v->len - 1] == ' ') { > + v->len--; /* Trim trailing spaces in header value */ > + } > + > + /* > + * If header value is empty - skip it and go to next (if any). > + * NOTE: Do not add it to headers_values because such addition changes API > + * behaviour > + */ > + if (k->len != 0 && v->len == 0) { > + continue; > + } > + > + if (k->len == 0 || v->len == 0) { > + k->p = v->p = NULL; > + k->len = v->len = 0; > + break; > + } > + > + if (!mg_ncasecmp(k->p, "Content-Length", 14)) { > + req->body.len = (size_t) to64(v->p); > + req->message.len = len + req->body.len; > + } > + > + i++; > + } > + > + return s; > +} > + > +int mg_parse_http(const char *s, int n, struct http_message *hm, int is_req) { > + const char *end, *qs; > + int len = mg_http_get_request_len(s, n); > + > + if (len <= 0) return len; > + > + memset(hm, 0, sizeof(*hm)); > + hm->message.p = s; > + hm->body.p = s + len; > + hm->message.len = hm->body.len = (size_t) ~0; > + end = s + len; > + > + /* Request is fully buffered. Skip leading whitespaces. */ > + while (s < end && isspace(*(unsigned char *) s)) s++; > + > + if (is_req) { > + /* Parse request line: method, URI, proto */ > + s = mg_skip(s, end, " ", &hm->method); > + s = mg_skip(s, end, " ", &hm->uri); > + s = mg_skip(s, end, "\r\n", &hm->proto); > + if (hm->uri.p <= hm->method.p || hm->proto.p <= hm->uri.p) return -1; > + > + /* If URI contains '?' character, initialize query_string */ > + if ((qs = (char *) memchr(hm->uri.p, '?', hm->uri.len)) != NULL) { > + hm->query_string.p = qs + 1; > + hm->query_string.len = &hm->uri.p[hm->uri.len] - (qs + 1); > + hm->uri.len = qs - hm->uri.p; > + } > + } else { > + s = mg_skip(s, end, " ", &hm->proto); > + if (end - s < 4 || s[3] != ' ') return -1; > + hm->resp_code = atoi(s); > + if (hm->resp_code < 100 || hm->resp_code >= 600) return -1; > + s += 4; > + s = mg_skip(s, end, "\r\n", &hm->resp_status_msg); > + } > + > + s = mg_http_parse_headers(s, end, len, hm); > + > + /* > + * mg_parse_http() is used to parse both HTTP requests and HTTP > + * responses. If HTTP response does not have Content-Length set, then > + * body is read until socket is closed, i.e. body.len is infinite (~0). > + * > + * For HTTP requests though, according to > + * http://tools.ietf.org/html/rfc7231#section-8.1.3, > + * only POST and PUT methods have defined body semantics. > + * Therefore, if Content-Length is not specified and methods are > + * not one of PUT or POST, set body length to 0. > + * > + * So, > + * if it is HTTP request, and Content-Length is not set, > + * and method is not (PUT or POST) then reset body length to zero. > + */ > + if (hm->body.len == (size_t) ~0 && is_req && > + mg_vcasecmp(&hm->method, "PUT") != 0 && > + mg_vcasecmp(&hm->method, "POST") != 0) { > + hm->body.len = 0; > + hm->message.len = len; > + } > + > + return len; > +} > + > +struct mg_str *mg_get_http_header(struct http_message *hm, const char *name) { > + size_t i, len = strlen(name); > + > + for (i = 0; hm->header_names[i].len > 0; i++) { > + struct mg_str *h = &hm->header_names[i], *v = &hm->header_values[i]; > + if (h->p != NULL && h->len == len && !mg_ncasecmp(h->p, name, len)) > + return v; > + } > + > + return NULL; > +} > + > +#if MG_ENABLE_FILESYSTEM > +static void mg_http_transfer_file_data(struct mg_connection *nc) { > + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); > + char buf[MG_MAX_HTTP_SEND_MBUF]; > + size_t n = 0, to_read = 0, left = (size_t)(pd->file.cl - pd->file.sent); > + > + if (pd->file.type == DATA_FILE) { > + struct mbuf *io = &nc->send_mbuf; > + if (io->len >= MG_MAX_HTTP_SEND_MBUF) { > + to_read = 0; > + } else { > + to_read = MG_MAX_HTTP_SEND_MBUF - io->len; > + } > + if (to_read > left) { > + to_read = left; > + } > + if (to_read > 0) { > + n = mg_fread(buf, 1, to_read, pd->file.fp); > + if (n > 0) { > + mg_send(nc, buf, n); > + pd->file.sent += n; > + DBG(("%p sent %d (total %d)", nc, (int) n, (int) pd->file.sent)); > + } > + } else { > + /* Rate-limited */ > + } > + if (pd->file.sent >= pd->file.cl) { > + LOG(LL_DEBUG, ("%p done, %d bytes", nc, (int) pd->file.sent)); > + if (!pd->file.keepalive) nc->flags |= MG_F_SEND_AND_CLOSE; > + mg_http_free_proto_data_file(&pd->file); > + } > + } else if (pd->file.type == DATA_PUT) { > + struct mbuf *io = &nc->recv_mbuf; > + size_t to_write = left <= 0 ? 0 : left < io->len ? (size_t) left : io->len; > + size_t n = mg_fwrite(io->buf, 1, to_write, pd->file.fp); > + if (n > 0) { > + mbuf_remove(io, n); > + pd->file.sent += n; > + } > + if (n == 0 || pd->file.sent >= pd->file.cl) { > + if (!pd->file.keepalive) nc->flags |= MG_F_SEND_AND_CLOSE; > + mg_http_free_proto_data_file(&pd->file); > + } > + } > +#if MG_ENABLE_HTTP_CGI > + else if (pd->cgi.cgi_nc != NULL) { > + /* This is POST data that needs to be forwarded to the CGI process */ > + if (pd->cgi.cgi_nc != NULL) { > + mg_forward(nc, pd->cgi.cgi_nc); > + } else { > + nc->flags |= MG_F_SEND_AND_CLOSE; > + } > + } > +#endif > +} > +#endif /* MG_ENABLE_FILESYSTEM */ > + > +/* > + * Parse chunked-encoded buffer. Return 0 if the buffer is not encoded, or > + * if it's incomplete. If the chunk is fully buffered, return total number of > + * bytes in a chunk, and store data in `data`, `data_len`. > + */ > +static size_t mg_http_parse_chunk(char *buf, size_t len, char **chunk_data, > + size_t *chunk_len) { > + unsigned char *s = (unsigned char *) buf; > + size_t n = 0; /* scanned chunk length */ > + size_t i = 0; /* index in s */ > + > + /* Scan chunk length. That should be a hexadecimal number. */ > + while (i < len && isxdigit(s[i])) { > + n *= 16; > + n += (s[i] >= '0' && s[i] <= '9') ? s[i] - '0' : tolower(s[i]) - 'a' + 10; > + i++; > + } > + > + /* Skip new line */ > + if (i == 0 || i + 2 > len || s[i] != '\r' || s[i + 1] != '\n') { > + return 0; > + } > + i += 2; > + > + /* Record where the data is */ > + *chunk_data = (char *) s + i; > + *chunk_len = n; > + > + /* Skip data */ > + i += n; > + > + /* Skip new line */ > + if (i == 0 || i + 2 > len || s[i] != '\r' || s[i + 1] != '\n') { > + return 0; > + } > + return i + 2; > +} > + > +MG_INTERNAL size_t mg_handle_chunked(struct mg_connection *nc, > + struct http_message *hm, char *buf, > + size_t blen) { > + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); > + char *data; > + size_t i, n, data_len, body_len, zero_chunk_received = 0; > + /* Find out piece of received data that is not yet reassembled */ > + body_len = (size_t) pd->chunk.body_len; > + assert(blen >= body_len); > + > + /* Traverse all fully buffered chunks */ > + for (i = body_len; > + (n = mg_http_parse_chunk(buf + i, blen - i, &data, &data_len)) > 0; > + i += n) { > + /* Collapse chunk data to the rest of HTTP body */ > + memmove(buf + body_len, data, data_len); > + body_len += data_len; > + hm->body.len = body_len; > + > + if (data_len == 0) { > + zero_chunk_received = 1; > + i += n; > + break; > + } > + } > + > + if (i > body_len) { > + /* Shift unparsed content to the parsed body */ > + assert(i <= blen); > + memmove(buf + body_len, buf + i, blen - i); > + memset(buf + body_len + blen - i, 0, i - body_len); > + nc->recv_mbuf.len -= i - body_len; > + pd->chunk.body_len = body_len; > + > + /* Send MG_EV_HTTP_CHUNK event */ > + nc->flags &= ~MG_F_DELETE_CHUNK; > + mg_call(nc, nc->handler, nc->user_data, MG_EV_HTTP_CHUNK, hm); > + > + /* Delete processed data if user set MG_F_DELETE_CHUNK flag */ > + if (nc->flags & MG_F_DELETE_CHUNK) { > + memset(buf, 0, body_len); > + memmove(buf, buf + body_len, blen - i); > + nc->recv_mbuf.len -= body_len; > + hm->body.len = 0; > + pd->chunk.body_len = 0; > + } > + > + if (zero_chunk_received) { > + /* Total message size is len(body) + len(headers) */ > + hm->message.len = > + (size_t) pd->chunk.body_len + blen - i + (hm->body.p - hm->message.p); > + } > + } > + > + return body_len; > +} > + > +struct mg_http_endpoint *mg_http_get_endpoint_handler(struct mg_connection *nc, > + struct mg_str *uri_path) { > + struct mg_http_proto_data *pd; > + struct mg_http_endpoint *ret = NULL; > + int matched, matched_max = 0; > + struct mg_http_endpoint *ep; > + > + if (nc == NULL) { > + return NULL; > + } > + > + pd = mg_http_get_proto_data(nc); > + > + ep = pd->endpoints; > + while (ep != NULL) { > + if ((matched = mg_match_prefix_n(ep->uri_pattern, *uri_path)) != -1) { > + if (matched > matched_max) { > + /* Looking for the longest suitable handler */ > + ret = ep; > + matched_max = matched; > + } > + } > + > + ep = ep->next; > + } > + > + return ret; > +} > + > +#if MG_ENABLE_HTTP_STREAMING_MULTIPART > +static void mg_http_multipart_continue(struct mg_connection *nc); > + > +static void mg_http_multipart_begin(struct mg_connection *nc, > + struct http_message *hm, int req_len); > + > +#endif > + > +static void mg_http_call_endpoint_handler(struct mg_connection *nc, int ev, > + struct http_message *hm); > + > +static void deliver_chunk(struct mg_connection *c, struct http_message *hm, > + int req_len) { > + /* Incomplete message received. Send MG_EV_HTTP_CHUNK event */ > + hm->body.len = c->recv_mbuf.len - req_len; > + c->flags &= ~MG_F_DELETE_CHUNK; > + mg_call(c, c->handler, c->user_data, MG_EV_HTTP_CHUNK, hm); > + /* Delete processed data if user set MG_F_DELETE_CHUNK flag */ > + if (c->flags & MG_F_DELETE_CHUNK) c->recv_mbuf.len = req_len; > +} > + > +/* > + * lx106 compiler has a bug (TODO(mkm) report and insert tracking bug here) > + * If a big structure is declared in a big function, lx106 gcc will make it > + * even bigger (round up to 4k, from 700 bytes of actual size). > + */ > +#ifdef __xtensa__ > +static void mg_http_handler2(struct mg_connection *nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data), > + struct http_message *hm) __attribute__((noinline)); > + > +void mg_http_handler(struct mg_connection *nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data)) { > + struct http_message hm; > + mg_http_handler2(nc, ev, ev_data MG_UD_ARG(user_data), &hm); > +} > + > +static void mg_http_handler2(struct mg_connection *nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data), > + struct http_message *hm) { > +#else /* !__XTENSA__ */ > +void mg_http_handler(struct mg_connection *nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data)) { > + struct http_message shm, *hm = &shm; > +#endif /* __XTENSA__ */ > + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); > + struct mbuf *io = &nc->recv_mbuf; > + int req_len; > + const int is_req = (nc->listener != NULL); > +#if MG_ENABLE_HTTP_WEBSOCKET > + struct mg_str *vec; > +#endif > + if (ev == MG_EV_CLOSE) { > +#if MG_ENABLE_HTTP_CGI > + /* Close associated CGI forwarder connection */ > + if (pd->cgi.cgi_nc != NULL) { > + pd->cgi.cgi_nc->user_data = NULL; > + pd->cgi.cgi_nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > +#endif > +#if MG_ENABLE_HTTP_STREAMING_MULTIPART > + if (pd->mp_stream.boundary != NULL) { > + /* > + * Multipart message is in progress, but connection is closed. > + * Finish part and request with an error flag. > + */ > + struct mg_http_multipart_part mp; > + memset(&mp, 0, sizeof(mp)); > + mp.status = -1; > + mp.var_name = pd->mp_stream.var_name; > + mp.file_name = pd->mp_stream.file_name; > + mg_call(nc, (pd->endpoint_handler ? pd->endpoint_handler : nc->handler), > + nc->user_data, MG_EV_HTTP_PART_END, &mp); > + mp.var_name = NULL; > + mp.file_name = NULL; > + mg_call(nc, (pd->endpoint_handler ? pd->endpoint_handler : nc->handler), > + nc->user_data, MG_EV_HTTP_MULTIPART_REQUEST_END, &mp); > + } else > +#endif > + if (io->len > 0 && > + (req_len = mg_parse_http(io->buf, io->len, hm, is_req)) > 0) { > + /* > + * For HTTP messages without Content-Length, always send HTTP message > + * before MG_EV_CLOSE message. > + */ > + int ev2 = is_req ? MG_EV_HTTP_REQUEST : MG_EV_HTTP_REPLY; > + hm->message.len = io->len; > + hm->body.len = io->buf + io->len - hm->body.p; > + deliver_chunk(nc, hm, req_len); > + mg_http_call_endpoint_handler(nc, ev2, hm); > + } > + pd->rcvd = 0; > + } > + > +#if MG_ENABLE_FILESYSTEM > + if (pd->file.fp != NULL) { > + mg_http_transfer_file_data(nc); > + } > +#endif > + > + mg_call(nc, nc->handler, nc->user_data, ev, ev_data); > + > + if (ev == MG_EV_RECV) { > + struct mg_str *s; > + pd->rcvd += *(int *) ev_data; > + > +#if MG_ENABLE_HTTP_STREAMING_MULTIPART > + if (pd->mp_stream.boundary != NULL) { > + mg_http_multipart_continue(nc); > + return; > + } > +#endif /* MG_ENABLE_HTTP_STREAMING_MULTIPART */ > + > + req_len = mg_parse_http(io->buf, io->len, hm, is_req); > + > + if (req_len > 0 && > + (s = mg_get_http_header(hm, "Transfer-Encoding")) != NULL && > + mg_vcasecmp(s, "chunked") == 0) { > + mg_handle_chunked(nc, hm, io->buf + req_len, io->len - req_len); > + } > + > +#if MG_ENABLE_HTTP_STREAMING_MULTIPART > + if (req_len > 0 && (s = mg_get_http_header(hm, "Content-Type")) != NULL && > + s->len >= 9 && strncmp(s->p, "multipart", 9) == 0) { > + mg_http_multipart_begin(nc, hm, req_len); > + mg_http_multipart_continue(nc); > + return; > + } > +#endif /* MG_ENABLE_HTTP_STREAMING_MULTIPART */ > + > + /* TODO(alashkin): refactor this ifelseifelseifelseifelse */ > + if ((req_len < 0 || > + (req_len == 0 && io->len >= MG_MAX_HTTP_REQUEST_SIZE))) { > + DBG(("invalid request")); > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + } else if (req_len == 0) { > + /* Do nothing, request is not yet fully buffered */ > + } > +#if MG_ENABLE_HTTP_WEBSOCKET > + else if (nc->listener == NULL && > + mg_get_http_header(hm, "Sec-WebSocket-Accept")) { > + /* We're websocket client, got handshake response from server. */ > + /* TODO(lsm): check the validity of accept Sec-WebSocket-Accept */ > + mbuf_remove(io, req_len); > + nc->proto_handler = mg_ws_handler; > + nc->flags |= MG_F_IS_WEBSOCKET; > + mg_call(nc, nc->handler, nc->user_data, MG_EV_WEBSOCKET_HANDSHAKE_DONE, > + NULL); > + mg_ws_handler(nc, MG_EV_RECV, ev_data MG_UD_ARG(user_data)); > + } else if (nc->listener != NULL && > + (vec = mg_get_http_header(hm, "Sec-WebSocket-Key")) != NULL) { > + struct mg_http_endpoint *ep; > + > + /* This is a websocket request. Switch protocol handlers. */ > + mbuf_remove(io, req_len); > + nc->proto_handler = mg_ws_handler; > + nc->flags |= MG_F_IS_WEBSOCKET; > + > + /* > + * If we have a handler set up with mg_register_http_endpoint(), > + * deliver subsequent websocket events to this handler after the > + * protocol switch. > + */ > + ep = mg_http_get_endpoint_handler(nc->listener, &hm->uri); > + if (ep != NULL) { > + nc->handler = ep->handler; > +#if MG_ENABLE_CALLBACK_USERDATA > + nc->user_data = ep->user_data; > +#endif > + } > + > + /* Send handshake */ > + mg_call(nc, nc->handler, nc->user_data, MG_EV_WEBSOCKET_HANDSHAKE_REQUEST, > + hm); > + if (!(nc->flags & (MG_F_CLOSE_IMMEDIATELY | MG_F_SEND_AND_CLOSE))) { > + if (nc->send_mbuf.len == 0) { > + mg_ws_handshake(nc, vec, hm); > + } > + mg_call(nc, nc->handler, nc->user_data, MG_EV_WEBSOCKET_HANDSHAKE_DONE, > + NULL); > + mg_ws_handler(nc, MG_EV_RECV, ev_data MG_UD_ARG(user_data)); > + } > + } > +#endif /* MG_ENABLE_HTTP_WEBSOCKET */ > + else if (hm->message.len > pd->rcvd) { > + /* Not yet received all HTTP body, deliver MG_EV_HTTP_CHUNK */ > + deliver_chunk(nc, hm, req_len); > + } else { > + /* We did receive all HTTP body. */ > + int trigger_ev = nc->listener ? MG_EV_HTTP_REQUEST : MG_EV_HTTP_REPLY; > + char addr[32]; > + mg_sock_addr_to_str(&nc->sa, addr, sizeof(addr), > + MG_SOCK_STRINGIFY_IP | MG_SOCK_STRINGIFY_PORT); > + DBG(("%p %s %.*s %.*s", nc, addr, (int) hm->method.len, hm->method.p, > + (int) hm->uri.len, hm->uri.p)); > + deliver_chunk(nc, hm, req_len); > + /* Whole HTTP message is fully buffered, call event handler */ > + mg_http_call_endpoint_handler(nc, trigger_ev, hm); > + mbuf_remove(io, hm->message.len); > + pd->rcvd = 0; > + } > + } > +} > + > +static size_t mg_get_line_len(const char *buf, size_t buf_len) { > + size_t len = 0; > + while (len < buf_len && buf[len] != '\n') len++; > + return len == buf_len ? 0 : len + 1; > +} > + > +#if MG_ENABLE_HTTP_STREAMING_MULTIPART > +static void mg_http_multipart_begin(struct mg_connection *nc, > + struct http_message *hm, int req_len) { > + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); > + struct mg_str *ct; > + struct mbuf *io = &nc->recv_mbuf; > + > + char boundary[100]; > + int boundary_len; > + > + ct = mg_get_http_header(hm, "Content-Type"); > + if (ct == NULL) { > + /* We need more data - or it isn't multipart mesage */ > + goto exit_mp; > + } > + > + /* Content-type should start with "multipart" */ > + if (ct->len < 9 || strncmp(ct->p, "multipart", 9) != 0) { > + goto exit_mp; > + } > + > + boundary_len = > + mg_http_parse_header(ct, "boundary", boundary, sizeof(boundary)); > + if (boundary_len == 0) { > + /* > + * Content type is multipart, but there is no boundary, > + * probably malformed request > + */ > + nc->flags = MG_F_CLOSE_IMMEDIATELY; > + DBG(("invalid request")); > + goto exit_mp; > + } > + > + /* If we reach this place - that is multipart request */ > + > + if (pd->mp_stream.boundary != NULL) { > + /* > + * Another streaming request was in progress, > + * looks like protocol error > + */ > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + } else { > + struct mg_http_endpoint *ep = NULL; > + pd->mp_stream.state = MPS_BEGIN; > + pd->mp_stream.boundary = strdup(boundary); > + pd->mp_stream.boundary_len = strlen(boundary); > + pd->mp_stream.var_name = pd->mp_stream.file_name = NULL; > + pd->endpoint_handler = nc->handler; > + > + ep = mg_http_get_endpoint_handler(nc->listener, &hm->uri); > + if (ep != NULL) { > + pd->endpoint_handler = ep->handler; > + } > + > + mg_http_call_endpoint_handler(nc, MG_EV_HTTP_MULTIPART_REQUEST, hm); > + > + mbuf_remove(io, req_len); > + } > +exit_mp: > + ; > +} > + > +#define CONTENT_DISPOSITION "Content-Disposition: " > + > +static void mg_http_multipart_call_handler(struct mg_connection *c, int ev, > + const char *data, size_t data_len) { > + struct mg_http_multipart_part mp; > + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); > + memset(&mp, 0, sizeof(mp)); > + > + mp.var_name = pd->mp_stream.var_name; > + mp.file_name = pd->mp_stream.file_name; > + mp.user_data = pd->mp_stream.user_data; > + mp.data.p = data; > + mp.data.len = data_len; > + mg_call(c, pd->endpoint_handler, c->user_data, ev, &mp); > + pd->mp_stream.user_data = mp.user_data; > +} > + > +static int mg_http_multipart_got_chunk(struct mg_connection *c) { > + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); > + struct mbuf *io = &c->recv_mbuf; > + > + mg_http_multipart_call_handler(c, MG_EV_HTTP_PART_DATA, io->buf, > + pd->mp_stream.prev_io_len); > + mbuf_remove(io, pd->mp_stream.prev_io_len); > + pd->mp_stream.prev_io_len = 0; > + pd->mp_stream.state = MPS_WAITING_FOR_CHUNK; > + > + return 0; > +} > + > +static int mg_http_multipart_finalize(struct mg_connection *c) { > + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); > + > + mg_http_multipart_call_handler(c, MG_EV_HTTP_PART_END, NULL, 0); > + MG_FREE((void *) pd->mp_stream.file_name); > + pd->mp_stream.file_name = NULL; > + MG_FREE((void *) pd->mp_stream.var_name); > + pd->mp_stream.var_name = NULL; > + mg_http_multipart_call_handler(c, MG_EV_HTTP_MULTIPART_REQUEST_END, NULL, 0); > + mg_http_free_proto_data_mp_stream(&pd->mp_stream); > + pd->mp_stream.state = MPS_FINISHED; > + > + return 1; > +} > + > +static int mg_http_multipart_wait_for_boundary(struct mg_connection *c) { > + const char *boundary; > + struct mbuf *io = &c->recv_mbuf; > + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); > + > + if (pd->mp_stream.boundary == NULL) { > + pd->mp_stream.state = MPS_FINALIZE; > + DBG(("Invalid request: boundary not initialized")); > + return 0; > + } > + > + if ((int) io->len < pd->mp_stream.boundary_len + 2) { > + return 0; > + } > + > + boundary = c_strnstr(io->buf, pd->mp_stream.boundary, io->len); > + if (boundary != NULL) { > + const char *boundary_end = (boundary + pd->mp_stream.boundary_len); > + if (io->len - (boundary_end - io->buf) < 4) { > + return 0; > + } > + if (strncmp(boundary_end, "--\r\n", 4) == 0) { > + pd->mp_stream.state = MPS_FINALIZE; > + mbuf_remove(io, (boundary_end - io->buf) + 4); > + } else { > + pd->mp_stream.state = MPS_GOT_BOUNDARY; > + } > + } else { > + return 0; > + } > + > + return 1; > +} > + > +static int mg_http_multipart_process_boundary(struct mg_connection *c) { > + int data_size; > + const char *boundary, *block_begin; > + struct mbuf *io = &c->recv_mbuf; > + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); > + char file_name[100], var_name[100]; > + int line_len; > + boundary = c_strnstr(io->buf, pd->mp_stream.boundary, io->len); > + block_begin = boundary + pd->mp_stream.boundary_len + 2; > + data_size = io->len - (block_begin - io->buf); > + > + while (data_size > 0 && > + (line_len = mg_get_line_len(block_begin, data_size)) != 0) { > + if (line_len > (int) sizeof(CONTENT_DISPOSITION) && > + mg_ncasecmp(block_begin, CONTENT_DISPOSITION, > + sizeof(CONTENT_DISPOSITION) - 1) == 0) { > + struct mg_str header; > + > + header.p = block_begin + sizeof(CONTENT_DISPOSITION) - 1; > + header.len = line_len - sizeof(CONTENT_DISPOSITION) - 1; > + mg_http_parse_header(&header, "name", var_name, sizeof(var_name) - 2); > + mg_http_parse_header(&header, "filename", file_name, > + sizeof(file_name) - 2); > + block_begin += line_len; > + data_size -= line_len; > + continue; > + } > + > + if (line_len == 2 && mg_ncasecmp(block_begin, "\r\n", 2) == 0) { > + mbuf_remove(io, block_begin - io->buf + 2); > + > + if (pd->mp_stream.processing_part != 0) { > + mg_http_multipart_call_handler(c, MG_EV_HTTP_PART_END, NULL, 0); > + } > + > + MG_FREE((void *) pd->mp_stream.file_name); > + pd->mp_stream.file_name = strdup(file_name); > + MG_FREE((void *) pd->mp_stream.var_name); > + pd->mp_stream.var_name = strdup(var_name); > + > + mg_http_multipart_call_handler(c, MG_EV_HTTP_PART_BEGIN, NULL, 0); > + pd->mp_stream.state = MPS_WAITING_FOR_CHUNK; > + pd->mp_stream.processing_part++; > + return 1; > + } > + > + block_begin += line_len; > + } > + > + pd->mp_stream.state = MPS_WAITING_FOR_BOUNDARY; > + > + return 0; > +} > + > +static int mg_http_multipart_continue_wait_for_chunk(struct mg_connection *c) { > + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); > + struct mbuf *io = &c->recv_mbuf; > + > + const char *boundary; > + if ((int) io->len < pd->mp_stream.boundary_len + 6 /* \r\n, --, -- */) { > + return 0; > + } > + > + boundary = c_strnstr(io->buf, pd->mp_stream.boundary, io->len); > + if (boundary == NULL && pd->mp_stream.prev_io_len == 0) { > + pd->mp_stream.prev_io_len = io->len; > + return 0; > + } else if (boundary == NULL && > + (int) io->len > > + pd->mp_stream.prev_io_len + pd->mp_stream.boundary_len + 4) { > + pd->mp_stream.state = MPS_GOT_CHUNK; > + return 1; > + } else if (boundary != NULL) { > + int data_size = (boundary - io->buf - 4); > + mg_http_multipart_call_handler(c, MG_EV_HTTP_PART_DATA, io->buf, data_size); > + mbuf_remove(io, (boundary - io->buf)); > + pd->mp_stream.prev_io_len = 0; > + pd->mp_stream.state = MPS_WAITING_FOR_BOUNDARY; > + return 1; > + } else { > + return 0; > + } > +} > + > +static void mg_http_multipart_continue(struct mg_connection *c) { > + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); > + while (1) { > + switch (pd->mp_stream.state) { > + case MPS_BEGIN: { > + pd->mp_stream.state = MPS_WAITING_FOR_BOUNDARY; > + break; > + } > + case MPS_WAITING_FOR_BOUNDARY: { > + if (mg_http_multipart_wait_for_boundary(c) == 0) { > + return; > + } > + break; > + } > + case MPS_GOT_BOUNDARY: { > + if (mg_http_multipart_process_boundary(c) == 0) { > + return; > + } > + break; > + } > + case MPS_WAITING_FOR_CHUNK: { > + if (mg_http_multipart_continue_wait_for_chunk(c) == 0) { > + return; > + } > + break; > + } > + case MPS_GOT_CHUNK: { > + if (mg_http_multipart_got_chunk(c) == 0) { > + return; > + } > + break; > + } > + case MPS_FINALIZE: { > + if (mg_http_multipart_finalize(c) == 0) { > + return; > + } > + break; > + } > + case MPS_FINISHED: { > + mbuf_remove(&c->recv_mbuf, c->recv_mbuf.len); > + return; > + } > + } > + } > +} > + > +struct file_upload_state { > + char *lfn; > + size_t num_recd; > + FILE *fp; > +}; > + > +#endif /* MG_ENABLE_HTTP_STREAMING_MULTIPART */ > + > +void mg_set_protocol_http_websocket(struct mg_connection *nc) { > + nc->proto_handler = mg_http_handler; > +} > + > +const char *mg_status_message(int status_code) { > + switch (status_code) { > + case 206: > + return "Partial Content"; > + case 301: > + return "Moved"; > + case 302: > + return "Found"; > + case 400: > + return "Bad Request"; > + case 401: > + return "Unauthorized"; > + case 403: > + return "Forbidden"; > + case 404: > + return "Not Found"; > + case 416: > + return "Requested Range Not Satisfiable"; > + case 418: > + return "I'm a teapot"; > + case 500: > + return "Internal Server Error"; > + case 502: > + return "Bad Gateway"; > + case 503: > + return "Service Unavailable"; > + > +#if MG_ENABLE_EXTRA_ERRORS_DESC > + case 100: > + return "Continue"; > + case 101: > + return "Switching Protocols"; > + case 102: > + return "Processing"; > + case 200: > + return "OK"; > + case 201: > + return "Created"; > + case 202: > + return "Accepted"; > + case 203: > + return "Non-Authoritative Information"; > + case 204: > + return "No Content"; > + case 205: > + return "Reset Content"; > + case 207: > + return "Multi-Status"; > + case 208: > + return "Already Reported"; > + case 226: > + return "IM Used"; > + case 300: > + return "Multiple Choices"; > + case 303: > + return "See Other"; > + case 304: > + return "Not Modified"; > + case 305: > + return "Use Proxy"; > + case 306: > + return "Switch Proxy"; > + case 307: > + return "Temporary Redirect"; > + case 308: > + return "Permanent Redirect"; > + case 402: > + return "Payment Required"; > + case 405: > + return "Method Not Allowed"; > + case 406: > + return "Not Acceptable"; > + case 407: > + return "Proxy Authentication Required"; > + case 408: > + return "Request Timeout"; > + case 409: > + return "Conflict"; > + case 410: > + return "Gone"; > + case 411: > + return "Length Required"; > + case 412: > + return "Precondition Failed"; > + case 413: > + return "Payload Too Large"; > + case 414: > + return "URI Too Long"; > + case 415: > + return "Unsupported Media Type"; > + case 417: > + return "Expectation Failed"; > + case 422: > + return "Unprocessable Entity"; > + case 423: > + return "Locked"; > + case 424: > + return "Failed Dependency"; > + case 426: > + return "Upgrade Required"; > + case 428: > + return "Precondition Required"; > + case 429: > + return "Too Many Requests"; > + case 431: > + return "Request Header Fields Too Large"; > + case 451: > + return "Unavailable For Legal Reasons"; > + case 501: > + return "Not Implemented"; > + case 504: > + return "Gateway Timeout"; > + case 505: > + return "HTTP Version Not Supported"; > + case 506: > + return "Variant Also Negotiates"; > + case 507: > + return "Insufficient Storage"; > + case 508: > + return "Loop Detected"; > + case 510: > + return "Not Extended"; > + case 511: > + return "Network Authentication Required"; > +#endif /* MG_ENABLE_EXTRA_ERRORS_DESC */ > + > + default: > + return "OK"; > + } > +} > + > +void mg_send_response_line_s(struct mg_connection *nc, int status_code, > + const struct mg_str extra_headers) { > + mg_printf(nc, "HTTP/1.1 %d %s\r\nServer: %s\r\n", status_code, > + mg_status_message(status_code), mg_version_header); > + if (extra_headers.len > 0) { > + mg_printf(nc, "%.*s\r\n", (int) extra_headers.len, extra_headers.p); > + } > +} > + > +void mg_send_response_line(struct mg_connection *nc, int status_code, > + const char *extra_headers) { > + mg_send_response_line_s(nc, status_code, mg_mk_str(extra_headers)); > +} > + > +void mg_http_send_redirect(struct mg_connection *nc, int status_code, > + const struct mg_str location, > + const struct mg_str extra_headers) { > + char bbody[100], *pbody = bbody; > + int bl = mg_asprintf(&pbody, sizeof(bbody), > + "<p>Moved <a href='%.*s'>here</a>.\r\n", > + (int) location.len, location.p); > + char bhead[150], *phead = bhead; > + mg_asprintf(&phead, sizeof(bhead), > + "Location: %.*s\r\n" > + "Content-Type: text/html\r\n" > + "Content-Length: %d\r\n" > + "Cache-Control: no-cache\r\n" > + "%.*s%s", > + (int) location.len, location.p, bl, (int) extra_headers.len, > + extra_headers.p, (extra_headers.len > 0 ? "\r\n" : "")); > + mg_send_response_line(nc, status_code, phead); > + if (phead != bhead) MG_FREE(phead); > + mg_send(nc, pbody, bl); > + if (pbody != bbody) MG_FREE(pbody); > +} > + > +void mg_send_head(struct mg_connection *c, int status_code, > + int64_t content_length, const char *extra_headers) { > + mg_send_response_line(c, status_code, extra_headers); > + if (content_length < 0) { > + mg_printf(c, "%s", "Transfer-Encoding: chunked\r\n"); > + } else { > + mg_printf(c, "Content-Length: %" INT64_FMT "\r\n", content_length); > + } > + mg_send(c, "\r\n", 2); > +} > + > +void mg_http_send_error(struct mg_connection *nc, int code, > + const char *reason) { > + if (!reason) reason = mg_status_message(code); > + LOG(LL_DEBUG, ("%p %d %s", nc, code, reason)); > + mg_send_head(nc, code, strlen(reason), > + "Content-Type: text/plain\r\nConnection: close"); > + mg_send(nc, reason, strlen(reason)); > + nc->flags |= MG_F_SEND_AND_CLOSE; > +} > + > +#if MG_ENABLE_FILESYSTEM > +static void mg_http_construct_etag(char *buf, size_t buf_len, > + const cs_stat_t *st) { > + snprintf(buf, buf_len, "\"%lx.%" INT64_FMT "\"", (unsigned long) st->st_mtime, > + (int64_t) st->st_size); > +} > + > +#ifndef WINCE > +static void mg_gmt_time_string(char *buf, size_t buf_len, time_t *t) { > + strftime(buf, buf_len, "%a, %d %b %Y %H:%M:%S GMT", gmtime(t)); > +} > +#else > +/* Look wince_lib.c for WindowsCE implementation */ > +static void mg_gmt_time_string(char *buf, size_t buf_len, time_t *t); > +#endif > + > +static int mg_http_parse_range_header(const struct mg_str *header, int64_t *a, > + int64_t *b) { > + /* > + * There is no snscanf. Headers are not guaranteed to be NUL-terminated, > + * so we have this. Ugh. > + */ > + int result; > + char *p = (char *) MG_MALLOC(header->len + 1); > + if (p == NULL) return 0; > + memcpy(p, header->p, header->len); > + p[header->len] = '\0'; > + result = sscanf(p, "bytes=%" INT64_FMT "-%" INT64_FMT, a, b); > + MG_FREE(p); > + return result; > +} > + > +void mg_http_serve_file(struct mg_connection *nc, struct http_message *hm, > + const char *path, const struct mg_str mime_type, > + const struct mg_str extra_headers) { > + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); > + cs_stat_t st; > + LOG(LL_DEBUG, ("%p [%s] %.*s", nc, path, (int) mime_type.len, mime_type.p)); > + if (mg_stat(path, &st) != 0 || (pd->file.fp = mg_fopen(path, "rb")) == NULL) { > + int code, err = mg_get_errno(); > + switch (err) { > + case EACCES: > + code = 403; > + break; > + case ENOENT: > + code = 404; > + break; > + default: > + code = 500; > + }; > + mg_http_send_error(nc, code, "Open failed"); > + } else { > + char etag[50], current_time[50], last_modified[50], range[70]; > + time_t t = (time_t) mg_time(); > + int64_t r1 = 0, r2 = 0, cl = st.st_size; > + struct mg_str *range_hdr = mg_get_http_header(hm, "Range"); > + int n, status_code = 200; > + > + /* Handle Range header */ > + range[0] = '\0'; > + if (range_hdr != NULL && > + (n = mg_http_parse_range_header(range_hdr, &r1, &r2)) > 0 && r1 >= 0 && > + r2 >= 0) { > + /* If range is specified like "400-", set second limit to content len */ > + if (n == 1) { > + r2 = cl - 1; > + } > + if (r1 > r2 || r2 >= cl) { > + status_code = 416; > + cl = 0; > + snprintf(range, sizeof(range), > + "Content-Range: bytes */%" INT64_FMT "\r\n", > + (int64_t) st.st_size); > + } else { > + status_code = 206; > + cl = r2 - r1 + 1; > + snprintf(range, sizeof(range), "Content-Range: bytes %" INT64_FMT > + "-%" INT64_FMT "/%" INT64_FMT "\r\n", > + r1, r1 + cl - 1, (int64_t) st.st_size); > +#if _FILE_OFFSET_BITS == 64 || _POSIX_C_SOURCE >= 200112L || \ > + _XOPEN_SOURCE >= 600 > + fseeko(pd->file.fp, r1, SEEK_SET); > +#else > + fseek(pd->file.fp, (long) r1, SEEK_SET); > +#endif > + } > + } > + > +#if !MG_DISABLE_HTTP_KEEP_ALIVE > + { > + struct mg_str *conn_hdr = mg_get_http_header(hm, "Connection"); > + if (conn_hdr != NULL) { > + pd->file.keepalive = (mg_vcasecmp(conn_hdr, "keep-alive") == 0); > + } else { > + pd->file.keepalive = (mg_vcmp(&hm->proto, "HTTP/1.1") == 0); > + } > + } > +#endif > + > + mg_http_construct_etag(etag, sizeof(etag), &st); > + mg_gmt_time_string(current_time, sizeof(current_time), &t); > + mg_gmt_time_string(last_modified, sizeof(last_modified), &st.st_mtime); > + /* > + * Content length casted to size_t because: > + * 1) that's the maximum buffer size anyway > + * 2) ESP8266 RTOS SDK newlib vprintf cannot contain a 64bit arg at non-last > + * position > + * TODO(mkm): fix ESP8266 RTOS SDK > + */ > + mg_send_response_line_s(nc, status_code, extra_headers); > + mg_printf(nc, > + "Date: %s\r\n" > + "Last-Modified: %s\r\n" > + "Accept-Ranges: bytes\r\n" > + "Content-Type: %.*s\r\n" > + "Connection: %s\r\n" > + "Content-Length: %" SIZE_T_FMT > + "\r\n" > + "%sEtag: %s\r\n\r\n", > + current_time, last_modified, (int) mime_type.len, mime_type.p, > + (pd->file.keepalive ? "keep-alive" : "close"), (size_t) cl, range, > + etag); > + > + pd->file.cl = cl; > + pd->file.type = DATA_FILE; > + mg_http_transfer_file_data(nc); > + } > +} > + > +static void mg_http_serve_file2(struct mg_connection *nc, const char *path, > + struct http_message *hm, > + struct mg_serve_http_opts *opts) { > +#if MG_ENABLE_HTTP_SSI > + if (mg_match_prefix(opts->ssi_pattern, strlen(opts->ssi_pattern), path) > 0) { > + mg_handle_ssi_request(nc, hm, path, opts); > + return; > + } > +#endif > + mg_http_serve_file(nc, hm, path, mg_get_mime_type(path, "text/plain", opts), > + mg_mk_str(opts->extra_headers)); > +} > + > +#endif > + > +int mg_url_decode(const char *src, int src_len, char *dst, int dst_len, > + int is_form_url_encoded) { > + int i, j, a, b; > +#define HEXTOI(x) (isdigit(x) ? x - '0' : x - 'W') > + > + for (i = j = 0; i < src_len && j < dst_len - 1; i++, j++) { > + if (src[i] == '%') { > + if (i < src_len - 2 && isxdigit(*(const unsigned char *) (src + i + 1)) && > + isxdigit(*(const unsigned char *) (src + i + 2))) { > + a = tolower(*(const unsigned char *) (src + i + 1)); > + b = tolower(*(const unsigned char *) (src + i + 2)); > + dst[j] = (char) ((HEXTOI(a) << 4) | HEXTOI(b)); > + i += 2; > + } else { > + return -1; > + } > + } else if (is_form_url_encoded && src[i] == '+') { > + dst[j] = ' '; > + } else { > + dst[j] = src[i]; > + } > + } > + > + dst[j] = '\0'; /* Null-terminate the destination */ > + > + return i >= src_len ? j : -1; > +} > + > +int mg_get_http_var(const struct mg_str *buf, const char *name, char *dst, > + size_t dst_len) { > + const char *p, *e, *s; > + size_t name_len; > + int len; > + > + /* > + * According to the documentation function returns negative > + * value in case of error. For debug purposes it returns: > + * -1 - src is wrong (NUUL) > + * -2 - dst is wrong (NULL) > + * -3 - failed to decode url or dst is to small > + */ > + if (dst == NULL || dst_len == 0) { > + len = -2; > + } else if (buf->p == NULL || name == NULL || buf->len == 0) { > + len = -1; > + dst[0] = '\0'; > + } else { > + name_len = strlen(name); > + e = buf->p + buf->len; > + len = 0; > + dst[0] = '\0'; > + > + for (p = buf->p; p + name_len < e; p++) { > + if ((p == buf->p || p[-1] == '&') && p[name_len] == '=' && > + !mg_ncasecmp(name, p, name_len)) { > + p += name_len + 1; > + s = (const char *) memchr(p, '&', (size_t)(e - p)); > + if (s == NULL) { > + s = e; > + } > + len = mg_url_decode(p, (size_t)(s - p), dst, dst_len, 1); > + /* -1 means: failed to decode or dst is too small */ > + if (len == -1) { > + len = -3; > + } > + break; > + } > + } > + } > + > + return len; > +} > + > +void mg_send_http_chunk(struct mg_connection *nc, const char *buf, size_t len) { > + char chunk_size[50]; > + int n; > + > + n = snprintf(chunk_size, sizeof(chunk_size), "%lX\r\n", (unsigned long) len); > + mg_send(nc, chunk_size, n); > + mg_send(nc, buf, len); > + mg_send(nc, "\r\n", 2); > +} > + > +void mg_printf_http_chunk(struct mg_connection *nc, const char *fmt, ...) { > + char mem[MG_VPRINTF_BUFFER_SIZE], *buf = mem; > + int len; > + va_list ap; > + > + va_start(ap, fmt); > + len = mg_avprintf(&buf, sizeof(mem), fmt, ap); > + va_end(ap); > + > + if (len >= 0) { > + mg_send_http_chunk(nc, buf, len); > + } > + > + /* LCOV_EXCL_START */ > + if (buf != mem && buf != NULL) { > + MG_FREE(buf); > + } > + /* LCOV_EXCL_STOP */ > +} > + > +void mg_printf_html_escape(struct mg_connection *nc, const char *fmt, ...) { > + char mem[MG_VPRINTF_BUFFER_SIZE], *buf = mem; > + int i, j, len; > + va_list ap; > + > + va_start(ap, fmt); > + len = mg_avprintf(&buf, sizeof(mem), fmt, ap); > + va_end(ap); > + > + if (len >= 0) { > + for (i = j = 0; i < len; i++) { > + if (buf[i] == '<' || buf[i] == '>') { > + mg_send(nc, buf + j, i - j); > + mg_send(nc, buf[i] == '<' ? "<" : ">", 4); > + j = i + 1; > + } > + } > + mg_send(nc, buf + j, i - j); > + } > + > + /* LCOV_EXCL_START */ > + if (buf != mem && buf != NULL) { > + MG_FREE(buf); > + } > + /* LCOV_EXCL_STOP */ > +} > + > +int mg_http_parse_header(struct mg_str *hdr, const char *var_name, char *buf, > + size_t buf_size) { > + int ch = ' ', ch1 = ',', len = 0, n = strlen(var_name); > + const char *p, *end = hdr ? hdr->p + hdr->len : NULL, *s = NULL; > + > + if (buf != NULL && buf_size > 0) buf[0] = '\0'; > + if (hdr == NULL) return 0; > + > + /* Find where variable starts */ > + for (s = hdr->p; s != NULL && s + n < end; s++) { > + if ((s == hdr->p || s[-1] == ch || s[-1] == ch1 || s[-1] == ';') && > + s[n] == '=' && !strncmp(s, var_name, n)) > + break; > + } > + > + if (s != NULL && &s[n + 1] < end) { > + s += n + 1; > + if (*s == '"' || *s == '\'') { > + ch = ch1 = *s++; > + } > + p = s; > + while (p < end && p[0] != ch && p[0] != ch1 && len < (int) buf_size) { > + if (ch != ' ' && p[0] == '\\' && p[1] == ch) p++; > + buf[len++] = *p++; > + } > + if (len >= (int) buf_size || (ch != ' ' && *p != ch)) { > + len = 0; > + } else { > + if (len > 0 && s[len - 1] == ',') len--; > + if (len > 0 && s[len - 1] == ';') len--; > + buf[len] = '\0'; > + } > + } > + > + return len; > +} > + > +int mg_get_http_basic_auth(struct http_message *hm, char *user, size_t user_len, > + char *pass, size_t pass_len) { > + struct mg_str *hdr = mg_get_http_header(hm, "Authorization"); > + if (hdr == NULL) return -1; > + return mg_parse_http_basic_auth(hdr, user, user_len, pass, pass_len); > +} > + > +int mg_parse_http_basic_auth(struct mg_str *hdr, char *user, size_t user_len, > + char *pass, size_t pass_len) { > + char *buf = NULL; > + char fmt[64]; > + int res = 0; > + > + if (mg_strncmp(*hdr, mg_mk_str("Basic "), 6) != 0) return -1; > + > + buf = (char *) MG_MALLOC(hdr->len); > + cs_base64_decode((unsigned char *) hdr->p + 6, hdr->len, buf, NULL); > + > + /* e.g. "%123[^:]:%321[^\n]" */ > + snprintf(fmt, sizeof(fmt), "%%%" SIZE_T_FMT "[^:]:%%%" SIZE_T_FMT "[^\n]", > + user_len - 1, pass_len - 1); > + if (sscanf(buf, fmt, user, pass) == 0) { > + res = -1; > + } > + > + MG_FREE(buf); > + return res; > +} > + > +#if MG_ENABLE_FILESYSTEM > +static int mg_is_file_hidden(const char *path, > + const struct mg_serve_http_opts *opts, > + int exclude_specials) { > + const char *p1 = opts->per_directory_auth_file; > + const char *p2 = opts->hidden_file_pattern; > + > + /* Strip directory path from the file name */ > + const char *pdir = strrchr(path, DIRSEP); > + if (pdir != NULL) { > + path = pdir + 1; > + } > + > + return (exclude_specials && (!strcmp(path, ".") || !strcmp(path, ".."))) || > + (p1 != NULL && > + mg_match_prefix(p1, strlen(p1), path) == (int) strlen(p1)) || > + (p2 != NULL && mg_match_prefix(p2, strlen(p2), path) > 0); > +} > + > +#if !MG_DISABLE_HTTP_DIGEST_AUTH > + > +#ifndef MG_EXT_MD5 > +void mg_hash_md5_v(size_t num_msgs, const uint8_t *msgs[], > + const size_t *msg_lens, uint8_t *digest) { > + size_t i; > + cs_md5_ctx md5_ctx; > + cs_md5_init(&md5_ctx); > + for (i = 0; i < num_msgs; i++) { > + cs_md5_update(&md5_ctx, msgs[i], msg_lens[i]); > + } > + cs_md5_final(digest, &md5_ctx); > +} > +#else > +extern void mg_hash_md5_v(size_t num_msgs, const uint8_t *msgs[], > + const size_t *msg_lens, uint8_t *digest); > +#endif > + > +void cs_md5(char buf[33], ...) { > + unsigned char hash[16]; > + const uint8_t *msgs[20], *p; > + size_t msg_lens[20]; > + size_t num_msgs = 0; > + va_list ap; > + > + va_start(ap, buf); > + while ((p = va_arg(ap, const unsigned char *) ) != NULL) { > + msgs[num_msgs] = p; > + msg_lens[num_msgs] = va_arg(ap, size_t); > + num_msgs++; > + } > + va_end(ap); > + > + mg_hash_md5_v(num_msgs, msgs, msg_lens, hash); > + cs_to_hex(buf, hash, sizeof(hash)); > +} > + > +static void mg_mkmd5resp(const char *method, size_t method_len, const char *uri, > + size_t uri_len, const char *ha1, size_t ha1_len, > + const char *nonce, size_t nonce_len, const char *nc, > + size_t nc_len, const char *cnonce, size_t cnonce_len, > + const char *qop, size_t qop_len, char *resp) { > + static const char colon[] = ":"; > + static const size_t one = 1; > + char ha2[33]; > + cs_md5(ha2, method, method_len, colon, one, uri, uri_len, NULL); > + cs_md5(resp, ha1, ha1_len, colon, one, nonce, nonce_len, colon, one, nc, > + nc_len, colon, one, cnonce, cnonce_len, colon, one, qop, qop_len, > + colon, one, ha2, sizeof(ha2) - 1, NULL); > +} > + > +int mg_http_create_digest_auth_header(char *buf, size_t buf_len, > + const char *method, const char *uri, > + const char *auth_domain, const char *user, > + const char *passwd) { > + static const char colon[] = ":", qop[] = "auth"; > + static const size_t one = 1; > + char ha1[33], resp[33], cnonce[40]; > + > + snprintf(cnonce, sizeof(cnonce), "%x", (unsigned int) mg_time()); > + cs_md5(ha1, user, (size_t) strlen(user), colon, one, auth_domain, > + (size_t) strlen(auth_domain), colon, one, passwd, > + (size_t) strlen(passwd), NULL); > + mg_mkmd5resp(method, strlen(method), uri, strlen(uri), ha1, sizeof(ha1) - 1, > + cnonce, strlen(cnonce), "1", one, cnonce, strlen(cnonce), qop, > + sizeof(qop) - 1, resp); > + return snprintf(buf, buf_len, > + "Authorization: Digest username=\"%s\"," > + "realm=\"%s\",uri=\"%s\",qop=%s,nc=1,cnonce=%s," > + "nonce=%s,response=%s\r\n", > + user, auth_domain, uri, qop, cnonce, cnonce, resp); > +} > + > +/* > + * Check for authentication timeout. > + * Clients send time stamp encoded in nonce. Make sure it is not too old, > + * to prevent replay attacks. > + * Assumption: nonce is a hexadecimal number of seconds since 1970. > + */ > +static int mg_check_nonce(const char *nonce) { > + unsigned long now = (unsigned long) mg_time(); > + unsigned long val = (unsigned long) strtoul(nonce, NULL, 16); > + return now < val || now - val < 3600; > +} > + > +int mg_http_check_digest_auth(struct http_message *hm, const char *auth_domain, > + FILE *fp) { > + struct mg_str *hdr; > + char username[50], cnonce[64], response[40], uri[200], qop[20], nc[20], > + nonce[30]; > + > + /* Parse "Authorization:" header, fail fast on parse error */ > + if (hm == NULL || fp == NULL || > + (hdr = mg_get_http_header(hm, "Authorization")) == NULL || > + mg_http_parse_header(hdr, "username", username, sizeof(username)) == 0 || > + mg_http_parse_header(hdr, "cnonce", cnonce, sizeof(cnonce)) == 0 || > + mg_http_parse_header(hdr, "response", response, sizeof(response)) == 0 || > + mg_http_parse_header(hdr, "uri", uri, sizeof(uri)) == 0 || > + mg_http_parse_header(hdr, "qop", qop, sizeof(qop)) == 0 || > + mg_http_parse_header(hdr, "nc", nc, sizeof(nc)) == 0 || > + mg_http_parse_header(hdr, "nonce", nonce, sizeof(nonce)) == 0 || > + mg_check_nonce(nonce) == 0) { > + return 0; > + } > + > + /* NOTE(lsm): due to a bug in MSIE, we do not compare URIs */ > + > + return mg_check_digest_auth( > + hm->method, > + mg_mk_str_n( > + hm->uri.p, > + hm->uri.len + (hm->query_string.len ? hm->query_string.len + 1 : 0)), > + mg_mk_str(username), mg_mk_str(cnonce), mg_mk_str(response), > + mg_mk_str(qop), mg_mk_str(nc), mg_mk_str(nonce), mg_mk_str(auth_domain), > + fp); > +} > + > +int mg_check_digest_auth(struct mg_str method, struct mg_str uri, > + struct mg_str username, struct mg_str cnonce, > + struct mg_str response, struct mg_str qop, > + struct mg_str nc, struct mg_str nonce, > + struct mg_str auth_domain, FILE *fp) { > + char buf[128], f_user[sizeof(buf)], f_ha1[sizeof(buf)], f_domain[sizeof(buf)]; > + char expected_response[33]; > + > + /* > + * Read passwords file line by line. If should have htdigest format, > + * i.e. each line should be a colon-separated sequence: > + * USER_NAME:DOMAIN_NAME:HA1_HASH_OF_USER_DOMAIN_AND_PASSWORD > + */ > + while (fgets(buf, sizeof(buf), fp) != NULL) { > + if (sscanf(buf, "%[^:]:%[^:]:%s", f_user, f_domain, f_ha1) == 3 && > + mg_vcmp(&username, f_user) == 0 && > + mg_vcmp(&auth_domain, f_domain) == 0) { > + /* Username and domain matched, check the password */ > + mg_mkmd5resp(method.p, method.len, uri.p, uri.len, f_ha1, strlen(f_ha1), > + nonce.p, nonce.len, nc.p, nc.len, cnonce.p, cnonce.len, > + qop.p, qop.len, expected_response); > + LOG(LL_DEBUG, > + ("%.*s %s %.*s %s", (int) username.len, username.p, f_domain, > + (int) response.len, response.p, expected_response)); > + return mg_ncasecmp(response.p, expected_response, response.len) == 0; > + } > + } > + > + /* None of the entries in the passwords file matched - return failure */ > + return 0; > +} > + > +static int mg_http_is_authorized(struct http_message *hm, struct mg_str path, > + int is_directory, const char *domain, > + const char *passwords_file, > + int is_global_pass_file) { > + char buf[MG_MAX_PATH]; > + const char *p; > + FILE *fp; > + int authorized = 1; > + > + if (domain != NULL && passwords_file != NULL) { > + if (is_global_pass_file) { > + fp = mg_fopen(passwords_file, "r"); > + } else if (is_directory) { > + snprintf(buf, sizeof(buf), "%.*s%c%s", (int) path.len, path.p, DIRSEP, > + passwords_file); > + fp = mg_fopen(buf, "r"); > + } else { > + p = strrchr(path.p, DIRSEP); > + if (p == NULL) p = path.p; > + snprintf(buf, sizeof(buf), "%.*s%c%s", (int) (p - path.p), path.p, DIRSEP, > + passwords_file); > + fp = mg_fopen(buf, "r"); > + } > + > + if (fp != NULL) { > + authorized = mg_http_check_digest_auth(hm, domain, fp); > + fclose(fp); > + } > + } > + > + LOG(LL_DEBUG, > + ("%.*s %s %d %d", (int) path.len, path.p, > + passwords_file ? passwords_file : "", is_global_pass_file, authorized)); > + return authorized; > +} > +#else > +static int mg_http_is_authorized(struct http_message *hm, > + const struct mg_str path, int is_directory, > + const char *domain, const char *passwords_file, > + int is_global_pass_file) { > + (void) hm; > + (void) path; > + (void) is_directory; > + (void) domain; > + (void) passwords_file; > + (void) is_global_pass_file; > + return 1; > +} > +#endif > + > +#if MG_ENABLE_DIRECTORY_LISTING > +static void mg_escape(const char *src, char *dst, size_t dst_len) { > + size_t n = 0; > + while (*src != '\0' && n + 5 < dst_len) { > + unsigned char ch = *(unsigned char *) src++; > + if (ch == '<') { > + n += snprintf(dst + n, dst_len - n, "%s", "<"); > + } else { > + dst[n++] = ch; > + } > + } > + dst[n] = '\0'; > +} > + > +static void mg_print_dir_entry(struct mg_connection *nc, const char *file_name, > + cs_stat_t *stp) { > + char size[64], mod[64], path[MG_MAX_PATH]; > + int64_t fsize = stp->st_size; > + int is_dir = S_ISDIR(stp->st_mode); > + const char *slash = is_dir ? "/" : ""; > + struct mg_str href; > + > + if (is_dir) { > + snprintf(size, sizeof(size), "%s", "[DIRECTORY]"); > + } else { > + /* > + * We use (double) cast below because MSVC 6 compiler cannot > + * convert unsigned __int64 to double. > + */ > + if (fsize < 1024) { > + snprintf(size, sizeof(size), "%d", (int) fsize); > + } else if (fsize < 0x100000) { > + snprintf(size, sizeof(size), "%.1fk", (double) fsize / 1024.0); > + } else if (fsize < 0x40000000) { > + snprintf(size, sizeof(size), "%.1fM", (double) fsize / 1048576); > + } else { > + snprintf(size, sizeof(size), "%.1fG", (double) fsize / 1073741824); > + } > + } > + strftime(mod, sizeof(mod), "%d-%b-%Y %H:%M", localtime(&stp->st_mtime)); > + mg_escape(file_name, path, sizeof(path)); > + href = mg_url_encode(mg_mk_str(file_name)); > + mg_printf_http_chunk(nc, > + "<tr><td><a href=\"%s%s\">%s%s</a></td>" > + "<td>%s</td><td name=%" INT64_FMT ">%s</td></tr>\n", > + href.p, slash, path, slash, mod, is_dir ? -1 : fsize, > + size); > + free((void *) href.p); > +} > + > +static void mg_scan_directory(struct mg_connection *nc, const char *dir, > + const struct mg_serve_http_opts *opts, > + void (*func)(struct mg_connection *, const char *, > + cs_stat_t *)) { > + char path[MG_MAX_PATH]; > + cs_stat_t st; > + struct dirent *dp; > + DIR *dirp; > + > + LOG(LL_DEBUG, ("%p [%s]", nc, dir)); > + if ((dirp = (opendir(dir))) != NULL) { > + while ((dp = readdir(dirp)) != NULL) { > + /* Do not show current dir and hidden files */ > + if (mg_is_file_hidden((const char *) dp->d_name, opts, 1)) { > + continue; > + } > + snprintf(path, sizeof(path), "%s/%s", dir, dp->d_name); > + if (mg_stat(path, &st) == 0) { > + func(nc, (const char *) dp->d_name, &st); > + } > + } > + closedir(dirp); > + } else { > + LOG(LL_DEBUG, ("%p opendir(%s) -> %d", nc, dir, mg_get_errno())); > + } > +} > + > +static void mg_send_directory_listing(struct mg_connection *nc, const char *dir, > + struct http_message *hm, > + struct mg_serve_http_opts *opts) { > + static const char *sort_js_code = > + "<script>function srt(tb, sc, so, d) {" > + "var tr = Array.prototype.slice.call(tb.rows, 0)," > + "tr = tr.sort(function (a, b) { var c1 = a.cells[sc], c2 = b.cells[sc]," > + "n1 = c1.getAttribute('name'), n2 = c2.getAttribute('name'), " > + "t1 = a.cells[2].getAttribute('name'), " > + "t2 = b.cells[2].getAttribute('name'); " > + "return so * (t1 < 0 && t2 >= 0 ? -1 : t2 < 0 && t1 >= 0 ? 1 : " > + "n1 ? parseInt(n2) - parseInt(n1) : " > + "c1.textContent.trim().localeCompare(c2.textContent.trim())); });"; > + static const char *sort_js_code2 = > + "for (var i = 0; i < tr.length; i++) tb.appendChild(tr[i]); " > + "if (!d) window.location.hash = ('sc=' + sc + '&so=' + so); " > + "};" > + "window.onload = function() {" > + "var tb = document.getElementById('tb');" > + "var m = /sc=([012]).so=(1|-1)/.exec(window.location.hash) || [0, 2, 1];" > + "var sc = m[1], so = m[2]; document.onclick = function(ev) { " > + "var c = ev.target.rel; if (c) {if (c == sc) so *= -1; srt(tb, c, so); " > + "sc = c; ev.preventDefault();}};" > + "srt(tb, sc, so, true);" > + "}" > + "</script>"; > + > + mg_send_response_line(nc, 200, opts->extra_headers); > + mg_printf(nc, "%s: %s\r\n%s: %s\r\n\r\n", "Transfer-Encoding", "chunked", > + "Content-Type", "text/html; charset=utf-8"); > + > + mg_printf_http_chunk( > + nc, > + "<html><head><title>Index of %.*s</title>%s%s" > + "<style>th,td {text-align: left; padding-right: 1em; " > + "font-family: monospace; }</style></head>\n" > + "<body><h1>Index of %.*s</h1>\n<table cellpadding=0><thead>" > + "<tr><th><a href=# rel=0>Name</a></th><th>" > + "<a href=# rel=1>Modified</a</th>" > + "<th><a href=# rel=2>Size</a></th></tr>" > + "<tr><td colspan=3><hr></td></tr>\n" > + "</thead>\n" > + "<tbody id=tb>", > + (int) hm->uri.len, hm->uri.p, sort_js_code, sort_js_code2, > + (int) hm->uri.len, hm->uri.p); > + mg_scan_directory(nc, dir, opts, mg_print_dir_entry); > + mg_printf_http_chunk(nc, > + "</tbody><tr><td colspan=3><hr></td></tr>\n" > + "</table>\n" > + "<address>%s</address>\n" > + "</body></html>", > + mg_version_header); > + mg_send_http_chunk(nc, "", 0); > + /* TODO(rojer): Remove when cesanta/dev/issues/197 is fixed. */ > + nc->flags |= MG_F_SEND_AND_CLOSE; > +} > +#endif /* MG_ENABLE_DIRECTORY_LISTING */ > + > +/* > + * Given a directory path, find one of the files specified in the > + * comma-separated list of index files `list`. > + * First found index file wins. If an index file is found, then gets > + * appended to the `path`, stat-ed, and result of `stat()` passed to `stp`. > + * If index file is not found, then `path` and `stp` remain unchanged. > + */ > +MG_INTERNAL void mg_find_index_file(const char *path, const char *list, > + char **index_file, cs_stat_t *stp) { > + struct mg_str vec; > + size_t path_len = strlen(path); > + int found = 0; > + *index_file = NULL; > + > + /* Traverse index files list. For each entry, append it to the given */ > + /* path and see if the file exists. If it exists, break the loop */ > + while ((list = mg_next_comma_list_entry(list, &vec, NULL)) != NULL) { > + cs_stat_t st; > + size_t len = path_len + 1 + vec.len + 1; > + *index_file = (char *) MG_REALLOC(*index_file, len); > + if (*index_file == NULL) break; > + snprintf(*index_file, len, "%s%c%.*s", path, DIRSEP, (int) vec.len, vec.p); > + > + /* Does it exist? Is it a file? */ > + if (mg_stat(*index_file, &st) == 0 && S_ISREG(st.st_mode)) { > + /* Yes it does, break the loop */ > + *stp = st; > + found = 1; > + break; > + } > + } > + if (!found) { > + MG_FREE(*index_file); > + *index_file = NULL; > + } > + LOG(LL_DEBUG, ("[%s] [%s]", path, (*index_file ? *index_file : ""))); > +} > + > +#if MG_ENABLE_HTTP_URL_REWRITES > +static int mg_http_send_port_based_redirect( > + struct mg_connection *c, struct http_message *hm, > + const struct mg_serve_http_opts *opts) { > + const char *rewrites = opts->url_rewrites; > + struct mg_str a, b; > + char local_port[20] = {'%'}; > + > + mg_conn_addr_to_str(c, local_port + 1, sizeof(local_port) - 1, > + MG_SOCK_STRINGIFY_PORT); > + > + while ((rewrites = mg_next_comma_list_entry(rewrites, &a, &b)) != NULL) { > + if (mg_vcmp(&a, local_port) == 0) { > + mg_send_response_line(c, 301, NULL); > + mg_printf(c, "Content-Length: 0\r\nLocation: %.*s%.*s\r\n\r\n", > + (int) b.len, b.p, (int) (hm->proto.p - hm->uri.p - 1), > + hm->uri.p); > + return 1; > + } > + } > + > + return 0; > +} > + > +static void mg_reverse_proxy_handler(struct mg_connection *nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data)) { > + struct http_message *hm = (struct http_message *) ev_data; > + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); > + > + if (pd == NULL || pd->reverse_proxy_data.linked_conn == NULL) { > + DBG(("%p: upstream closed", nc)); > + return; > + } > + > + switch (ev) { > + case MG_EV_CONNECT: > + if (*(int *) ev_data != 0) { > + mg_http_send_error(pd->reverse_proxy_data.linked_conn, 502, NULL); > + } > + break; > + /* TODO(mkm): handle streaming */ > + case MG_EV_HTTP_REPLY: > + mg_send(pd->reverse_proxy_data.linked_conn, hm->message.p, > + hm->message.len); > + pd->reverse_proxy_data.linked_conn->flags |= MG_F_SEND_AND_CLOSE; > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + break; > + case MG_EV_CLOSE: > + pd->reverse_proxy_data.linked_conn->flags |= MG_F_SEND_AND_CLOSE; > + break; > + } > + > +#if MG_ENABLE_CALLBACK_USERDATA > + (void) user_data; > +#endif > +} > + > +void mg_http_reverse_proxy(struct mg_connection *nc, > + const struct http_message *hm, struct mg_str mount, > + struct mg_str upstream) { > + struct mg_connection *be; > + char burl[256], *purl = burl; > + int i; > + const char *error; > + struct mg_connect_opts opts; > + struct mg_str path = MG_NULL_STR, user_info = MG_NULL_STR, host = MG_NULL_STR; > + memset(&opts, 0, sizeof(opts)); > + opts.error_string = &error; > + > + mg_asprintf(&purl, sizeof(burl), "%.*s%.*s", (int) upstream.len, upstream.p, > + (int) (hm->uri.len - mount.len), hm->uri.p + mount.len); > + > + be = mg_connect_http_base(nc->mgr, MG_CB(mg_reverse_proxy_handler, NULL), > + opts, "http", NULL, "https", NULL, purl, &path, > + &user_info, &host); > + LOG(LL_DEBUG, ("Proxying %.*s to %s (rule: %.*s)", (int) hm->uri.len, > + hm->uri.p, purl, (int) mount.len, mount.p)); > + > + if (be == NULL) { > + LOG(LL_ERROR, ("Error connecting to %s: %s", purl, error)); > + mg_http_send_error(nc, 502, NULL); > + goto cleanup; > + } > + > + /* link connections to each other, they must live and die together */ > + mg_http_get_proto_data(be)->reverse_proxy_data.linked_conn = nc; > + mg_http_get_proto_data(nc)->reverse_proxy_data.linked_conn = be; > + > + /* send request upstream */ > + mg_printf(be, "%.*s %.*s HTTP/1.1\r\n", (int) hm->method.len, hm->method.p, > + (int) path.len, path.p); > + > + mg_printf(be, "Host: %.*s\r\n", (int) host.len, host.p); > + for (i = 0; i < MG_MAX_HTTP_HEADERS && hm->header_names[i].len > 0; i++) { > + struct mg_str hn = hm->header_names[i]; > + struct mg_str hv = hm->header_values[i]; > + > + /* we rewrite the host header */ > + if (mg_vcasecmp(&hn, "Host") == 0) continue; > + /* > + * Don't pass chunked transfer encoding to the client because hm->body is > + * already dechunked when we arrive here. > + */ > + if (mg_vcasecmp(&hn, "Transfer-encoding") == 0 && > + mg_vcasecmp(&hv, "chunked") == 0) { > + mg_printf(be, "Content-Length: %" SIZE_T_FMT "\r\n", hm->body.len); > + continue; > + } > + /* We don't support proxying Expect: 100-continue. */ > + if (mg_vcasecmp(&hn, "Expect") == 0 && > + mg_vcasecmp(&hv, "100-continue") == 0) { > + continue; > + } > + > + mg_printf(be, "%.*s: %.*s\r\n", (int) hn.len, hn.p, (int) hv.len, hv.p); > + } > + > + mg_send(be, "\r\n", 2); > + mg_send(be, hm->body.p, hm->body.len); > + > +cleanup: > + if (purl != burl) MG_FREE(purl); > +} > + > +static int mg_http_handle_forwarding(struct mg_connection *nc, > + struct http_message *hm, > + const struct mg_serve_http_opts *opts) { > + const char *rewrites = opts->url_rewrites; > + struct mg_str a, b; > + struct mg_str p1 = MG_MK_STR("http://"), p2 = MG_MK_STR("https://"); > + > + while ((rewrites = mg_next_comma_list_entry(rewrites, &a, &b)) != NULL) { > + if (mg_strncmp(a, hm->uri, a.len) == 0) { > + if (mg_strncmp(b, p1, p1.len) == 0 || mg_strncmp(b, p2, p2.len) == 0) { > + mg_http_reverse_proxy(nc, hm, a, b); > + return 1; > + } > + } > + } > + > + return 0; > +} > +#endif /* MG_ENABLE_FILESYSTEM */ > + > +MG_INTERNAL int mg_uri_to_local_path(struct http_message *hm, > + const struct mg_serve_http_opts *opts, > + char **local_path, > + struct mg_str *remainder) { > + int ok = 1; > + const char *cp = hm->uri.p, *cp_end = hm->uri.p + hm->uri.len; > + struct mg_str root = {NULL, 0}; > + const char *file_uri_start = cp; > + *local_path = NULL; > + remainder->p = NULL; > + remainder->len = 0; > + > + { /* 1. Determine which root to use. */ > + > +#if MG_ENABLE_HTTP_URL_REWRITES > + const char *rewrites = opts->url_rewrites; > +#else > + const char *rewrites = ""; > +#endif > + struct mg_str *hh = mg_get_http_header(hm, "Host"); > + struct mg_str a, b; > + /* Check rewrites first. */ > + while ((rewrites = mg_next_comma_list_entry(rewrites, &a, &b)) != NULL) { > + if (a.len > 1 && a.p[0] == '@') { > + /* Host rewrite. */ > + if (hh != NULL && hh->len == a.len - 1 && > + mg_ncasecmp(a.p + 1, hh->p, a.len - 1) == 0) { > + root = b; > + break; > + } > + } else { > + /* Regular rewrite, URI=directory */ > + int match_len = mg_match_prefix_n(a, hm->uri); > + if (match_len > 0) { > + file_uri_start = hm->uri.p + match_len; > + if (*file_uri_start == '/' || file_uri_start == cp_end) { > + /* Match ended at component boundary, ok. */ > + } else if (*(file_uri_start - 1) == '/') { > + /* Pattern ends with '/', backtrack. */ > + file_uri_start--; > + } else { > + /* No match: must fall on the component boundary. */ > + continue; > + } > + root = b; > + break; > + } > + } > + } > + /* If no rewrite rules matched, use DAV or regular document root. */ > + if (root.p == NULL) { > +#if MG_ENABLE_HTTP_WEBDAV > + if (opts->dav_document_root != NULL && mg_is_dav_request(&hm->method)) { > + root.p = opts->dav_document_root; > + root.len = strlen(opts->dav_document_root); > + } else > +#endif > + { > + root.p = opts->document_root; > + root.len = strlen(opts->document_root); > + } > + } > + assert(root.p != NULL && root.len > 0); > + } > + > + { /* 2. Find where in the canonical URI path the local path ends. */ > + const char *u = file_uri_start + 1; > + char *lp = (char *) MG_MALLOC(root.len + hm->uri.len + 1); > + char *lp_end = lp + root.len + hm->uri.len + 1; > + char *p = lp, *ps; > + int exists = 1; > + if (lp == NULL) { > + ok = 0; > + goto out; > + } > + memcpy(p, root.p, root.len); > + p += root.len; > + if (*(p - 1) == DIRSEP) p--; > + *p = '\0'; > + ps = p; > + > + /* Chop off URI path components one by one and build local path. */ > + while (u <= cp_end) { > + const char *next = u; > + struct mg_str component; > + if (exists) { > + cs_stat_t st; > + exists = (mg_stat(lp, &st) == 0); > + if (exists && S_ISREG(st.st_mode)) { > + /* We found the terminal, the rest of the URI (if any) is path_info. > + */ > + if (*(u - 1) == '/') u--; > + break; > + } > + } > + if (u >= cp_end) break; > + parse_uri_component((const char **) &next, cp_end, "/", &component); > + if (component.len > 0) { > + int len; > + memmove(p + 1, component.p, component.len); > + len = mg_url_decode(p + 1, component.len, p + 1, lp_end - p - 1, 0); > + if (len <= 0) { > + ok = 0; > + break; > + } > + component.p = p + 1; > + component.len = len; > + if (mg_vcmp(&component, ".") == 0) { > + /* Yum. */ > + } else if (mg_vcmp(&component, "..") == 0) { > + while (p > ps && *p != DIRSEP) p--; > + *p = '\0'; > + } else { > + size_t i; > +#ifdef _WIN32 > + /* On Windows, make sure it's valid Unicode (no funny stuff). */ > + wchar_t buf[MG_MAX_PATH * 2]; > + if (to_wchar(component.p, buf, MG_MAX_PATH) == 0) { > + DBG(("[%.*s] smells funny", (int) component.len, component.p)); > + ok = 0; > + break; > + } > +#endif > + *p++ = DIRSEP; > + /* No NULs and DIRSEPs in the component (percent-encoded). */ > + for (i = 0; i < component.len; i++, p++) { > + if (*p == '\0' || *p == DIRSEP > +#ifdef _WIN32 > + /* On Windows, "/" is also accepted, so check for that too. */ > + || > + *p == '/' > +#endif > + ) { > + ok = 0; > + break; > + } > + } > + } > + } > + u = next; > + } > + if (ok) { > + *local_path = lp; > + if (u > cp_end) u = cp_end; > + remainder->p = u; > + remainder->len = cp_end - u; > + } else { > + MG_FREE(lp); > + } > + } > + > +out: > + LOG(LL_DEBUG, > + ("'%.*s' -> '%s' + '%.*s'", (int) hm->uri.len, hm->uri.p, > + *local_path ? *local_path : "", (int) remainder->len, remainder->p)); > + return ok; > +} > + > +static int mg_get_month_index(const char *s) { > + static const char *month_names[] = {"Jan", "Feb", "Mar", "Apr", "May", "Jun", > + "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"}; > + size_t i; > + > + for (i = 0; i < ARRAY_SIZE(month_names); i++) > + if (!strcmp(s, month_names[i])) return (int) i; > + > + return -1; > +} > + > +static int mg_num_leap_years(int year) { > + return year / 4 - year / 100 + year / 400; > +} > + > +/* Parse UTC date-time string, and return the corresponding time_t value. */ > +MG_INTERNAL time_t mg_parse_date_string(const char *datetime) { > + static const unsigned short days_before_month[] = { > + 0, 31, 59, 90, 120, 151, 181, 212, 243, 273, 304, 334}; > + char month_str[32]; > + int second, minute, hour, day, month, year, leap_days, days; > + time_t result = (time_t) 0; > + > + if (((sscanf(datetime, "%d/%3s/%d %d:%d:%d", &day, month_str, &year, &hour, > + &minute, &second) == 6) || > + (sscanf(datetime, "%d %3s %d %d:%d:%d", &day, month_str, &year, &hour, > + &minute, &second) == 6) || > + (sscanf(datetime, "%*3s, %d %3s %d %d:%d:%d", &day, month_str, &year, > + &hour, &minute, &second) == 6) || > + (sscanf(datetime, "%d-%3s-%d %d:%d:%d", &day, month_str, &year, &hour, > + &minute, &second) == 6)) && > + year > 1970 && (month = mg_get_month_index(month_str)) != -1) { > + leap_days = mg_num_leap_years(year) - mg_num_leap_years(1970); > + year -= 1970; > + days = year * 365 + days_before_month[month] + (day - 1) + leap_days; > + result = days * 24 * 3600 + hour * 3600 + minute * 60 + second; > + } > + > + return result; > +} > + > +MG_INTERNAL int mg_is_not_modified(struct http_message *hm, cs_stat_t *st) { > + struct mg_str *hdr; > + if ((hdr = mg_get_http_header(hm, "If-None-Match")) != NULL) { > + char etag[64]; > + mg_http_construct_etag(etag, sizeof(etag), st); > + return mg_vcasecmp(hdr, etag) == 0; > + } else if ((hdr = mg_get_http_header(hm, "If-Modified-Since")) != NULL) { > + return st->st_mtime <= mg_parse_date_string(hdr->p); > + } else { > + return 0; > + } > +} > + > +static void mg_http_send_digest_auth_request(struct mg_connection *c, > + const char *domain) { > + mg_printf(c, > + "HTTP/1.1 401 Unauthorized\r\n" > + "WWW-Authenticate: Digest qop=\"auth\", " > + "realm=\"%s\", nonce=\"%lu\"\r\n" > + "Content-Length: 0\r\n\r\n", > + domain, (unsigned long) mg_time()); > +} > + > +static void mg_http_send_options(struct mg_connection *nc) { > + mg_printf(nc, "%s", > + "HTTP/1.1 200 OK\r\nAllow: GET, POST, HEAD, CONNECT, OPTIONS" > +#if MG_ENABLE_HTTP_WEBDAV > + ", MKCOL, PUT, DELETE, PROPFIND, MOVE\r\nDAV: 1,2" > +#endif > + "\r\n\r\n"); > + nc->flags |= MG_F_SEND_AND_CLOSE; > +} > + > +static int mg_is_creation_request(const struct http_message *hm) { > + return mg_vcmp(&hm->method, "MKCOL") == 0 || mg_vcmp(&hm->method, "PUT") == 0; > +} > + > +MG_INTERNAL void mg_send_http_file(struct mg_connection *nc, char *path, > + const struct mg_str *path_info, > + struct http_message *hm, > + struct mg_serve_http_opts *opts) { > + int exists, is_directory, is_cgi; > +#if MG_ENABLE_HTTP_WEBDAV > + int is_dav = mg_is_dav_request(&hm->method); > +#else > + int is_dav = 0; > +#endif > + char *index_file = NULL; > + cs_stat_t st; > + > + exists = (mg_stat(path, &st) == 0); > + is_directory = exists && S_ISDIR(st.st_mode); > + > + if (is_directory) > + mg_find_index_file(path, opts->index_files, &index_file, &st); > + > + is_cgi = > + (mg_match_prefix(opts->cgi_file_pattern, strlen(opts->cgi_file_pattern), > + index_file ? index_file : path) > 0); > + > + LOG(LL_DEBUG, > + ("%p %.*s [%s] exists=%d is_dir=%d is_dav=%d is_cgi=%d index=%s", nc, > + (int) hm->method.len, hm->method.p, path, exists, is_directory, is_dav, > + is_cgi, index_file ? index_file : "")); > + > + if (is_directory && hm->uri.p[hm->uri.len - 1] != '/' && !is_dav) { > + mg_printf(nc, > + "HTTP/1.1 301 Moved\r\nLocation: %.*s/\r\n" > + "Content-Length: 0\r\n\r\n", > + (int) hm->uri.len, hm->uri.p); > + MG_FREE(index_file); > + return; > + } > + > + /* If we have path_info, the only way to handle it is CGI. */ > + if (path_info->len > 0 && !is_cgi) { > + mg_http_send_error(nc, 501, NULL); > + MG_FREE(index_file); > + return; > + } > + > + if (is_dav && opts->dav_document_root == NULL) { > + mg_http_send_error(nc, 501, NULL); > + } else if (!mg_http_is_authorized(hm, mg_mk_str(path), is_directory, > + opts->auth_domain, opts->global_auth_file, > + 1) || > + !mg_http_is_authorized(hm, mg_mk_str(path), is_directory, > + opts->auth_domain, > + opts->per_directory_auth_file, 0)) { > + mg_http_send_digest_auth_request(nc, opts->auth_domain); > + } else if (is_cgi) { > +#if MG_ENABLE_HTTP_CGI > + mg_handle_cgi(nc, index_file ? index_file : path, path_info, hm, opts); > +#else > + mg_http_send_error(nc, 501, NULL); > +#endif /* MG_ENABLE_HTTP_CGI */ > + } else if ((!exists || > + mg_is_file_hidden(path, opts, 0 /* specials are ok */)) && > + !mg_is_creation_request(hm)) { > + mg_http_send_error(nc, 404, NULL); > +#if MG_ENABLE_HTTP_WEBDAV > + } else if (!mg_vcmp(&hm->method, "PROPFIND")) { > + mg_handle_propfind(nc, path, &st, hm, opts); > +#if !MG_DISABLE_DAV_AUTH > + } else if (is_dav && (opts->dav_auth_file == NULL || > + (strcmp(opts->dav_auth_file, "-") != 0 && > + !mg_http_is_authorized(hm, mg_mk_str(path), > + is_directory, opts->auth_domain, > + opts->dav_auth_file, 1)))) { > + mg_http_send_digest_auth_request(nc, opts->auth_domain); > +#endif > + } else if (!mg_vcmp(&hm->method, "MKCOL")) { > + mg_handle_mkcol(nc, path, hm); > + } else if (!mg_vcmp(&hm->method, "DELETE")) { > + mg_handle_delete(nc, opts, path); > + } else if (!mg_vcmp(&hm->method, "PUT")) { > + mg_handle_put(nc, path, hm); > + } else if (!mg_vcmp(&hm->method, "MOVE")) { > + mg_handle_move(nc, opts, path, hm); > +#if MG_ENABLE_FAKE_DAVLOCK > + } else if (!mg_vcmp(&hm->method, "LOCK")) { > + mg_handle_lock(nc, path); > +#endif > +#endif /* MG_ENABLE_HTTP_WEBDAV */ > + } else if (!mg_vcmp(&hm->method, "OPTIONS")) { > + mg_http_send_options(nc); > + } else if (is_directory && index_file == NULL) { > +#if MG_ENABLE_DIRECTORY_LISTING > + if (strcmp(opts->enable_directory_listing, "yes") == 0) { > + mg_send_directory_listing(nc, path, hm, opts); > + } else { > + mg_http_send_error(nc, 403, NULL); > + } > +#else > + mg_http_send_error(nc, 501, NULL); > +#endif > + } else if (mg_is_not_modified(hm, &st)) { > + mg_http_send_error(nc, 304, "Not Modified"); > + } else { > + mg_http_serve_file2(nc, index_file ? index_file : path, hm, opts); > + } > + MG_FREE(index_file); > +} > + > +void mg_serve_http(struct mg_connection *nc, struct http_message *hm, > + struct mg_serve_http_opts opts) { > + char *path = NULL; > + struct mg_str *hdr, path_info; > + uint32_t remote_ip = ntohl(*(uint32_t *) &nc->sa.sin.sin_addr); > + > + if (mg_check_ip_acl(opts.ip_acl, remote_ip) != 1) { > + /* Not allowed to connect */ > + mg_http_send_error(nc, 403, NULL); > + nc->flags |= MG_F_SEND_AND_CLOSE; > + return; > + } > + > +#if MG_ENABLE_HTTP_URL_REWRITES > + if (mg_http_handle_forwarding(nc, hm, &opts)) { > + return; > + } > + > + if (mg_http_send_port_based_redirect(nc, hm, &opts)) { > + return; > + } > +#endif > + > + if (opts.document_root == NULL) { > + opts.document_root = "."; > + } > + if (opts.per_directory_auth_file == NULL) { > + opts.per_directory_auth_file = ".htpasswd"; > + } > + if (opts.enable_directory_listing == NULL) { > + opts.enable_directory_listing = "yes"; > + } > + if (opts.cgi_file_pattern == NULL) { > + opts.cgi_file_pattern = "**.cgi$|**.php$"; > + } > + if (opts.ssi_pattern == NULL) { > + opts.ssi_pattern = "**.shtml$|**.shtm$"; > + } > + if (opts.index_files == NULL) { > + opts.index_files = "index.html,index.htm,index.shtml,index.cgi,index.php"; > + } > + /* Normalize path - resolve "." and ".." (in-place). */ > + if (!mg_normalize_uri_path(&hm->uri, &hm->uri)) { > + mg_http_send_error(nc, 400, NULL); > + return; > + } > + if (mg_uri_to_local_path(hm, &opts, &path, &path_info) == 0) { > + mg_http_send_error(nc, 404, NULL); > + return; > + } > + mg_send_http_file(nc, path, &path_info, hm, &opts); > + > + MG_FREE(path); > + path = NULL; > + > + /* Close connection for non-keep-alive requests */ > + if (mg_vcmp(&hm->proto, "HTTP/1.1") != 0 || > + ((hdr = mg_get_http_header(hm, "Connection")) != NULL && > + mg_vcmp(hdr, "keep-alive") != 0)) { > +#if 0 > + nc->flags |= MG_F_SEND_AND_CLOSE; > +#endif > + } > +} > + > +#if MG_ENABLE_HTTP_STREAMING_MULTIPART > +void mg_file_upload_handler(struct mg_connection *nc, int ev, void *ev_data, > + mg_fu_fname_fn local_name_fn > + MG_UD_ARG(void *user_data)) { > + switch (ev) { > + case MG_EV_HTTP_PART_BEGIN: { > + struct mg_http_multipart_part *mp = > + (struct mg_http_multipart_part *) ev_data; > + struct file_upload_state *fus = > + (struct file_upload_state *) MG_CALLOC(1, sizeof(*fus)); > + struct mg_str lfn = local_name_fn(nc, mg_mk_str(mp->file_name)); > + mp->user_data = NULL; > + if (lfn.p == NULL || lfn.len == 0) { > + LOG(LL_ERROR, ("%p Not allowed to upload %s", nc, mp->file_name)); > + mg_printf(nc, > + "HTTP/1.1 403 Not Allowed\r\n" > + "Content-Type: text/plain\r\n" > + "Connection: close\r\n\r\n" > + "Not allowed to upload %s\r\n", > + mp->file_name); > + nc->flags |= MG_F_SEND_AND_CLOSE; > + return; > + } > + fus->lfn = (char *) MG_MALLOC(lfn.len + 1); > + memcpy(fus->lfn, lfn.p, lfn.len); > + fus->lfn[lfn.len] = '\0'; > + if (lfn.p != mp->file_name) MG_FREE((char *) lfn.p); > + LOG(LL_DEBUG, > + ("%p Receiving file %s -> %s", nc, mp->file_name, fus->lfn)); > + fus->fp = mg_fopen(fus->lfn, "w"); > + if (fus->fp == NULL) { > + mg_printf(nc, > + "HTTP/1.1 500 Internal Server Error\r\n" > + "Content-Type: text/plain\r\n" > + "Connection: close\r\n\r\n"); > + LOG(LL_ERROR, ("Failed to open %s: %d\n", fus->lfn, mg_get_errno())); > + mg_printf(nc, "Failed to open %s: %d\n", fus->lfn, mg_get_errno()); > + /* Do not close the connection just yet, discard remainder of the data. > + * This is because at the time of writing some browsers (Chrome) fail to > + * render response before all the data is sent. */ > + } > + mp->user_data = (void *) fus; > + break; > + } > + case MG_EV_HTTP_PART_DATA: { > + struct mg_http_multipart_part *mp = > + (struct mg_http_multipart_part *) ev_data; > + struct file_upload_state *fus = > + (struct file_upload_state *) mp->user_data; > + if (fus == NULL || fus->fp == NULL) break; > + if (mg_fwrite(mp->data.p, 1, mp->data.len, fus->fp) != mp->data.len) { > + LOG(LL_ERROR, ("Failed to write to %s: %d, wrote %d", fus->lfn, > + mg_get_errno(), (int) fus->num_recd)); > + if (mg_get_errno() == ENOSPC > +#ifdef SPIFFS_ERR_FULL > + || mg_get_errno() == SPIFFS_ERR_FULL > +#endif > + ) { > + mg_printf(nc, > + "HTTP/1.1 413 Payload Too Large\r\n" > + "Content-Type: text/plain\r\n" > + "Connection: close\r\n\r\n"); > + mg_printf(nc, "Failed to write to %s: no space left; wrote %d\r\n", > + fus->lfn, (int) fus->num_recd); > + } else { > + mg_printf(nc, > + "HTTP/1.1 500 Internal Server Error\r\n" > + "Content-Type: text/plain\r\n" > + "Connection: close\r\n\r\n"); > + mg_printf(nc, "Failed to write to %s: %d, wrote %d", mp->file_name, > + mg_get_errno(), (int) fus->num_recd); > + } > + fclose(fus->fp); > + remove(fus->lfn); > + fus->fp = NULL; > + /* Do not close the connection just yet, discard remainder of the data. > + * This is because at the time of writing some browsers (Chrome) fail to > + * render response before all the data is sent. */ > + return; > + } > + fus->num_recd += mp->data.len; > + LOG(LL_DEBUG, ("%p rec'd %d bytes, %d total", nc, (int) mp->data.len, > + (int) fus->num_recd)); > + break; > + } > + case MG_EV_HTTP_PART_END: { > + struct mg_http_multipart_part *mp = > + (struct mg_http_multipart_part *) ev_data; > + struct file_upload_state *fus = > + (struct file_upload_state *) mp->user_data; > + if (fus == NULL) break; > + if (mp->status >= 0 && fus->fp != NULL) { > + LOG(LL_DEBUG, ("%p Uploaded %s (%s), %d bytes", nc, mp->file_name, > + fus->lfn, (int) fus->num_recd)); > + mg_printf(nc, > + "HTTP/1.1 200 OK\r\n" > + "Content-Type: text/plain\r\n" > + "Connection: close\r\n\r\n" > + "Ok, %s - %d bytes.\r\n", > + mp->file_name, (int) fus->num_recd); > + } else { > + LOG(LL_ERROR, ("Failed to store %s (%s)", mp->file_name, fus->lfn)); > + /* > + * mp->status < 0 means connection was terminated, so no reason to send > + * HTTP reply > + */ > + } > + if (fus->fp != NULL) fclose(fus->fp); > + MG_FREE(fus->lfn); > + MG_FREE(fus); > + mp->user_data = NULL; > + nc->flags |= MG_F_SEND_AND_CLOSE; > + break; > + } > + } > + > +#if MG_ENABLE_CALLBACK_USERDATA > + (void) user_data; > +#endif > +} > + > +#endif /* MG_ENABLE_HTTP_STREAMING_MULTIPART */ > +#endif /* MG_ENABLE_FILESYSTEM */ > + > +struct mg_connection *mg_connect_http_base( > + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), > + struct mg_connect_opts opts, const char *scheme1, const char *scheme2, > + const char *scheme_ssl1, const char *scheme_ssl2, const char *url, > + struct mg_str *path, struct mg_str *user_info, struct mg_str *host) { > + struct mg_connection *nc = NULL; > + unsigned int port_i = 0; > + int use_ssl = 0; > + struct mg_str scheme, query, fragment; > + char conn_addr_buf[2]; > + char *conn_addr = conn_addr_buf; > + > + if (mg_parse_uri(mg_mk_str(url), &scheme, user_info, host, &port_i, path, > + &query, &fragment) != 0) { > + MG_SET_PTRPTR(opts.error_string, "cannot parse url"); > + goto out; > + } > + > + /* If query is present, do not strip it. Pass to the caller. */ > + if (query.len > 0) path->len += query.len + 1; > + > + if (scheme.len == 0 || mg_vcmp(&scheme, scheme1) == 0 || > + (scheme2 != NULL && mg_vcmp(&scheme, scheme2) == 0)) { > + use_ssl = 0; > + if (port_i == 0) port_i = 80; > + } else if (mg_vcmp(&scheme, scheme_ssl1) == 0 || > + (scheme2 != NULL && mg_vcmp(&scheme, scheme_ssl2) == 0)) { > + use_ssl = 1; > + if (port_i == 0) port_i = 443; > + } else { > + goto out; > + } > + > + mg_asprintf(&conn_addr, sizeof(conn_addr_buf), "tcp://%.*s:%u", > + (int) host->len, host->p, port_i); > + if (conn_addr == NULL) goto out; > + > + LOG(LL_DEBUG, ("%s use_ssl? %d %s", url, use_ssl, conn_addr)); > + if (use_ssl) { > +#if MG_ENABLE_SSL > + /* > + * Schema requires SSL, but no SSL parameters were provided in opts. > + * In order to maintain backward compatibility, use a faux-SSL with no > + * verification. > + */ > + if (opts.ssl_ca_cert == NULL) { > + opts.ssl_ca_cert = "*"; > + } > +#else > + MG_SET_PTRPTR(opts.error_string, "ssl is disabled"); > + goto out; > +#endif > + } > + > + if ((nc = mg_connect_opt(mgr, conn_addr, MG_CB(ev_handler, user_data), > + opts)) != NULL) { > + mg_set_protocol_http_websocket(nc); > + } > + > +out: > + if (conn_addr != NULL && conn_addr != conn_addr_buf) MG_FREE(conn_addr); > + return nc; > +} > + > +struct mg_connection *mg_connect_http_opt( > + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), > + struct mg_connect_opts opts, const char *url, const char *extra_headers, > + const char *post_data) { > + struct mg_str user = MG_NULL_STR, null_str = MG_NULL_STR; > + struct mg_str host = MG_NULL_STR, path = MG_NULL_STR; > + struct mbuf auth; > + struct mg_connection *nc = > + mg_connect_http_base(mgr, MG_CB(ev_handler, user_data), opts, "http", > + NULL, "https", NULL, url, &path, &user, &host); > + > + if (nc == NULL) { > + return NULL; > + } > + > + mbuf_init(&auth, 0); > + if (user.len > 0) { > + mg_basic_auth_header(user, null_str, &auth); > + } > + > + if (post_data == NULL) post_data = ""; > + if (extra_headers == NULL) extra_headers = ""; > + if (path.len == 0) path = mg_mk_str("/"); > + > + mg_printf(nc, "%s %.*s HTTP/1.1\r\nHost: %.*s\r\nContent-Length: %" SIZE_T_FMT > + "\r\n%.*s%s\r\n%s", > + (post_data[0] == '\0' ? "GET" : "POST"), (int) path.len, path.p, > + (int) (path.p - host.p), host.p, strlen(post_data), (int) auth.len, > + (auth.buf == NULL ? "" : auth.buf), extra_headers, post_data); > + > + mbuf_free(&auth); > + return nc; > +} > + > +struct mg_connection *mg_connect_http( > + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), > + const char *url, const char *extra_headers, const char *post_data) { > + struct mg_connect_opts opts; > + memset(&opts, 0, sizeof(opts)); > + return mg_connect_http_opt(mgr, MG_CB(ev_handler, user_data), opts, url, > + extra_headers, post_data); > +} > + > +size_t mg_parse_multipart(const char *buf, size_t buf_len, char *var_name, > + size_t var_name_len, char *file_name, > + size_t file_name_len, const char **data, > + size_t *data_len) { > + static const char cd[] = "Content-Disposition: "; > + size_t hl, bl, n, ll, pos, cdl = sizeof(cd) - 1; > + > + if (buf == NULL || buf_len <= 0) return 0; > + if ((hl = mg_http_get_request_len(buf, buf_len)) <= 0) return 0; > + if (buf[0] != '-' || buf[1] != '-' || buf[2] == '\n') return 0; > + > + /* Get boundary length */ > + bl = mg_get_line_len(buf, buf_len); > + > + /* Loop through headers, fetch variable name and file name */ > + var_name[0] = file_name[0] = '\0'; > + for (n = bl; (ll = mg_get_line_len(buf + n, hl - n)) > 0; n += ll) { > + if (mg_ncasecmp(cd, buf + n, cdl) == 0) { > + struct mg_str header; > + header.p = buf + n + cdl; > + header.len = ll - (cdl + 2); > + mg_http_parse_header(&header, "name", var_name, var_name_len); > + mg_http_parse_header(&header, "filename", file_name, file_name_len); > + } > + } > + > + /* Scan through the body, search for terminating boundary */ > + for (pos = hl; pos + (bl - 2) < buf_len; pos++) { > + if (buf[pos] == '-' && !strncmp(buf, &buf[pos], bl - 2)) { > + if (data_len != NULL) *data_len = (pos - 2) - hl; > + if (data != NULL) *data = buf + hl; > + return pos; > + } > + } > + > + return 0; > +} > + > +void mg_register_http_endpoint_opt(struct mg_connection *nc, > + const char *uri_path, > + mg_event_handler_t handler, > + struct mg_http_endpoint_opts opts) { > + struct mg_http_proto_data *pd = NULL; > + struct mg_http_endpoint *new_ep = NULL; > + > + if (nc == NULL) return; > + new_ep = (struct mg_http_endpoint *) MG_CALLOC(1, sizeof(*new_ep)); > + if (new_ep == NULL) return; > + > + pd = mg_http_get_proto_data(nc); > + new_ep->uri_pattern = mg_strdup(mg_mk_str(uri_path)); > + if (opts.auth_domain != NULL && opts.auth_file != NULL) { > + new_ep->auth_domain = strdup(opts.auth_domain); > + new_ep->auth_file = strdup(opts.auth_file); > + } > + new_ep->handler = handler; > +#if MG_ENABLE_CALLBACK_USERDATA > + new_ep->user_data = opts.user_data; > +#endif > + new_ep->next = pd->endpoints; > + pd->endpoints = new_ep; > +} > + > +static void mg_http_call_endpoint_handler(struct mg_connection *nc, int ev, > + struct http_message *hm) { > + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); > + void *user_data = nc->user_data; > + > + if (ev == MG_EV_HTTP_REQUEST > +#if MG_ENABLE_HTTP_STREAMING_MULTIPART > + || ev == MG_EV_HTTP_MULTIPART_REQUEST > +#endif > + ) { > + struct mg_http_endpoint *ep = > + mg_http_get_endpoint_handler(nc->listener, &hm->uri); > + if (ep != NULL) { > +#if MG_ENABLE_FILESYSTEM && !MG_DISABLE_HTTP_DIGEST_AUTH > + if (!mg_http_is_authorized(hm, hm->uri, 0 /* is_directory */, > + ep->auth_domain, ep->auth_file, > + 1 /* is_global_pass_file */)) { > + mg_http_send_digest_auth_request(nc, ep->auth_domain); > + return; > + } > +#endif > + pd->endpoint_handler = ep->handler; > +#if MG_ENABLE_CALLBACK_USERDATA > + user_data = ep->user_data; > +#endif > + } > + } > + mg_call(nc, pd->endpoint_handler ? pd->endpoint_handler : nc->handler, > + user_data, ev, hm); > +} > + > +void mg_register_http_endpoint(struct mg_connection *nc, const char *uri_path, > + MG_CB(mg_event_handler_t handler, > + void *user_data)) { > + struct mg_http_endpoint_opts opts; > + memset(&opts, 0, sizeof(opts)); > +#if MG_ENABLE_CALLBACK_USERDATA > + opts.user_data = user_data; > +#endif > + mg_register_http_endpoint_opt(nc, uri_path, handler, opts); > +} > + > +#endif /* MG_ENABLE_HTTP */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/http_cgi.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef _WIN32 > +#include <signal.h> > +#endif > + > +#if MG_ENABLE_HTTP && MG_ENABLE_HTTP_CGI > + > +#ifndef MG_MAX_CGI_ENVIR_VARS > +#define MG_MAX_CGI_ENVIR_VARS 64 > +#endif > + > +#ifndef MG_ENV_EXPORT_TO_CGI > +#define MG_ENV_EXPORT_TO_CGI "MONGOOSE_CGI" > +#endif > + > +#define MG_F_HTTP_CGI_PARSE_HEADERS MG_F_USER_1 > + > +/* > + * This structure helps to create an environment for the spawned CGI program. > + * Environment is an array of "VARIABLE=VALUE\0" ASCIIZ strings, > + * last element must be NULL. > + * However, on Windows there is a requirement that all these VARIABLE=VALUE\0 > + * strings must reside in a contiguous buffer. The end of the buffer is > + * marked by two '\0' characters. > + * We satisfy both worlds: we create an envp array (which is vars), all > + * entries are actually pointers inside buf. > + */ > +struct mg_cgi_env_block { > + struct mg_connection *nc; > + char buf[MG_CGI_ENVIRONMENT_SIZE]; /* Environment buffer */ > + const char *vars[MG_MAX_CGI_ENVIR_VARS]; /* char *envp[] */ > + int len; /* Space taken */ > + int nvars; /* Number of variables in envp[] */ > +}; > + > +#ifdef _WIN32 > +struct mg_threadparam { > + sock_t s; > + HANDLE hPipe; > +}; > + > +static int mg_wait_until_ready(sock_t sock, int for_read) { > + fd_set set; > + FD_ZERO(&set); > + FD_SET(sock, &set); > + return select(sock + 1, for_read ? &set : 0, for_read ? 0 : &set, 0, 0) == 1; > +} > + > +static void *mg_push_to_stdin(void *arg) { > + struct mg_threadparam *tp = (struct mg_threadparam *) arg; > + int n, sent, stop = 0; > + DWORD k; > + char buf[BUFSIZ]; > + > + while (!stop && mg_wait_until_ready(tp->s, 1) && > + (n = recv(tp->s, buf, sizeof(buf), 0)) > 0) { > + if (n == -1 && GetLastError() == WSAEWOULDBLOCK) continue; > + for (sent = 0; !stop && sent < n; sent += k) { > + if (!WriteFile(tp->hPipe, buf + sent, n - sent, &k, 0)) stop = 1; > + } > + } > + DBG(("%s", "FORWARED EVERYTHING TO CGI")); > + CloseHandle(tp->hPipe); > + MG_FREE(tp); > + return NULL; > +} > + > +static void *mg_pull_from_stdout(void *arg) { > + struct mg_threadparam *tp = (struct mg_threadparam *) arg; > + int k = 0, stop = 0; > + DWORD n, sent; > + char buf[BUFSIZ]; > + > + while (!stop && ReadFile(tp->hPipe, buf, sizeof(buf), &n, NULL)) { > + for (sent = 0; !stop && sent < n; sent += k) { > + if (mg_wait_until_ready(tp->s, 0) && > + (k = send(tp->s, buf + sent, n - sent, 0)) <= 0) > + stop = 1; > + } > + } > + DBG(("%s", "EOF FROM CGI")); > + CloseHandle(tp->hPipe); > + shutdown(tp->s, 2); // Without this, IO thread may get truncated data > + closesocket(tp->s); > + MG_FREE(tp); > + return NULL; > +} > + > +static void mg_spawn_stdio_thread(sock_t sock, HANDLE hPipe, > + void *(*func)(void *)) { > + struct mg_threadparam *tp = (struct mg_threadparam *) MG_MALLOC(sizeof(*tp)); > + if (tp != NULL) { > + tp->s = sock; > + tp->hPipe = hPipe; > + mg_start_thread(func, tp); > + } > +} > + > +static void mg_abs_path(const char *utf8_path, char *abs_path, size_t len) { > + wchar_t buf[MG_MAX_PATH], buf2[MG_MAX_PATH]; > + to_wchar(utf8_path, buf, ARRAY_SIZE(buf)); > + GetFullPathNameW(buf, ARRAY_SIZE(buf2), buf2, NULL); > + WideCharToMultiByte(CP_UTF8, 0, buf2, wcslen(buf2) + 1, abs_path, len, 0, 0); > +} > + > +static int mg_start_process(const char *interp, const char *cmd, > + const char *env, const char *envp[], > + const char *dir, sock_t sock) { > + STARTUPINFOW si; > + PROCESS_INFORMATION pi; > + HANDLE a[2], b[2], me = GetCurrentProcess(); > + wchar_t wcmd[MG_MAX_PATH], full_dir[MG_MAX_PATH]; > + char buf[MG_MAX_PATH], buf2[MG_MAX_PATH], buf5[MG_MAX_PATH], > + buf4[MG_MAX_PATH], cmdline[MG_MAX_PATH]; > + DWORD flags = DUPLICATE_CLOSE_SOURCE | DUPLICATE_SAME_ACCESS; > + FILE *fp; > + > + memset(&si, 0, sizeof(si)); > + memset(&pi, 0, sizeof(pi)); > + > + si.cb = sizeof(si); > + si.dwFlags = STARTF_USESTDHANDLES | STARTF_USESHOWWINDOW; > + si.wShowWindow = SW_HIDE; > + si.hStdError = GetStdHandle(STD_ERROR_HANDLE); > + > + CreatePipe(&a[0], &a[1], NULL, 0); > + CreatePipe(&b[0], &b[1], NULL, 0); > + DuplicateHandle(me, a[0], me, &si.hStdInput, 0, TRUE, flags); > + DuplicateHandle(me, b[1], me, &si.hStdOutput, 0, TRUE, flags); > + > + if (interp == NULL && (fp = mg_fopen(cmd, "r")) != NULL) { > + buf[0] = buf[1] = '\0'; > + fgets(buf, sizeof(buf), fp); > + buf[sizeof(buf) - 1] = '\0'; > + if (buf[0] == '#' && buf[1] == '!') { > + interp = buf + 2; > + /* Trim leading spaces: https://github.com/cesanta/mongoose/issues/489 */ > + while (*interp != '\0' && isspace(*(unsigned char *) interp)) { > + interp++; > + } > + } > + fclose(fp); > + } > + > + snprintf(buf, sizeof(buf), "%s/%s", dir, cmd); > + mg_abs_path(buf, buf2, ARRAY_SIZE(buf2)); > + > + mg_abs_path(dir, buf5, ARRAY_SIZE(buf5)); > + to_wchar(dir, full_dir, ARRAY_SIZE(full_dir)); > + > + if (interp != NULL) { > + mg_abs_path(interp, buf4, ARRAY_SIZE(buf4)); > + snprintf(cmdline, sizeof(cmdline), "%s \"%s\"", buf4, buf2); > + } else { > + snprintf(cmdline, sizeof(cmdline), "\"%s\"", buf2); > + } > + to_wchar(cmdline, wcmd, ARRAY_SIZE(wcmd)); > + > + if (CreateProcessW(NULL, wcmd, NULL, NULL, TRUE, CREATE_NEW_PROCESS_GROUP, > + (void *) env, full_dir, &si, &pi) != 0) { > + mg_spawn_stdio_thread(sock, a[1], mg_push_to_stdin); > + mg_spawn_stdio_thread(sock, b[0], mg_pull_from_stdout); > + > + CloseHandle(si.hStdOutput); > + CloseHandle(si.hStdInput); > + > + CloseHandle(pi.hThread); > + CloseHandle(pi.hProcess); > + } else { > + CloseHandle(a[1]); > + CloseHandle(b[0]); > + closesocket(sock); > + } > + DBG(("CGI command: [%ls] -> %p", wcmd, pi.hProcess)); > + > + /* Not closing a[0] and b[1] because we've used DUPLICATE_CLOSE_SOURCE */ > + (void) envp; > + return (pi.hProcess != NULL); > +} > +#else > +static int mg_start_process(const char *interp, const char *cmd, > + const char *env, const char *envp[], > + const char *dir, sock_t sock) { > + char buf[500]; > + pid_t pid = fork(); > + (void) env; > + > + if (pid == 0) { > + /* > + * In Linux `chdir` declared with `warn_unused_result` attribute > + * To shutup compiler we have yo use result in some way > + */ > + int tmp = chdir(dir); > + (void) tmp; > + (void) dup2(sock, 0); > + (void) dup2(sock, 1); > + closesocket(sock); > + > + /* > + * After exec, all signal handlers are restored to their default values, > + * with one exception of SIGCHLD. According to POSIX.1-2001 and Linux's > + * implementation, SIGCHLD's handler will leave unchanged after exec > + * if it was set to be ignored. Restore it to default action. > + */ > + signal(SIGCHLD, SIG_DFL); > + > + if (interp == NULL) { > + execle(cmd, cmd, (char *) 0, envp); /* (char *) 0 to squash warning */ > + } else { > + execle(interp, interp, cmd, (char *) 0, envp); > + } > + snprintf(buf, sizeof(buf), > + "Status: 500\r\n\r\n" > + "500 Server Error: %s%s%s: %s", > + interp == NULL ? "" : interp, interp == NULL ? "" : " ", cmd, > + strerror(errno)); > + send(1, buf, strlen(buf), 0); > + _exit(EXIT_FAILURE); /* exec call failed */ > + } > + > + return (pid != 0); > +} > +#endif /* _WIN32 */ > + > +/* > + * Append VARIABLE=VALUE\0 string to the buffer, and add a respective > + * pointer into the vars array. > + */ > +static char *mg_addenv(struct mg_cgi_env_block *block, const char *fmt, ...) { > + int n, space; > + char *added = block->buf + block->len; > + va_list ap; > + > + /* Calculate how much space is left in the buffer */ > + space = sizeof(block->buf) - (block->len + 2); > + if (space > 0) { > + /* Copy VARIABLE=VALUE\0 string into the free space */ > + va_start(ap, fmt); > + n = vsnprintf(added, (size_t) space, fmt, ap); > + va_end(ap); > + > + /* Make sure we do not overflow buffer and the envp array */ > + if (n > 0 && n + 1 < space && > + block->nvars < (int) ARRAY_SIZE(block->vars) - 2) { > + /* Append a pointer to the added string into the envp array */ > + block->vars[block->nvars++] = added; > + /* Bump up used length counter. Include \0 terminator */ > + block->len += n + 1; > + } > + } > + > + return added; > +} > + > +static void mg_addenv2(struct mg_cgi_env_block *blk, const char *name) { > + const char *s; > + if ((s = getenv(name)) != NULL) mg_addenv(blk, "%s=%s", name, s); > +} > + > +static void mg_prepare_cgi_environment(struct mg_connection *nc, > + const char *prog, > + const struct mg_str *path_info, > + const struct http_message *hm, > + const struct mg_serve_http_opts *opts, > + struct mg_cgi_env_block *blk) { > + const char *s; > + struct mg_str *h; > + char *p; > + size_t i; > + char buf[100]; > + > + blk->len = blk->nvars = 0; > + blk->nc = nc; > + > + if ((s = getenv("SERVER_NAME")) != NULL) { > + mg_addenv(blk, "SERVER_NAME=%s", s); > + } else { > + mg_sock_to_str(nc->sock, buf, sizeof(buf), 3); > + mg_addenv(blk, "SERVER_NAME=%s", buf); > + } > + mg_addenv(blk, "SERVER_ROOT=%s", opts->document_root); > + mg_addenv(blk, "DOCUMENT_ROOT=%s", opts->document_root); > + mg_addenv(blk, "SERVER_SOFTWARE=%s/%s", "Mongoose", MG_VERSION); > + > + /* Prepare the environment block */ > + mg_addenv(blk, "%s", "GATEWAY_INTERFACE=CGI/1.1"); > + mg_addenv(blk, "%s", "SERVER_PROTOCOL=HTTP/1.1"); > + mg_addenv(blk, "%s", "REDIRECT_STATUS=200"); /* For PHP */ > + > + mg_addenv(blk, "REQUEST_METHOD=%.*s", (int) hm->method.len, hm->method.p); > + > + mg_addenv(blk, "REQUEST_URI=%.*s%s%.*s", (int) hm->uri.len, hm->uri.p, > + hm->query_string.len == 0 ? "" : "?", (int) hm->query_string.len, > + hm->query_string.p); > + > + mg_conn_addr_to_str(nc, buf, sizeof(buf), > + MG_SOCK_STRINGIFY_REMOTE | MG_SOCK_STRINGIFY_IP); > + mg_addenv(blk, "REMOTE_ADDR=%s", buf); > + mg_conn_addr_to_str(nc, buf, sizeof(buf), MG_SOCK_STRINGIFY_PORT); > + mg_addenv(blk, "SERVER_PORT=%s", buf); > + > + s = hm->uri.p + hm->uri.len - path_info->len - 1; > + if (*s == '/') { > + const char *base_name = strrchr(prog, DIRSEP); > + mg_addenv(blk, "SCRIPT_NAME=%.*s/%s", (int) (s - hm->uri.p), hm->uri.p, > + (base_name != NULL ? base_name + 1 : prog)); > + } else { > + mg_addenv(blk, "SCRIPT_NAME=%.*s", (int) (s - hm->uri.p + 1), hm->uri.p); > + } > + mg_addenv(blk, "SCRIPT_FILENAME=%s", prog); > + > + if (path_info != NULL && path_info->len > 0) { > + mg_addenv(blk, "PATH_INFO=%.*s", (int) path_info->len, path_info->p); > + /* Not really translated... */ > + mg_addenv(blk, "PATH_TRANSLATED=%.*s", (int) path_info->len, path_info->p); > + } > + > +#if MG_ENABLE_SSL > + mg_addenv(blk, "HTTPS=%s", (nc->flags & MG_F_SSL ? "on" : "off")); > +#else > + mg_addenv(blk, "HTTPS=off"); > +#endif > + > + if ((h = mg_get_http_header((struct http_message *) hm, "Content-Type")) != > + NULL) { > + mg_addenv(blk, "CONTENT_TYPE=%.*s", (int) h->len, h->p); > + } > + > + if (hm->query_string.len > 0) { > + mg_addenv(blk, "QUERY_STRING=%.*s", (int) hm->query_string.len, > + hm->query_string.p); > + } > + > + if ((h = mg_get_http_header((struct http_message *) hm, "Content-Length")) != > + NULL) { > + mg_addenv(blk, "CONTENT_LENGTH=%.*s", (int) h->len, h->p); > + } > + > + mg_addenv2(blk, "PATH"); > + mg_addenv2(blk, "TMP"); > + mg_addenv2(blk, "TEMP"); > + mg_addenv2(blk, "TMPDIR"); > + mg_addenv2(blk, "PERLLIB"); > + mg_addenv2(blk, MG_ENV_EXPORT_TO_CGI); > + > +#ifdef _WIN32 > + mg_addenv2(blk, "COMSPEC"); > + mg_addenv2(blk, "SYSTEMROOT"); > + mg_addenv2(blk, "SystemDrive"); > + mg_addenv2(blk, "ProgramFiles"); > + mg_addenv2(blk, "ProgramFiles(x86)"); > + mg_addenv2(blk, "CommonProgramFiles(x86)"); > +#else > + mg_addenv2(blk, "LD_LIBRARY_PATH"); > +#endif /* _WIN32 */ > + > + /* Add all headers as HTTP_* variables */ > + for (i = 0; hm->header_names[i].len > 0; i++) { > + p = mg_addenv(blk, "HTTP_%.*s=%.*s", (int) hm->header_names[i].len, > + hm->header_names[i].p, (int) hm->header_values[i].len, > + hm->header_values[i].p); > + > + /* Convert variable name into uppercase, and change - to _ */ > + for (; *p != '=' && *p != '\0'; p++) { > + if (*p == '-') *p = '_'; > + *p = (char) toupper(*(unsigned char *) p); > + } > + } > + > + blk->vars[blk->nvars++] = NULL; > + blk->buf[blk->len++] = '\0'; > +} > + > +static void mg_cgi_ev_handler(struct mg_connection *cgi_nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data)) { > +#if !MG_ENABLE_CALLBACK_USERDATA > + void *user_data = cgi_nc->user_data; > +#endif > + struct mg_connection *nc = (struct mg_connection *) user_data; > + (void) ev_data; > + > + if (nc == NULL) { > + /* The corresponding network connection was closed. */ > + cgi_nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + return; > + } > + > + switch (ev) { > + case MG_EV_RECV: > + /* > + * CGI script does not output reply line, like "HTTP/1.1 CODE XXXXX\n" > + * It outputs headers, then body. Headers might include "Status" > + * header, which changes CODE, and it might include "Location" header > + * which changes CODE to 302. > + * > + * Therefore we do not send the output from the CGI script to the user > + * until all CGI headers are received. > + * > + * Here we parse the output from the CGI script, and if all headers has > + * been received, send appropriate reply line, and forward all > + * received headers to the client. > + */ > + if (nc->flags & MG_F_HTTP_CGI_PARSE_HEADERS) { > + struct mbuf *io = &cgi_nc->recv_mbuf; > + int len = mg_http_get_request_len(io->buf, io->len); > + > + if (len == 0) break; > + if (len < 0 || io->len > MG_MAX_HTTP_REQUEST_SIZE) { > + cgi_nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + mg_http_send_error(nc, 500, "Bad headers"); > + } else { > + struct http_message hm; > + struct mg_str *h; > + mg_http_parse_headers(io->buf, io->buf + io->len, io->len, &hm); > + if (mg_get_http_header(&hm, "Location") != NULL) { > + mg_printf(nc, "%s", "HTTP/1.1 302 Moved\r\n"); > + } else if ((h = mg_get_http_header(&hm, "Status")) != NULL) { > + mg_printf(nc, "HTTP/1.1 %.*s\r\n", (int) h->len, h->p); > + } else { > + mg_printf(nc, "%s", "HTTP/1.1 200 OK\r\n"); > + } > + } > + nc->flags &= ~MG_F_HTTP_CGI_PARSE_HEADERS; > + } > + if (!(nc->flags & MG_F_HTTP_CGI_PARSE_HEADERS)) { > + mg_forward(cgi_nc, nc); > + } > + break; > + case MG_EV_CLOSE: > + DBG(("%p CLOSE", cgi_nc)); > + mg_http_free_proto_data_cgi(&mg_http_get_proto_data(nc)->cgi); > + nc->flags |= MG_F_SEND_AND_CLOSE; > + break; > + } > +} > + > +MG_INTERNAL void mg_handle_cgi(struct mg_connection *nc, const char *prog, > + const struct mg_str *path_info, > + const struct http_message *hm, > + const struct mg_serve_http_opts *opts) { > + struct mg_cgi_env_block blk; > + char dir[MG_MAX_PATH]; > + const char *p; > + sock_t fds[2]; > + > + DBG(("%p [%s]", nc, prog)); > + mg_prepare_cgi_environment(nc, prog, path_info, hm, opts, &blk); > + /* > + * CGI must be executed in its own directory. 'dir' must point to the > + * directory containing executable program, 'p' must point to the > + * executable program name relative to 'dir'. > + */ > + if ((p = strrchr(prog, DIRSEP)) == NULL) { > + snprintf(dir, sizeof(dir), "%s", "."); > + } else { > + snprintf(dir, sizeof(dir), "%.*s", (int) (p - prog), prog); > + prog = p + 1; > + } > + > + if (!mg_socketpair(fds, SOCK_STREAM)) { > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + return; > + } > + > +#ifndef _WIN32 > + struct sigaction sa; > + > + sigemptyset(&sa.sa_mask); > + sa.sa_handler = SIG_IGN; > + sa.sa_flags = 0; > + sigaction(SIGCHLD, &sa, NULL); > +#endif > + > + if (mg_start_process(opts->cgi_interpreter, prog, blk.buf, blk.vars, dir, > + fds[1]) != 0) { > + size_t n = nc->recv_mbuf.len - (hm->message.len - hm->body.len); > + struct mg_connection *cgi_nc = > + mg_add_sock(nc->mgr, fds[0], mg_cgi_ev_handler MG_UD_ARG(nc)); > + struct mg_http_proto_data *cgi_pd = mg_http_get_proto_data(nc); > + cgi_pd->cgi.cgi_nc = cgi_nc; > +#if !MG_ENABLE_CALLBACK_USERDATA > + cgi_pd->cgi.cgi_nc->user_data = nc; > +#endif > + nc->flags |= MG_F_HTTP_CGI_PARSE_HEADERS; > + /* Push POST data to the CGI */ > + if (n > 0 && n < nc->recv_mbuf.len) { > + mg_send(cgi_pd->cgi.cgi_nc, hm->body.p, n); > + } > + mbuf_remove(&nc->recv_mbuf, nc->recv_mbuf.len); > + } else { > + closesocket(fds[0]); > + mg_http_send_error(nc, 500, "CGI failure"); > + } > + > +#ifndef _WIN32 > + closesocket(fds[1]); /* On Windows, CGI stdio thread closes that socket */ > +#endif > +} > + > +MG_INTERNAL void mg_http_free_proto_data_cgi(struct mg_http_proto_data_cgi *d) { > + if (d == NULL) return; > + if (d->cgi_nc != NULL) { > + d->cgi_nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + d->cgi_nc->user_data = NULL; > + } > + memset(d, 0, sizeof(*d)); > +} > + > +#endif /* MG_ENABLE_HTTP && MG_ENABLE_HTTP_CGI */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/http_ssi.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_HTTP && MG_ENABLE_HTTP_SSI && MG_ENABLE_FILESYSTEM > + > +static void mg_send_ssi_file(struct mg_connection *nc, struct http_message *hm, > + const char *path, FILE *fp, int include_level, > + const struct mg_serve_http_opts *opts); > + > +static void mg_send_file_data(struct mg_connection *nc, FILE *fp) { > + char buf[BUFSIZ]; > + size_t n; > + while ((n = mg_fread(buf, 1, sizeof(buf), fp)) > 0) { > + mg_send(nc, buf, n); > + } > +} > + > +static void mg_do_ssi_include(struct mg_connection *nc, struct http_message *hm, > + const char *ssi, char *tag, int include_level, > + const struct mg_serve_http_opts *opts) { > + char file_name[MG_MAX_PATH], path[MG_MAX_PATH], *p; > + FILE *fp; > + > + /* > + * sscanf() is safe here, since send_ssi_file() also uses buffer > + * of size MG_BUF_LEN to get the tag. So strlen(tag) is always < MG_BUF_LEN. > + */ > + if (sscanf(tag, " virtual=\"%[^\"]\"", file_name) == 1) { > + /* File name is relative to the webserver root */ > + snprintf(path, sizeof(path), "%s/%s", opts->document_root, file_name); > + } else if (sscanf(tag, " abspath=\"%[^\"]\"", file_name) == 1) { > + /* > + * File name is relative to the webserver working directory > + * or it is absolute system path > + */ > + snprintf(path, sizeof(path), "%s", file_name); > + } else if (sscanf(tag, " file=\"%[^\"]\"", file_name) == 1 || > + sscanf(tag, " \"%[^\"]\"", file_name) == 1) { > + /* File name is relative to the currect document */ > + snprintf(path, sizeof(path), "%s", ssi); > + if ((p = strrchr(path, DIRSEP)) != NULL) { > + p[1] = '\0'; > + } > + snprintf(path + strlen(path), sizeof(path) - strlen(path), "%s", file_name); > + } else { > + mg_printf(nc, "Bad SSI #include: [%s]", tag); > + return; > + } > + > + if ((fp = mg_fopen(path, "rb")) == NULL) { > + mg_printf(nc, "SSI include error: mg_fopen(%s): %s", path, > + strerror(mg_get_errno())); > + } else { > + mg_set_close_on_exec((sock_t) fileno(fp)); > + if (mg_match_prefix(opts->ssi_pattern, strlen(opts->ssi_pattern), path) > > + 0) { > + mg_send_ssi_file(nc, hm, path, fp, include_level + 1, opts); > + } else { > + mg_send_file_data(nc, fp); > + } > + fclose(fp); > + } > +} > + > +#if MG_ENABLE_HTTP_SSI_EXEC > +static void do_ssi_exec(struct mg_connection *nc, char *tag) { > + char cmd[BUFSIZ]; > + FILE *fp; > + > + if (sscanf(tag, " \"%[^\"]\"", cmd) != 1) { > + mg_printf(nc, "Bad SSI #exec: [%s]", tag); > + } else if ((fp = popen(cmd, "r")) == NULL) { > + mg_printf(nc, "Cannot SSI #exec: [%s]: %s", cmd, strerror(mg_get_errno())); > + } else { > + mg_send_file_data(nc, fp); > + pclose(fp); > + } > +} > +#endif /* MG_ENABLE_HTTP_SSI_EXEC */ > + > +/* > + * SSI directive has the following format: > + * <!--#directive parameter=value parameter=value --> > + */ > +static void mg_send_ssi_file(struct mg_connection *nc, struct http_message *hm, > + const char *path, FILE *fp, int include_level, > + const struct mg_serve_http_opts *opts) { > + static const struct mg_str btag = MG_MK_STR("<!--#"); > + static const struct mg_str d_include = MG_MK_STR("include"); > + static const struct mg_str d_call = MG_MK_STR("call"); > +#if MG_ENABLE_HTTP_SSI_EXEC > + static const struct mg_str d_exec = MG_MK_STR("exec"); > +#endif > + char buf[BUFSIZ], *p = buf + btag.len; /* p points to SSI directive */ > + int ch, len, in_ssi_tag; > + > + if (include_level > 10) { > + mg_printf(nc, "SSI #include level is too deep (%s)", path); > + return; > + } > + > + in_ssi_tag = len = 0; > + while ((ch = fgetc(fp)) != EOF) { > + if (in_ssi_tag && ch == '>' && buf[len - 1] == '-' && buf[len - 2] == '-') { > + size_t i = len - 2; > + in_ssi_tag = 0; > + > + /* Trim closing --> */ > + buf[i--] = '\0'; > + while (i > 0 && buf[i] == ' ') { > + buf[i--] = '\0'; > + } > + > + /* Handle known SSI directives */ > + if (strncmp(p, d_include.p, d_include.len) == 0) { > + mg_do_ssi_include(nc, hm, path, p + d_include.len + 1, include_level, > + opts); > + } else if (strncmp(p, d_call.p, d_call.len) == 0) { > + struct mg_ssi_call_ctx cctx; > + memset(&cctx, 0, sizeof(cctx)); > + cctx.req = hm; > + cctx.file = mg_mk_str(path); > + cctx.arg = mg_mk_str(p + d_call.len + 1); > + mg_call(nc, NULL, nc->user_data, MG_EV_SSI_CALL, > + (void *) cctx.arg.p); /* NUL added above */ > + mg_call(nc, NULL, nc->user_data, MG_EV_SSI_CALL_CTX, &cctx); > +#if MG_ENABLE_HTTP_SSI_EXEC > + } else if (strncmp(p, d_exec.p, d_exec.len) == 0) { > + do_ssi_exec(nc, p + d_exec.len + 1); > +#endif > + } else { > + /* Silently ignore unknown SSI directive. */ > + } > + len = 0; > + } else if (ch == '<') { > + in_ssi_tag = 1; > + if (len > 0) { > + mg_send(nc, buf, (size_t) len); > + } > + len = 0; > + buf[len++] = ch & 0xff; > + } else if (in_ssi_tag) { > + if (len == (int) btag.len && strncmp(buf, btag.p, btag.len) != 0) { > + /* Not an SSI tag */ > + in_ssi_tag = 0; > + } else if (len == (int) sizeof(buf) - 2) { > + mg_printf(nc, "%s: SSI tag is too large", path); > + len = 0; > + } > + buf[len++] = ch & 0xff; > + } else { > + buf[len++] = ch & 0xff; > + if (len == (int) sizeof(buf)) { > + mg_send(nc, buf, (size_t) len); > + len = 0; > + } > + } > + } > + > + /* Send the rest of buffered data */ > + if (len > 0) { > + mg_send(nc, buf, (size_t) len); > + } > +} > + > +MG_INTERNAL void mg_handle_ssi_request(struct mg_connection *nc, > + struct http_message *hm, > + const char *path, > + const struct mg_serve_http_opts *opts) { > + FILE *fp; > + struct mg_str mime_type; > + DBG(("%p %s", nc, path)); > + > + if ((fp = mg_fopen(path, "rb")) == NULL) { > + mg_http_send_error(nc, 404, NULL); > + } else { > + mg_set_close_on_exec((sock_t) fileno(fp)); > + > + mime_type = mg_get_mime_type(path, "text/plain", opts); > + mg_send_response_line(nc, 200, opts->extra_headers); > + mg_printf(nc, > + "Content-Type: %.*s\r\n" > + "Connection: close\r\n\r\n", > + (int) mime_type.len, mime_type.p); > + mg_send_ssi_file(nc, hm, path, fp, 0, opts); > + fclose(fp); > + nc->flags |= MG_F_SEND_AND_CLOSE; > + } > +} > + > +#endif /* MG_ENABLE_HTTP_SSI && MG_ENABLE_HTTP && MG_ENABLE_FILESYSTEM */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/http_webdav.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_HTTP && MG_ENABLE_HTTP_WEBDAV > + > +MG_INTERNAL int mg_is_dav_request(const struct mg_str *s) { > + static const char *methods[] = { > + "PUT", > + "DELETE", > + "MKCOL", > + "PROPFIND", > + "MOVE" > +#if MG_ENABLE_FAKE_DAVLOCK > + , > + "LOCK", > + "UNLOCK" > +#endif > + }; > + size_t i; > + > + for (i = 0; i < ARRAY_SIZE(methods); i++) { > + if (mg_vcmp(s, methods[i]) == 0) { > + return 1; > + } > + } > + > + return 0; > +} > + > +static int mg_mkdir(const char *path, uint32_t mode) { > +#ifndef _WIN32 > + return mkdir(path, mode); > +#else > + (void) mode; > + return _mkdir(path); > +#endif > +} > + > +static void mg_print_props(struct mg_connection *nc, const char *name, > + cs_stat_t *stp) { > + char mtime[64]; > + time_t t = stp->st_mtime; /* store in local variable for NDK compile */ > + struct mg_str name_esc = mg_url_encode(mg_mk_str(name)); > + mg_gmt_time_string(mtime, sizeof(mtime), &t); > + mg_printf(nc, > + "<d:response>" > + "<d:href>%s</d:href>" > + "<d:propstat>" > + "<d:prop>" > + "<d:resourcetype>%s</d:resourcetype>" > + "<d:getcontentlength>%" INT64_FMT > + "</d:getcontentlength>" > + "<d:getlastmodified>%s</d:getlastmodified>" > + "</d:prop>" > + "<d:status>HTTP/1.1 200 OK</d:status>" > + "</d:propstat>" > + "</d:response>\n", > + name_esc.p, S_ISDIR(stp->st_mode) ? "<d:collection/>" : "", > + (int64_t) stp->st_size, mtime); > + free((void *) name_esc.p); > +} > + > +MG_INTERNAL void mg_handle_propfind(struct mg_connection *nc, const char *path, > + cs_stat_t *stp, struct http_message *hm, > + struct mg_serve_http_opts *opts) { > + static const char header[] = > + "HTTP/1.1 207 Multi-Status\r\n" > + "Connection: close\r\n" > + "Content-Type: text/xml; charset=utf-8\r\n\r\n" > + "<?xml version=\"1.0\" encoding=\"utf-8\"?>" > + "<d:multistatus xmlns:d='DAV:'>\n"; > + static const char footer[] = "</d:multistatus>\n"; > + const struct mg_str *depth = mg_get_http_header(hm, "Depth"); > + > + /* Print properties for the requested resource itself */ > + if (S_ISDIR(stp->st_mode) && > + strcmp(opts->enable_directory_listing, "yes") != 0) { > + mg_printf(nc, "%s", "HTTP/1.1 403 Directory Listing Denied\r\n\r\n"); > + } else { > + char uri[MG_MAX_PATH]; > + mg_send(nc, header, sizeof(header) - 1); > + snprintf(uri, sizeof(uri), "%.*s", (int) hm->uri.len, hm->uri.p); > + mg_print_props(nc, uri, stp); > + if (S_ISDIR(stp->st_mode) && (depth == NULL || mg_vcmp(depth, "0") != 0)) { > + mg_scan_directory(nc, path, opts, mg_print_props); > + } > + mg_send(nc, footer, sizeof(footer) - 1); > + nc->flags |= MG_F_SEND_AND_CLOSE; > + } > +} > + > +#if MG_ENABLE_FAKE_DAVLOCK > +/* > + * Windows explorer (probably there are another WebDav clients like it) > + * requires LOCK support in webdav. W/out this, it still works, but fails > + * to save file: shows error message and offers "Save As". > + * "Save as" works, but this message is very annoying. > + * This is fake lock, which doesn't lock something, just returns LOCK token, > + * UNLOCK always answers "OK". > + * With this fake LOCK Windows Explorer looks happy and saves file. > + * NOTE: that is not DAV LOCK imlementation, it is just a way to shut up > + * Windows native DAV client. This is why FAKE LOCK is not enabed by default > + */ > +MG_INTERNAL void mg_handle_lock(struct mg_connection *nc, const char *path) { > + static const char *reply = > + "HTTP/1.1 207 Multi-Status\r\n" > + "Connection: close\r\n" > + "Content-Type: text/xml; charset=utf-8\r\n\r\n" > + "<?xml version=\"1.0\" encoding=\"utf-8\"?>" > + "<d:multistatus xmlns:d='DAV:'>\n" > + "<D:lockdiscovery>\n" > + "<D:activelock>\n" > + "<D:locktoken>\n" > + "<D:href>\n" > + "opaquelocktoken:%s%u" > + "</D:href>" > + "</D:locktoken>" > + "</D:activelock>\n" > + "</D:lockdiscovery>" > + "</d:multistatus>\n"; > + mg_printf(nc, reply, path, (unsigned int) mg_time()); > + nc->flags |= MG_F_SEND_AND_CLOSE; > +} > +#endif > + > +MG_INTERNAL void mg_handle_mkcol(struct mg_connection *nc, const char *path, > + struct http_message *hm) { > + int status_code = 500; > + if (hm->body.len != (size_t) ~0 && hm->body.len > 0) { > + status_code = 415; > + } else if (!mg_mkdir(path, 0755)) { > + status_code = 201; > + } else if (errno == EEXIST) { > + status_code = 405; > + } else if (errno == EACCES) { > + status_code = 403; > + } else if (errno == ENOENT) { > + status_code = 409; > + } else { > + status_code = 500; > + } > + mg_http_send_error(nc, status_code, NULL); > +} > + > +static int mg_remove_directory(const struct mg_serve_http_opts *opts, > + const char *dir) { > + char path[MG_MAX_PATH]; > + struct dirent *dp; > + cs_stat_t st; > + DIR *dirp; > + > + if ((dirp = opendir(dir)) == NULL) return 0; > + > + while ((dp = readdir(dirp)) != NULL) { > + if (mg_is_file_hidden((const char *) dp->d_name, opts, 1)) { > + continue; > + } > + snprintf(path, sizeof(path), "%s%c%s", dir, '/', dp->d_name); > + mg_stat(path, &st); > + if (S_ISDIR(st.st_mode)) { > + mg_remove_directory(opts, path); > + } else { > + remove(path); > + } > + } > + closedir(dirp); > + rmdir(dir); > + > + return 1; > +} > + > +MG_INTERNAL void mg_handle_move(struct mg_connection *c, > + const struct mg_serve_http_opts *opts, > + const char *path, struct http_message *hm) { > + const struct mg_str *dest = mg_get_http_header(hm, "Destination"); > + if (dest == NULL) { > + mg_http_send_error(c, 411, NULL); > + } else { > + const char *p = (char *) memchr(dest->p, '/', dest->len); > + if (p != NULL && p[1] == '/' && > + (p = (char *) memchr(p + 2, '/', dest->p + dest->len - p)) != NULL) { > + char buf[MG_MAX_PATH]; > + snprintf(buf, sizeof(buf), "%s%.*s", opts->dav_document_root, > + (int) (dest->p + dest->len - p), p); > + if (rename(path, buf) == 0) { > + mg_http_send_error(c, 200, NULL); > + } else { > + mg_http_send_error(c, 418, NULL); > + } > + } else { > + mg_http_send_error(c, 500, NULL); > + } > + } > +} > + > +MG_INTERNAL void mg_handle_delete(struct mg_connection *nc, > + const struct mg_serve_http_opts *opts, > + const char *path) { > + cs_stat_t st; > + if (mg_stat(path, &st) != 0) { > + mg_http_send_error(nc, 404, NULL); > + } else if (S_ISDIR(st.st_mode)) { > + mg_remove_directory(opts, path); > + mg_http_send_error(nc, 204, NULL); > + } else if (remove(path) == 0) { > + mg_http_send_error(nc, 204, NULL); > + } else { > + mg_http_send_error(nc, 423, NULL); > + } > +} > + > +/* Return -1 on error, 1 on success. */ > +static int mg_create_itermediate_directories(const char *path) { > + const char *s; > + > + /* Create intermediate directories if they do not exist */ > + for (s = path + 1; *s != '\0'; s++) { > + if (*s == '/') { > + char buf[MG_MAX_PATH]; > + cs_stat_t st; > + snprintf(buf, sizeof(buf), "%.*s", (int) (s - path), path); > + buf[sizeof(buf) - 1] = '\0'; > + if (mg_stat(buf, &st) != 0 && mg_mkdir(buf, 0755) != 0) { > + return -1; > + } > + } > + } > + > + return 1; > +} > + > +MG_INTERNAL void mg_handle_put(struct mg_connection *nc, const char *path, > + struct http_message *hm) { > + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); > + cs_stat_t st; > + const struct mg_str *cl_hdr = mg_get_http_header(hm, "Content-Length"); > + int rc, status_code = mg_stat(path, &st) == 0 ? 200 : 201; > + > + mg_http_free_proto_data_file(&pd->file); > + if ((rc = mg_create_itermediate_directories(path)) == 0) { > + mg_printf(nc, "HTTP/1.1 %d OK\r\nContent-Length: 0\r\n\r\n", status_code); > + } else if (rc == -1) { > + mg_http_send_error(nc, 500, NULL); > + } else if (cl_hdr == NULL) { > + mg_http_send_error(nc, 411, NULL); > + } else if ((pd->file.fp = mg_fopen(path, "w+b")) == NULL) { > + mg_http_send_error(nc, 500, NULL); > + } else { > + const struct mg_str *range_hdr = mg_get_http_header(hm, "Content-Range"); > + int64_t r1 = 0, r2 = 0; > + pd->file.type = DATA_PUT; > + mg_set_close_on_exec((sock_t) fileno(pd->file.fp)); > + pd->file.cl = to64(cl_hdr->p); > + if (range_hdr != NULL && > + mg_http_parse_range_header(range_hdr, &r1, &r2) > 0) { > + status_code = 206; > + fseeko(pd->file.fp, r1, SEEK_SET); > + pd->file.cl = r2 > r1 ? r2 - r1 + 1 : pd->file.cl - r1; > + } > + mg_printf(nc, "HTTP/1.1 %d OK\r\nContent-Length: 0\r\n\r\n", status_code); > + /* Remove HTTP request from the mbuf, leave only payload */ > + mbuf_remove(&nc->recv_mbuf, hm->message.len - hm->body.len); > + mg_http_transfer_file_data(nc); > + } > +} > + > +#endif /* MG_ENABLE_HTTP && MG_ENABLE_HTTP_WEBDAV */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/http_websocket.c" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_HTTP && MG_ENABLE_HTTP_WEBSOCKET > + > +/* Amalgamated: #include "common/sha1.h" */ > + > +#ifndef MG_WEBSOCKET_PING_INTERVAL_SECONDS > +#define MG_WEBSOCKET_PING_INTERVAL_SECONDS 5 > +#endif > + > +static int mg_is_ws_fragment(unsigned char flags) { > + return (flags & 0x80) == 0 || (flags & 0x0f) == 0; > +} > + > +static int mg_is_ws_first_fragment(unsigned char flags) { > + return (flags & 0x80) == 0 && (flags & 0x0f) != 0; > +} > + > +static void mg_handle_incoming_websocket_frame(struct mg_connection *nc, > + struct websocket_message *wsm) { > + if (wsm->flags & 0x8) { > + mg_call(nc, nc->handler, nc->user_data, MG_EV_WEBSOCKET_CONTROL_FRAME, wsm); > + } else { > + mg_call(nc, nc->handler, nc->user_data, MG_EV_WEBSOCKET_FRAME, wsm); > + } > +} > + > +static struct mg_ws_proto_data *mg_ws_get_proto_data(struct mg_connection *nc) { > + struct mg_http_proto_data *htd = mg_http_get_proto_data(nc); > + return (htd != NULL ? &htd->ws_data : NULL); > +} > + > +static int mg_deliver_websocket_data(struct mg_connection *nc) { > + /* Using unsigned char *, cause of integer arithmetic below */ > + uint64_t i, data_len = 0, frame_len = 0, buf_len = nc->recv_mbuf.len, len, > + mask_len = 0, header_len = 0; > + unsigned char *p = (unsigned char *) nc->recv_mbuf.buf, *buf = p, > + *e = p + buf_len; > + struct mg_ws_proto_data *wsd = mg_ws_get_proto_data(nc); > + int ok; > + int reass = buf_len > 0 && mg_is_ws_fragment(p[0]) && > + !(nc->flags & MG_F_WEBSOCKET_NO_DEFRAG); > + > + /* If that's a continuation frame that must be reassembled, handle it */ > + if (reass && !mg_is_ws_first_fragment(p[0]) && buf_len >= 1 && > + buf_len >= 1 + wsd->reass_len) { > + buf += 1 + wsd->reass_len; > + buf_len -= 1 + wsd->reass_len; > + } > + > + if (buf_len >= 2) { > + len = buf[1] & 0x7f; > + mask_len = buf[1] & 0x80 ? 4 : 0; > + if (len < 126 && buf_len >= mask_len) { > + data_len = len; > + header_len = 2 + mask_len; > + } else if (len == 126 && buf_len >= 4 + mask_len) { > + header_len = 4 + mask_len; > + data_len = ntohs(*(uint16_t *) &buf[2]); > + } else if (buf_len >= 10 + mask_len) { > + header_len = 10 + mask_len; > + data_len = (((uint64_t) ntohl(*(uint32_t *) &buf[2])) << 32) + > + ntohl(*(uint32_t *) &buf[6]); > + } > + } > + > + frame_len = header_len + data_len; > + ok = (frame_len > 0 && frame_len <= buf_len); > + > + /* Check for overflow */ > + if (frame_len < header_len || frame_len < data_len) { > + ok = 0; > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > + > + if (ok) { > + struct websocket_message wsm; > + > + wsm.size = (size_t) data_len; > + wsm.data = buf + header_len; > + wsm.flags = buf[0]; > + > + /* Apply mask if necessary */ > + if (mask_len > 0) { > + for (i = 0; i < data_len; i++) { > + buf[i + header_len] ^= (buf + header_len - mask_len)[i % 4]; > + } > + } > + > + if (reass) { > + /* On first fragmented frame, nullify size */ > + if (mg_is_ws_first_fragment(wsm.flags)) { > + p[0] &= ~0x0f; /* Next frames will be treated as continuation */ > + buf = p + 1; > + wsd->reass_len = 0; > + } > + > + /* Append this frame to the reassembled buffer */ > + memmove(buf, wsm.data, e - wsm.data); > + wsd->reass_len += wsm.size; > + nc->recv_mbuf.len -= wsm.data - buf; > + > + /* On last fragmented frame - call user handler and remove data */ > + if (wsm.flags & 0x80) { > + wsm.data = p + 1; > + wsm.size = wsd->reass_len; > + mg_handle_incoming_websocket_frame(nc, &wsm); > + mbuf_remove(&nc->recv_mbuf, 1 + wsd->reass_len); > + wsd->reass_len = 0; > + } > + } else { > + /* TODO(lsm): properly handle OOB control frames during defragmentation */ > + mg_handle_incoming_websocket_frame(nc, &wsm); > + mbuf_remove(&nc->recv_mbuf, (size_t) frame_len); /* Cleanup frame */ > + wsd->reass_len = 0; > + } > + > + /* If the frame is not reassembled - client closes and close too */ > + if (!reass && (buf[0] & 0x0f) == WEBSOCKET_OP_CLOSE) { > + nc->flags |= MG_F_SEND_AND_CLOSE; > + } > + } > + > + return ok; > +} > + > +struct ws_mask_ctx { > + size_t pos; /* zero means unmasked */ > + uint32_t mask; > +}; > + > +static uint32_t mg_ws_random_mask(void) { > + uint32_t mask; > +/* > + * The spec requires WS client to generate hard to > + * guess mask keys. From RFC6455, Section 5.3: > + * > + * The unpredictability of the masking key is essential to prevent > + * authors of malicious applications from selecting the bytes that appear on > + * the wire. > + * > + * Hence this feature is essential when the actual end user of this API > + * is untrusted code that wouldn't have access to a lower level net API > + * anyway (e.g. web browsers). Hence this feature is low prio for most > + * mongoose use cases and thus can be disabled, e.g. when porting to a platform > + * that lacks rand(). > + */ > +#if MG_DISABLE_WS_RANDOM_MASK > + mask = 0xefbeadde; /* generated with a random number generator, I swear */ > +#else > + if (sizeof(long) >= 4) { > + mask = (uint32_t) rand(); > + } else if (sizeof(long) == 2) { > + mask = (uint32_t) rand() << 16 | (uint32_t) rand(); > + } > +#endif > + return mask; > +} > + > +static void mg_send_ws_header(struct mg_connection *nc, int op, size_t len, > + struct ws_mask_ctx *ctx) { > + int header_len; > + unsigned char header[10]; > + > + header[0] = (op & WEBSOCKET_DONT_FIN ? 0x0 : 0x80) + (op & 0x0f); > + if (len < 126) { > + header[1] = (unsigned char) len; > + header_len = 2; > + } else if (len < 65535) { > + uint16_t tmp = htons((uint16_t) len); > + header[1] = 126; > + memcpy(&header[2], &tmp, sizeof(tmp)); > + header_len = 4; > + } else { > + uint32_t tmp; > + header[1] = 127; > + tmp = htonl((uint32_t)((uint64_t) len >> 32)); > + memcpy(&header[2], &tmp, sizeof(tmp)); > + tmp = htonl((uint32_t)(len & 0xffffffff)); > + memcpy(&header[6], &tmp, sizeof(tmp)); > + header_len = 10; > + } > + > + /* client connections enable masking */ > + if (nc->listener == NULL) { > + header[1] |= 1 << 7; /* set masking flag */ > + mg_send(nc, header, header_len); > + ctx->mask = mg_ws_random_mask(); > + mg_send(nc, &ctx->mask, sizeof(ctx->mask)); > + ctx->pos = nc->send_mbuf.len; > + } else { > + mg_send(nc, header, header_len); > + ctx->pos = 0; > + } > +} > + > +static void mg_ws_mask_frame(struct mbuf *mbuf, struct ws_mask_ctx *ctx) { > + size_t i; > + if (ctx->pos == 0) return; > + for (i = 0; i < (mbuf->len - ctx->pos); i++) { > + mbuf->buf[ctx->pos + i] ^= ((char *) &ctx->mask)[i % 4]; > + } > +} > + > +void mg_send_websocket_frame(struct mg_connection *nc, int op, const void *data, > + size_t len) { > + struct ws_mask_ctx ctx; > + DBG(("%p %d %d", nc, op, (int) len)); > + mg_send_ws_header(nc, op, len, &ctx); > + mg_send(nc, data, len); > + > + mg_ws_mask_frame(&nc->send_mbuf, &ctx); > + > + if (op == WEBSOCKET_OP_CLOSE) { > + nc->flags |= MG_F_SEND_AND_CLOSE; > + } > +} > + > +void mg_send_websocket_framev(struct mg_connection *nc, int op, > + const struct mg_str *strv, int strvcnt) { > + struct ws_mask_ctx ctx; > + int i; > + int len = 0; > + for (i = 0; i < strvcnt; i++) { > + len += strv[i].len; > + } > + > + mg_send_ws_header(nc, op, len, &ctx); > + > + for (i = 0; i < strvcnt; i++) { > + mg_send(nc, strv[i].p, strv[i].len); > + } > + > + mg_ws_mask_frame(&nc->send_mbuf, &ctx); > + > + if (op == WEBSOCKET_OP_CLOSE) { > + nc->flags |= MG_F_SEND_AND_CLOSE; > + } > +} > + > +void mg_printf_websocket_frame(struct mg_connection *nc, int op, > + const char *fmt, ...) { > + char mem[MG_VPRINTF_BUFFER_SIZE], *buf = mem; > + va_list ap; > + int len; > + > + va_start(ap, fmt); > + if ((len = mg_avprintf(&buf, sizeof(mem), fmt, ap)) > 0) { > + mg_send_websocket_frame(nc, op, buf, len); > + } > + va_end(ap); > + > + if (buf != mem && buf != NULL) { > + MG_FREE(buf); > + } > +} > + > +MG_INTERNAL void mg_ws_handler(struct mg_connection *nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data)) { > + mg_call(nc, nc->handler, nc->user_data, ev, ev_data); > + > + switch (ev) { > + case MG_EV_RECV: > + do { > + } while (mg_deliver_websocket_data(nc)); > + break; > + case MG_EV_POLL: > + /* Ping idle websocket connections */ > + { > + time_t now = *(time_t *) ev_data; > + if (nc->flags & MG_F_IS_WEBSOCKET && > + now > nc->last_io_time + MG_WEBSOCKET_PING_INTERVAL_SECONDS) { > + mg_send_websocket_frame(nc, WEBSOCKET_OP_PING, "", 0); > + } > + } > + break; > + default: > + break; > + } > +#if MG_ENABLE_CALLBACK_USERDATA > + (void) user_data; > +#endif > +} > + > +#ifndef MG_EXT_SHA1 > +void mg_hash_sha1_v(size_t num_msgs, const uint8_t *msgs[], > + const size_t *msg_lens, uint8_t *digest) { > + size_t i; > + cs_sha1_ctx sha_ctx; > + cs_sha1_init(&sha_ctx); > + for (i = 0; i < num_msgs; i++) { > + cs_sha1_update(&sha_ctx, msgs[i], msg_lens[i]); > + } > + cs_sha1_final(digest, &sha_ctx); > +} > +#else > +extern void mg_hash_sha1_v(size_t num_msgs, const uint8_t *msgs[], > + const size_t *msg_lens, uint8_t *digest); > +#endif > + > +MG_INTERNAL void mg_ws_handshake(struct mg_connection *nc, > + const struct mg_str *key, > + struct http_message *hm) { > + static const char *magic = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; > + const uint8_t *msgs[2] = {(const uint8_t *) key->p, (const uint8_t *) magic}; > + const size_t msg_lens[2] = {key->len, 36}; > + unsigned char sha[20]; > + char b64_sha[30]; > + struct mg_str *s; > + > + mg_hash_sha1_v(2, msgs, msg_lens, sha); > + mg_base64_encode(sha, sizeof(sha), b64_sha); > + mg_printf(nc, "%s", > + "HTTP/1.1 101 Switching Protocols\r\n" > + "Upgrade: websocket\r\n" > + "Connection: Upgrade\r\n"); > + > + s = mg_get_http_header(hm, "Sec-WebSocket-Protocol"); > + if (s != NULL) { > + mg_printf(nc, "Sec-WebSocket-Protocol: %.*s\r\n", (int) s->len, s->p); > + } > + mg_printf(nc, "Sec-WebSocket-Accept: %s%s", b64_sha, "\r\n\r\n"); > + > + DBG(("%p %.*s %s", nc, (int) key->len, key->p, b64_sha)); > +} > + > +void mg_send_websocket_handshake2(struct mg_connection *nc, const char *path, > + const char *host, const char *protocol, > + const char *extra_headers) { > + mg_send_websocket_handshake3(nc, path, host, protocol, extra_headers, NULL, > + NULL); > +} > + > +void mg_send_websocket_handshake3(struct mg_connection *nc, const char *path, > + const char *host, const char *protocol, > + const char *extra_headers, const char *user, > + const char *pass) { > + mg_send_websocket_handshake3v(nc, mg_mk_str(path), mg_mk_str(host), > + mg_mk_str(protocol), mg_mk_str(extra_headers), > + mg_mk_str(user), mg_mk_str(pass)); > +} > + > +void mg_send_websocket_handshake3v(struct mg_connection *nc, > + const struct mg_str path, > + const struct mg_str host, > + const struct mg_str protocol, > + const struct mg_str extra_headers, > + const struct mg_str user, > + const struct mg_str pass) { > + struct mbuf auth; > + char key[25]; > + uint32_t nonce[4]; > + nonce[0] = mg_ws_random_mask(); > + nonce[1] = mg_ws_random_mask(); > + nonce[2] = mg_ws_random_mask(); > + nonce[3] = mg_ws_random_mask(); > + mg_base64_encode((unsigned char *) &nonce, sizeof(nonce), key); > + > + mbuf_init(&auth, 0); > + if (user.len > 0) { > + mg_basic_auth_header(user, pass, &auth); > + } > + > + /* > + * NOTE: the (auth.buf == NULL ? "" : auth.buf) is because cc3200 libc is > + * broken: it doesn't like zero length to be passed to %.*s > + * i.e. sprintf("f%.*so", (int)0, NULL), yields `f\0o`. > + * because it handles NULL specially (and incorrectly). > + */ > + mg_printf(nc, > + "GET %.*s HTTP/1.1\r\n" > + "Upgrade: websocket\r\n" > + "Connection: Upgrade\r\n" > + "%.*s" > + "Sec-WebSocket-Version: 13\r\n" > + "Sec-WebSocket-Key: %s\r\n", > + (int) path.len, path.p, (int) auth.len, > + (auth.buf == NULL ? "" : auth.buf), key); > + > + /* TODO(mkm): take default hostname from http proto data if host == NULL */ > + if (host.len > 0) { > + int host_len = (int) (path.p - host.p); /* Account for possible :PORT */ > + mg_printf(nc, "Host: %.*s\r\n", host_len, host.p); > + } > + if (protocol.len > 0) { > + mg_printf(nc, "Sec-WebSocket-Protocol: %.*s\r\n", (int) protocol.len, > + protocol.p); > + } > + if (extra_headers.len > 0) { > + mg_printf(nc, "%.*s", (int) extra_headers.len, extra_headers.p); > + } > + mg_printf(nc, "\r\n"); > + > + mbuf_free(&auth); > +} > + > +void mg_send_websocket_handshake(struct mg_connection *nc, const char *path, > + const char *extra_headers) { > + struct mg_str null_str = MG_NULL_STR; > + mg_send_websocket_handshake3v( > + nc, mg_mk_str(path), null_str /* host */, null_str /* protocol */, > + mg_mk_str(extra_headers), null_str /* user */, null_str /* pass */); > +} > + > +struct mg_connection *mg_connect_ws_opt( > + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), > + struct mg_connect_opts opts, const char *url, const char *protocol, > + const char *extra_headers) { > + struct mg_str null_str = MG_NULL_STR; > + struct mg_str host = MG_NULL_STR, path = MG_NULL_STR, user_info = MG_NULL_STR; > + struct mg_connection *nc = > + mg_connect_http_base(mgr, MG_CB(ev_handler, user_data), opts, "http", > + "ws", "https", "wss", url, &path, &user_info, &host); > + if (nc != NULL) { > + mg_send_websocket_handshake3v(nc, path, host, mg_mk_str(protocol), > + mg_mk_str(extra_headers), user_info, > + null_str); > + } > + return nc; > +} > + > +struct mg_connection *mg_connect_ws( > + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), > + const char *url, const char *protocol, const char *extra_headers) { > + struct mg_connect_opts opts; > + memset(&opts, 0, sizeof(opts)); > + return mg_connect_ws_opt(mgr, MG_CB(ev_handler, user_data), opts, url, > + protocol, extra_headers); > +} > +#endif /* MG_ENABLE_HTTP && MG_ENABLE_HTTP_WEBSOCKET */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/util.c" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +/* Amalgamated: #include "common/base64.h" */ > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/util.h" */ > + > +/* For platforms with limited libc */ > +#ifndef MAX > +#define MAX(a, b) ((a) > (b) ? (a) : (b)) > +#endif > + > +const char *mg_skip(const char *s, const char *end, const char *delims, > + struct mg_str *v) { > + v->p = s; > + while (s < end && strchr(delims, *(unsigned char *) s) == NULL) s++; > + v->len = s - v->p; > + while (s < end && strchr(delims, *(unsigned char *) s) != NULL) s++; > + return s; > +} > + > +#if MG_ENABLE_FILESYSTEM && !defined(MG_USER_FILE_FUNCTIONS) > +int mg_stat(const char *path, cs_stat_t *st) { > +#ifdef _WIN32 > + wchar_t wpath[MG_MAX_PATH]; > + to_wchar(path, wpath, ARRAY_SIZE(wpath)); > + DBG(("[%ls] -> %d", wpath, _wstati64(wpath, st))); > + return _wstati64(wpath, st); > +#else > + return stat(path, st); > +#endif > +} > + > +FILE *mg_fopen(const char *path, const char *mode) { > +#ifdef _WIN32 > + wchar_t wpath[MG_MAX_PATH], wmode[10]; > + to_wchar(path, wpath, ARRAY_SIZE(wpath)); > + to_wchar(mode, wmode, ARRAY_SIZE(wmode)); > + return _wfopen(wpath, wmode); > +#else > + return fopen(path, mode); > +#endif > +} > + > +int mg_open(const char *path, int flag, int mode) { /* LCOV_EXCL_LINE */ > +#if defined(_WIN32) && !defined(WINCE) > + wchar_t wpath[MG_MAX_PATH]; > + to_wchar(path, wpath, ARRAY_SIZE(wpath)); > + return _wopen(wpath, flag, mode); > +#else > + return open(path, flag, mode); /* LCOV_EXCL_LINE */ > +#endif > +} > + > +size_t mg_fread(void *ptr, size_t size, size_t count, FILE *f) { > + return fread(ptr, size, count, f); > +} > + > +size_t mg_fwrite(const void *ptr, size_t size, size_t count, FILE *f) { > + return fwrite(ptr, size, count, f); > +} > +#endif > + > +void mg_base64_encode(const unsigned char *src, int src_len, char *dst) { > + cs_base64_encode(src, src_len, dst); > +} > + > +int mg_base64_decode(const unsigned char *s, int len, char *dst) { > + return cs_base64_decode(s, len, dst, NULL); > +} > + > +#if MG_ENABLE_THREADS > +void *mg_start_thread(void *(*f)(void *), void *p) { > +#ifdef WINCE > + return (void *) CreateThread(NULL, 0, (LPTHREAD_START_ROUTINE) f, p, 0, NULL); > +#elif defined(_WIN32) > + return (void *) _beginthread((void(__cdecl *) (void *) ) f, 0, p); > +#else > + pthread_t thread_id = (pthread_t) 0; > + pthread_attr_t attr; > + > + (void) pthread_attr_init(&attr); > + (void) pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED); > + > +#if defined(MG_STACK_SIZE) && MG_STACK_SIZE > 1 > + (void) pthread_attr_setstacksize(&attr, MG_STACK_SIZE); > +#endif > + > + pthread_create(&thread_id, &attr, f, p); > + pthread_attr_destroy(&attr); > + > + return (void *) thread_id; > +#endif > +} > +#endif /* MG_ENABLE_THREADS */ > + > +/* Set close-on-exec bit for a given socket. */ > +void mg_set_close_on_exec(sock_t sock) { > +#if defined(_WIN32) && !defined(WINCE) > + (void) SetHandleInformation((HANDLE) sock, HANDLE_FLAG_INHERIT, 0); > +#elif defined(__unix__) > + fcntl(sock, F_SETFD, FD_CLOEXEC); > +#else > + (void) sock; > +#endif > +} > + > +int mg_sock_addr_to_str(const union socket_address *sa, char *buf, size_t len, > + int flags) { > + int is_v6; > + if (buf == NULL || len <= 0) return 0; > + memset(buf, 0, len); > +#if MG_ENABLE_IPV6 > + is_v6 = sa->sa.sa_family == AF_INET6; > +#else > + is_v6 = 0; > +#endif > + if (flags & MG_SOCK_STRINGIFY_IP) { > +#if MG_ENABLE_IPV6 > + const void *addr = NULL; > + char *start = buf; > + socklen_t capacity = len; > + if (!is_v6) { > + addr = &sa->sin.sin_addr; > + } else { > + addr = (void *) &sa->sin6.sin6_addr; > + if (flags & MG_SOCK_STRINGIFY_PORT) { > + *buf = '['; > + start++; > + capacity--; > + } > + } > + if (inet_ntop(sa->sa.sa_family, addr, start, capacity) == NULL) { > + goto cleanup; > + } > +#elif defined(_WIN32) || MG_LWIP || (MG_NET_IF == MG_NET_IF_PIC32) > + /* Only Windoze Vista (and newer) have inet_ntop() */ > + char *addr_str = inet_ntoa(sa->sin.sin_addr); > + if (addr_str != NULL) { > + strncpy(buf, inet_ntoa(sa->sin.sin_addr), len - 1); > + } else { > + goto cleanup; > + } > +#else > + if (inet_ntop(AF_INET, (void *) &sa->sin.sin_addr, buf, len - 1) == NULL) { > + goto cleanup; > + } > +#endif > + } > + if (flags & MG_SOCK_STRINGIFY_PORT) { > + int port = ntohs(sa->sin.sin_port); > + if (flags & MG_SOCK_STRINGIFY_IP) { > + int buf_len = strlen(buf); > + snprintf(buf + buf_len, len - (buf_len + 1), "%s:%d", (is_v6 ? "]" : ""), > + port); > + } else { > + snprintf(buf, len, "%d", port); > + } > + } > + > + return strlen(buf); > + > +cleanup: > + *buf = '\0'; > + return 0; > +} > + > +int mg_conn_addr_to_str(struct mg_connection *nc, char *buf, size_t len, > + int flags) { > + union socket_address sa; > + memset(&sa, 0, sizeof(sa)); > + mg_if_get_conn_addr(nc, flags & MG_SOCK_STRINGIFY_REMOTE, &sa); > + return mg_sock_addr_to_str(&sa, buf, len, flags); > +} > + > +#if MG_ENABLE_HEXDUMP > +static int mg_hexdump_n(const void *buf, int len, char *dst, int dst_len, > + int offset) { > + const unsigned char *p = (const unsigned char *) buf; > + char ascii[17] = ""; > + int i, idx, n = 0; > + > + for (i = 0; i < len; i++) { > + idx = i % 16; > + if (idx == 0) { > + if (i > 0) n += snprintf(dst + n, MAX(dst_len - n, 0), " %s\n", ascii); > + n += snprintf(dst + n, MAX(dst_len - n, 0), "%04x ", i + offset); > + } > + if (dst_len - n < 0) { > + return n; > + } > + n += snprintf(dst + n, MAX(dst_len - n, 0), " %02x", p[i]); > + ascii[idx] = p[i] < 0x20 || p[i] > 0x7e ? '.' : p[i]; > + ascii[idx + 1] = '\0'; > + } > + > + while (i++ % 16) n += snprintf(dst + n, MAX(dst_len - n, 0), "%s", " "); > + n += snprintf(dst + n, MAX(dst_len - n, 0), " %s\n", ascii); > + > + return n; > +} > + > +int mg_hexdump(const void *buf, int len, char *dst, int dst_len) { > + return mg_hexdump_n(buf, len, dst, dst_len, 0); > +} > + > +void mg_hexdumpf(FILE *fp, const void *buf, int len) { > + char tmp[80]; > + int offset = 0, n; > + while (len > 0) { > + n = (len < 16 ? len : 16); > + mg_hexdump_n(((const char *) buf) + offset, n, tmp, sizeof(tmp), offset); > + fputs(tmp, fp); > + offset += n; > + len -= n; > + } > +} > + > +void mg_hexdump_connection(struct mg_connection *nc, const char *path, > + const void *buf, int num_bytes, int ev) { > + FILE *fp = NULL; > + char src[60], dst[60]; > + const char *tag = NULL; > + switch (ev) { > + case MG_EV_RECV: > + tag = "<-"; > + break; > + case MG_EV_SEND: > + tag = "->"; > + break; > + case MG_EV_ACCEPT: > + tag = "<A"; > + break; > + case MG_EV_CONNECT: > + tag = "C>"; > + break; > + case MG_EV_CLOSE: > + tag = "XX"; > + break; > + } > + if (tag == NULL) return; /* Don't log MG_EV_TIMER, etc */ > + > + if (strcmp(path, "-") == 0) { > + fp = stdout; > + } else if (strcmp(path, "--") == 0) { > + fp = stderr; > +#if MG_ENABLE_FILESYSTEM > + } else { > + fp = mg_fopen(path, "a"); > +#endif > + } > + if (fp == NULL) return; > + > + mg_conn_addr_to_str(nc, src, sizeof(src), > + MG_SOCK_STRINGIFY_IP | MG_SOCK_STRINGIFY_PORT); > + mg_conn_addr_to_str(nc, dst, sizeof(dst), MG_SOCK_STRINGIFY_IP | > + MG_SOCK_STRINGIFY_PORT | > + MG_SOCK_STRINGIFY_REMOTE); > + fprintf(fp, "%lu %p %s %s %s %d\n", (unsigned long) mg_time(), (void *) nc, > + src, tag, dst, (int) num_bytes); > + if (num_bytes > 0) { > + mg_hexdumpf(fp, buf, num_bytes); > + } > + if (fp != stdout && fp != stderr) fclose(fp); > +} > +#endif > + > +int mg_is_big_endian(void) { > + static const int n = 1; > + /* TODO(mkm) use compiletime check with 4-byte char literal */ > + return ((char *) &n)[0] == 0; > +} > + > +DO_NOT_WARN_UNUSED MG_INTERNAL int mg_get_errno(void) { > +#ifndef WINCE > + return errno; > +#else > + /* TODO(alashkin): translate error codes? */ > + return GetLastError(); > +#endif > +} > + > +void mg_mbuf_append_base64_putc(char ch, void *user_data) { > + struct mbuf *mbuf = (struct mbuf *) user_data; > + mbuf_append(mbuf, &ch, sizeof(ch)); > +} > + > +void mg_mbuf_append_base64(struct mbuf *mbuf, const void *data, size_t len) { > + struct cs_base64_ctx ctx; > + cs_base64_init(&ctx, mg_mbuf_append_base64_putc, mbuf); > + cs_base64_update(&ctx, (const char *) data, len); > + cs_base64_finish(&ctx); > +} > + > +void mg_basic_auth_header(const struct mg_str user, const struct mg_str pass, > + struct mbuf *buf) { > + const char *header_prefix = "Authorization: Basic "; > + const char *header_suffix = "\r\n"; > + > + struct cs_base64_ctx ctx; > + cs_base64_init(&ctx, mg_mbuf_append_base64_putc, buf); > + > + mbuf_append(buf, header_prefix, strlen(header_prefix)); > + > + cs_base64_update(&ctx, user.p, user.len); > + if (pass.len > 0) { > + cs_base64_update(&ctx, ":", 1); > + cs_base64_update(&ctx, pass.p, pass.len); > + } > + cs_base64_finish(&ctx); > + mbuf_append(buf, header_suffix, strlen(header_suffix)); > +} > + > +struct mg_str mg_url_encode(const struct mg_str src) { > + static const char *dont_escape = "._-$,;~()/"; > + static const char *hex = "0123456789abcdef"; > + size_t i = 0; > + struct mbuf mb; > + mbuf_init(&mb, src.len); > + > + for (i = 0; i < src.len; i++) { > + const unsigned char c = *((const unsigned char *) src.p + i); > + if (isalnum(c) || strchr(dont_escape, c) != NULL) { > + mbuf_append(&mb, &c, 1); > + } else { > + mbuf_append(&mb, "%", 1); > + mbuf_append(&mb, &hex[c >> 4], 1); > + mbuf_append(&mb, &hex[c & 15], 1); > + } > + } > + mbuf_append(&mb, "", 1); > + mbuf_trim(&mb); > + return mg_mk_str_n(mb.buf, mb.len - 1); > +} > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/mqtt.c" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_MQTT > + > +#include <string.h> > + > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/mqtt.h" */ > + > +static uint16_t getu16(const char *p) { > + const uint8_t *up = (const uint8_t *) p; > + return (up[0] << 8) + up[1]; > +} > + > +static const char *scanto(const char *p, struct mg_str *s) { > + s->len = getu16(p); > + s->p = p + 2; > + return s->p + s->len; > +} > + > +MG_INTERNAL int parse_mqtt(struct mbuf *io, struct mg_mqtt_message *mm) { > + uint8_t header; > + size_t len = 0, len_len = 0; > + const char *p, *end; > + unsigned char lc = 0; > + int cmd; > + > + if (io->len < 2) return -1; > + header = io->buf[0]; > + cmd = header >> 4; > + > + /* decode mqtt variable length */ > + len = len_len = 0; > + p = io->buf + 1; > + while ((size_t)(p - io->buf) < io->len) { > + lc = *((const unsigned char *) p++); > + len += (lc & 0x7f) << 7 * len_len; > + len_len++; > + if (!(lc & 0x80)) break; > + if (len_len > 4) return -2; > + } > + > + end = p + len; > + if (lc & 0x80 || len > (io->len - (p - io->buf))) { > + return -1; > + } > + > + mm->cmd = cmd; > + mm->qos = MG_MQTT_GET_QOS(header); > + > + switch (cmd) { > + case MG_MQTT_CMD_CONNECT: { > + p = scanto(p, &mm->protocol_name); > + if (p > end - 4) return -2; > + mm->protocol_version = *(uint8_t *) p++; > + mm->connect_flags = *(uint8_t *) p++; > + mm->keep_alive_timer = getu16(p); > + p += 2; > + if (p >= end) return -2; > + p = scanto(p, &mm->client_id); > + if (p > end) return -2; > + if (mm->connect_flags & MG_MQTT_HAS_WILL) { > + if (p >= end) return -2; > + p = scanto(p, &mm->will_topic); > + } > + if (mm->connect_flags & MG_MQTT_HAS_WILL) { > + if (p >= end) return -2; > + p = scanto(p, &mm->will_message); > + } > + if (mm->connect_flags & MG_MQTT_HAS_USER_NAME) { > + if (p >= end) return -2; > + p = scanto(p, &mm->user_name); > + } > + if (mm->connect_flags & MG_MQTT_HAS_PASSWORD) { > + if (p >= end) return -2; > + p = scanto(p, &mm->password); > + } > + if (p != end) return -2; > + > + LOG(LL_DEBUG, > + ("%d %2x %d proto [%.*s] client_id [%.*s] will_topic [%.*s] " > + "will_msg [%.*s] user_name [%.*s] password [%.*s]", > + (int) len, (int) mm->connect_flags, (int) mm->keep_alive_timer, > + (int) mm->protocol_name.len, mm->protocol_name.p, > + (int) mm->client_id.len, mm->client_id.p, (int) mm->will_topic.len, > + mm->will_topic.p, (int) mm->will_message.len, mm->will_message.p, > + (int) mm->user_name.len, mm->user_name.p, (int) mm->password.len, > + mm->password.p)); > + break; > + } > + case MG_MQTT_CMD_CONNACK: > + if (end - p < 2) return -2; > + mm->connack_ret_code = p[1]; > + break; > + case MG_MQTT_CMD_PUBACK: > + case MG_MQTT_CMD_PUBREC: > + case MG_MQTT_CMD_PUBREL: > + case MG_MQTT_CMD_PUBCOMP: > + case MG_MQTT_CMD_SUBACK: > + mm->message_id = getu16(p); > + break; > + case MG_MQTT_CMD_PUBLISH: { > + p = scanto(p, &mm->topic); > + if (p > end) return -2; > + if (mm->qos > 0) { > + if (end - p < 2) return -2; > + mm->message_id = getu16(p); > + p += 2; > + } > + mm->payload.p = p; > + mm->payload.len = end - p; > + break; > + } > + case MG_MQTT_CMD_SUBSCRIBE: > + if (end - p < 2) return -2; > + mm->message_id = getu16(p); > + p += 2; > + /* > + * topic expressions are left in the payload and can be parsed with > + * `mg_mqtt_next_subscribe_topic` > + */ > + mm->payload.p = p; > + mm->payload.len = end - p; > + break; > + default: > + /* Unhandled command */ > + break; > + } > + > + mm->len = end - io->buf; > + return mm->len; > +} > + > +static void mqtt_handler(struct mg_connection *nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data)) { > + struct mbuf *io = &nc->recv_mbuf; > + struct mg_mqtt_message mm; > + memset(&mm, 0, sizeof(mm)); > + > + nc->handler(nc, ev, ev_data MG_UD_ARG(user_data)); > + > + switch (ev) { > + case MG_EV_ACCEPT: > + if (nc->proto_data == NULL) mg_set_protocol_mqtt(nc); > + break; > + case MG_EV_RECV: { > + /* There can be multiple messages in the buffer, process them all. */ > + while (1) { > + int len = parse_mqtt(io, &mm); > + if (len < 0) { > + if (len == -1) break; /* not fully buffered */ > + /* Protocol error. */ > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + break; > + } > + nc->handler(nc, MG_MQTT_EVENT_BASE + mm.cmd, &mm MG_UD_ARG(user_data)); > + mbuf_remove(io, len); > + } > + break; > + } > + case MG_EV_POLL: { > + struct mg_mqtt_proto_data *pd = > + (struct mg_mqtt_proto_data *) nc->proto_data; > + double now = mg_time(); > + if (pd->keep_alive > 0 && pd->last_control_time > 0 && > + (now - pd->last_control_time) > pd->keep_alive) { > + LOG(LL_DEBUG, ("Send PINGREQ")); > + mg_mqtt_ping(nc); > + } > + break; > + } > + } > +} > + > +static void mg_mqtt_proto_data_destructor(void *proto_data) { > + MG_FREE(proto_data); > +} > + > +int mg_mqtt_match_topic_expression(struct mg_str exp, struct mg_str topic) { > + /* TODO(mkm): implement real matching */ > + if (memchr(exp.p, '#', exp.len)) { > + /* exp `foo/#` will become `foo/` */ > + exp.len -= 1; > + /* > + * topic should be longer than the expression: e.g. topic `foo/bar` does > + * match `foo/#`, but neither `foo` nor `foo/` do. > + */ > + if (topic.len <= exp.len) { > + return 0; > + } > + > + /* Truncate topic so that it'll pass the next length check */ > + topic.len = exp.len; > + } > + if (topic.len != exp.len) { > + return 0; > + } > + return strncmp(topic.p, exp.p, exp.len) == 0; > +} > + > +int mg_mqtt_vmatch_topic_expression(const char *exp, struct mg_str topic) { > + return mg_mqtt_match_topic_expression(mg_mk_str(exp), topic); > +} > + > +void mg_set_protocol_mqtt(struct mg_connection *nc) { > + nc->proto_handler = mqtt_handler; > + nc->proto_data = MG_CALLOC(1, sizeof(struct mg_mqtt_proto_data)); > + nc->proto_data_destructor = mg_mqtt_proto_data_destructor; > +} > + > +static void mg_mqtt_prepend_header(struct mg_connection *nc, uint8_t cmd, > + uint8_t flags, size_t len) { > + struct mg_mqtt_proto_data *pd = (struct mg_mqtt_proto_data *) nc->proto_data; > + size_t off = nc->send_mbuf.len - len; > + uint8_t header = cmd << 4 | (uint8_t) flags; > + > + uint8_t buf[1 + sizeof(size_t)]; > + uint8_t *vlen = &buf[1]; > + > + assert(nc->send_mbuf.len >= len); > + > + buf[0] = header; > + > + /* mqtt variable length encoding */ > + do { > + *vlen = len % 0x80; > + len /= 0x80; > + if (len > 0) *vlen |= 0x80; > + vlen++; > + } while (len > 0); > + > + mbuf_insert(&nc->send_mbuf, off, buf, vlen - buf); > + pd->last_control_time = mg_time(); > +} > + > +void mg_send_mqtt_handshake(struct mg_connection *nc, const char *client_id) { > + static struct mg_send_mqtt_handshake_opts opts; > + mg_send_mqtt_handshake_opt(nc, client_id, opts); > +} > + > +void mg_send_mqtt_handshake_opt(struct mg_connection *nc, const char *client_id, > + struct mg_send_mqtt_handshake_opts opts) { > + uint16_t hlen, nlen, rem_len = 0; > + struct mg_mqtt_proto_data *pd = (struct mg_mqtt_proto_data *) nc->proto_data; > + > + mg_send(nc, "\00\04MQTT\04", 7); > + rem_len += 7; > + > + if (opts.user_name != NULL) { > + opts.flags |= MG_MQTT_HAS_USER_NAME; > + } > + if (opts.password != NULL) { > + opts.flags |= MG_MQTT_HAS_PASSWORD; > + } > + if (opts.will_topic != NULL && opts.will_message != NULL) { > + opts.flags |= MG_MQTT_HAS_WILL; > + } > + if (opts.keep_alive == 0) { > + opts.keep_alive = 60; > + } > + > + mg_send(nc, &opts.flags, 1); > + rem_len += 1; > + > + nlen = htons(opts.keep_alive); > + mg_send(nc, &nlen, 2); > + rem_len += 2; > + > + hlen = strlen(client_id); > + nlen = htons((uint16_t) hlen); > + mg_send(nc, &nlen, 2); > + mg_send(nc, client_id, hlen); > + rem_len += 2 + hlen; > + > + if (opts.flags & MG_MQTT_HAS_WILL) { > + hlen = strlen(opts.will_topic); > + nlen = htons((uint16_t) hlen); > + mg_send(nc, &nlen, 2); > + mg_send(nc, opts.will_topic, hlen); > + rem_len += 2 + hlen; > + > + hlen = strlen(opts.will_message); > + nlen = htons((uint16_t) hlen); > + mg_send(nc, &nlen, 2); > + mg_send(nc, opts.will_message, hlen); > + rem_len += 2 + hlen; > + } > + > + if (opts.flags & MG_MQTT_HAS_USER_NAME) { > + hlen = strlen(opts.user_name); > + nlen = htons((uint16_t) hlen); > + mg_send(nc, &nlen, 2); > + mg_send(nc, opts.user_name, hlen); > + rem_len += 2 + hlen; > + } > + if (opts.flags & MG_MQTT_HAS_PASSWORD) { > + hlen = strlen(opts.password); > + nlen = htons((uint16_t) hlen); > + mg_send(nc, &nlen, 2); > + mg_send(nc, opts.password, hlen); > + rem_len += 2 + hlen; > + } > + > + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_CONNECT, 0, rem_len); > + > + if (pd != NULL) { > + pd->keep_alive = opts.keep_alive; > + } > +} > + > +void mg_mqtt_publish(struct mg_connection *nc, const char *topic, > + uint16_t message_id, int flags, const void *data, > + size_t len) { > + size_t old_len = nc->send_mbuf.len; > + > + uint16_t topic_len = htons((uint16_t) strlen(topic)); > + uint16_t message_id_net = htons(message_id); > + > + mg_send(nc, &topic_len, 2); > + mg_send(nc, topic, strlen(topic)); > + if (MG_MQTT_GET_QOS(flags) > 0) { > + mg_send(nc, &message_id_net, 2); > + } > + mg_send(nc, data, len); > + > + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_PUBLISH, flags, > + nc->send_mbuf.len - old_len); > +} > + > +void mg_mqtt_subscribe(struct mg_connection *nc, > + const struct mg_mqtt_topic_expression *topics, > + size_t topics_len, uint16_t message_id) { > + size_t old_len = nc->send_mbuf.len; > + > + uint16_t message_id_n = htons(message_id); > + size_t i; > + > + mg_send(nc, (char *) &message_id_n, 2); > + for (i = 0; i < topics_len; i++) { > + uint16_t topic_len_n = htons((uint16_t) strlen(topics[i].topic)); > + mg_send(nc, &topic_len_n, 2); > + mg_send(nc, topics[i].topic, strlen(topics[i].topic)); > + mg_send(nc, &topics[i].qos, 1); > + } > + > + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_SUBSCRIBE, MG_MQTT_QOS(1), > + nc->send_mbuf.len - old_len); > +} > + > +int mg_mqtt_next_subscribe_topic(struct mg_mqtt_message *msg, > + struct mg_str *topic, uint8_t *qos, int pos) { > + unsigned char *buf = (unsigned char *) msg->payload.p + pos; > + int new_pos; > + > + if ((size_t) pos >= msg->payload.len) return -1; > + > + topic->len = buf[0] << 8 | buf[1]; > + topic->p = (char *) buf + 2; > + new_pos = pos + 2 + topic->len + 1; > + if ((size_t) new_pos > msg->payload.len) return -1; > + *qos = buf[2 + topic->len]; > + return new_pos; > +} > + > +void mg_mqtt_unsubscribe(struct mg_connection *nc, char **topics, > + size_t topics_len, uint16_t message_id) { > + size_t old_len = nc->send_mbuf.len; > + > + uint16_t message_id_n = htons(message_id); > + size_t i; > + > + mg_send(nc, (char *) &message_id_n, 2); > + for (i = 0; i < topics_len; i++) { > + uint16_t topic_len_n = htons((uint16_t) strlen(topics[i])); > + mg_send(nc, &topic_len_n, 2); > + mg_send(nc, topics[i], strlen(topics[i])); > + } > + > + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_UNSUBSCRIBE, MG_MQTT_QOS(1), > + nc->send_mbuf.len - old_len); > +} > + > +void mg_mqtt_connack(struct mg_connection *nc, uint8_t return_code) { > + uint8_t unused = 0; > + mg_send(nc, &unused, 1); > + mg_send(nc, &return_code, 1); > + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_CONNACK, 0, 2); > +} > + > +/* > + * Sends a command which contains only a `message_id` and a QoS level of 1. > + * > + * Helper function. > + */ > +static void mg_send_mqtt_short_command(struct mg_connection *nc, uint8_t cmd, > + uint16_t message_id) { > + uint16_t message_id_net = htons(message_id); > + uint8_t flags = (cmd == MG_MQTT_CMD_PUBREL ? 2 : 0); > + mg_send(nc, &message_id_net, 2); > + mg_mqtt_prepend_header(nc, cmd, flags, 2 /* len */); > +} > + > +void mg_mqtt_puback(struct mg_connection *nc, uint16_t message_id) { > + mg_send_mqtt_short_command(nc, MG_MQTT_CMD_PUBACK, message_id); > +} > + > +void mg_mqtt_pubrec(struct mg_connection *nc, uint16_t message_id) { > + mg_send_mqtt_short_command(nc, MG_MQTT_CMD_PUBREC, message_id); > +} > + > +void mg_mqtt_pubrel(struct mg_connection *nc, uint16_t message_id) { > + mg_send_mqtt_short_command(nc, MG_MQTT_CMD_PUBREL, message_id); > +} > + > +void mg_mqtt_pubcomp(struct mg_connection *nc, uint16_t message_id) { > + mg_send_mqtt_short_command(nc, MG_MQTT_CMD_PUBCOMP, message_id); > +} > + > +void mg_mqtt_suback(struct mg_connection *nc, uint8_t *qoss, size_t qoss_len, > + uint16_t message_id) { > + size_t i; > + uint16_t message_id_net = htons(message_id); > + mg_send(nc, &message_id_net, 2); > + for (i = 0; i < qoss_len; i++) { > + mg_send(nc, &qoss[i], 1); > + } > + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_SUBACK, MG_MQTT_QOS(1), 2 + qoss_len); > +} > + > +void mg_mqtt_unsuback(struct mg_connection *nc, uint16_t message_id) { > + mg_send_mqtt_short_command(nc, MG_MQTT_CMD_UNSUBACK, message_id); > +} > + > +void mg_mqtt_ping(struct mg_connection *nc) { > + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_PINGREQ, 0, 0); > +} > + > +void mg_mqtt_pong(struct mg_connection *nc) { > + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_PINGRESP, 0, 0); > +} > + > +void mg_mqtt_disconnect(struct mg_connection *nc) { > + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_DISCONNECT, 0, 0); > +} > + > +#endif /* MG_ENABLE_MQTT */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/mqtt_server.c" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/mqtt-server.h" */ > + > +#if MG_ENABLE_MQTT_BROKER > + > +static void mg_mqtt_session_init(struct mg_mqtt_broker *brk, > + struct mg_mqtt_session *s, > + struct mg_connection *nc) { > + s->brk = brk; > + s->subscriptions = NULL; > + s->num_subscriptions = 0; > + s->nc = nc; > +} > + > +static void mg_mqtt_add_session(struct mg_mqtt_session *s) { > + LIST_INSERT_HEAD(&s->brk->sessions, s, link); > +} > + > +static void mg_mqtt_remove_session(struct mg_mqtt_session *s) { > + LIST_REMOVE(s, link); > +} > + > +static void mg_mqtt_destroy_session(struct mg_mqtt_session *s) { > + size_t i; > + for (i = 0; i < s->num_subscriptions; i++) { > + MG_FREE((void *) s->subscriptions[i].topic); > + } > + MG_FREE(s->subscriptions); > + MG_FREE(s); > +} > + > +static void mg_mqtt_close_session(struct mg_mqtt_session *s) { > + mg_mqtt_remove_session(s); > + mg_mqtt_destroy_session(s); > +} > + > +void mg_mqtt_broker_init(struct mg_mqtt_broker *brk, void *user_data) { > + LIST_INIT(&brk->sessions); > + brk->user_data = user_data; > +} > + > +static void mg_mqtt_broker_handle_connect(struct mg_mqtt_broker *brk, > + struct mg_connection *nc) { > + struct mg_mqtt_session *s = > + (struct mg_mqtt_session *) MG_CALLOC(1, sizeof *s); > + if (s == NULL) { > + /* LCOV_EXCL_START */ > + mg_mqtt_connack(nc, MG_EV_MQTT_CONNACK_SERVER_UNAVAILABLE); > + return; > + /* LCOV_EXCL_STOP */ > + } > + > + /* TODO(mkm): check header (magic and version) */ > + > + mg_mqtt_session_init(brk, s, nc); > + s->user_data = nc->user_data; > + nc->user_data = s; > + mg_mqtt_add_session(s); > + > + mg_mqtt_connack(nc, MG_EV_MQTT_CONNACK_ACCEPTED); > +} > + > +static void mg_mqtt_broker_handle_subscribe(struct mg_connection *nc, > + struct mg_mqtt_message *msg) { > + struct mg_mqtt_session *ss = (struct mg_mqtt_session *) nc->user_data; > + uint8_t qoss[MG_MQTT_MAX_SESSION_SUBSCRIPTIONS]; > + size_t num_subs = 0; > + struct mg_str topic; > + uint8_t qos; > + int pos; > + struct mg_mqtt_topic_expression *te; > + > + for (pos = 0; > + (pos = mg_mqtt_next_subscribe_topic(msg, &topic, &qos, pos)) != -1;) { > + if (num_subs >= sizeof(MG_MQTT_MAX_SESSION_SUBSCRIPTIONS) || > + (ss->num_subscriptions + num_subs >= > + MG_MQTT_MAX_SESSION_SUBSCRIPTIONS)) { > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + return; > + } > + qoss[num_subs++] = qos; > + } > + > + if (num_subs > 0) { > + te = (struct mg_mqtt_topic_expression *) MG_REALLOC( > + ss->subscriptions, > + sizeof(*ss->subscriptions) * (ss->num_subscriptions + num_subs)); > + if (te == NULL) { > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + return; > + } > + ss->subscriptions = te; > + for (pos = 0; > + pos < (int) msg->payload.len && > + (pos = mg_mqtt_next_subscribe_topic(msg, &topic, &qos, pos)) != -1; > + ss->num_subscriptions++) { > + te = &ss->subscriptions[ss->num_subscriptions]; > + te->topic = (char *) MG_MALLOC(topic.len + 1); > + te->qos = qos; > + memcpy((char *) te->topic, topic.p, topic.len); > + ((char *) te->topic)[topic.len] = '\0'; > + } > + } > + > + if (pos == (int) msg->payload.len) { > + mg_mqtt_suback(nc, qoss, num_subs, msg->message_id); > + } else { > + /* We did not fully parse the payload, something must be wrong. */ > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > +} > + > +static void mg_mqtt_broker_handle_publish(struct mg_mqtt_broker *brk, > + struct mg_mqtt_message *msg) { > + struct mg_mqtt_session *s; > + size_t i; > + > + for (s = mg_mqtt_next(brk, NULL); s != NULL; s = mg_mqtt_next(brk, s)) { > + for (i = 0; i < s->num_subscriptions; i++) { > + if (mg_mqtt_vmatch_topic_expression(s->subscriptions[i].topic, > + msg->topic)) { > + char buf[100], *p = buf; > + mg_asprintf(&p, sizeof(buf), "%.*s", (int) msg->topic.len, > + msg->topic.p); > + if (p == NULL) { > + return; > + } > + mg_mqtt_publish(s->nc, p, 0, 0, msg->payload.p, msg->payload.len); > + if (p != buf) { > + MG_FREE(p); > + } > + break; > + } > + } > + } > +} > + > +void mg_mqtt_broker(struct mg_connection *nc, int ev, void *data) { > + struct mg_mqtt_message *msg = (struct mg_mqtt_message *) data; > + struct mg_mqtt_broker *brk; > + > + if (nc->listener) { > + brk = (struct mg_mqtt_broker *) nc->listener->user_data; > + } else { > + brk = (struct mg_mqtt_broker *) nc->user_data; > + } > + > + switch (ev) { > + case MG_EV_ACCEPT: > + if (nc->proto_data == NULL) mg_set_protocol_mqtt(nc); > + nc->user_data = NULL; /* Clear up the inherited pointer to broker */ > + break; > + case MG_EV_MQTT_CONNECT: > + if (nc->user_data == NULL) { > + mg_mqtt_broker_handle_connect(brk, nc); > + } else { > + /* Repeated CONNECT */ > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > + break; > + case MG_EV_MQTT_SUBSCRIBE: > + if (nc->user_data != NULL) { > + mg_mqtt_broker_handle_subscribe(nc, msg); > + } else { > + /* Subscribe before CONNECT */ > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > + break; > + case MG_EV_MQTT_PUBLISH: > + if (nc->user_data != NULL) { > + mg_mqtt_broker_handle_publish(brk, msg); > + } else { > + /* Publish before CONNECT */ > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > + break; > + case MG_EV_CLOSE: > + if (nc->listener && nc->user_data != NULL) { > + mg_mqtt_close_session((struct mg_mqtt_session *) nc->user_data); > + } > + break; > + } > +} > + > +struct mg_mqtt_session *mg_mqtt_next(struct mg_mqtt_broker *brk, > + struct mg_mqtt_session *s) { > + return s == NULL ? LIST_FIRST(&brk->sessions) : LIST_NEXT(s, link); > +} > + > +#endif /* MG_ENABLE_MQTT_BROKER */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/dns.c" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_DNS > + > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/dns.h" */ > + > +static int mg_dns_tid = 0xa0; > + > +struct mg_dns_header { > + uint16_t transaction_id; > + uint16_t flags; > + uint16_t num_questions; > + uint16_t num_answers; > + uint16_t num_authority_prs; > + uint16_t num_other_prs; > +}; > + > +struct mg_dns_resource_record *mg_dns_next_record( > + struct mg_dns_message *msg, int query, > + struct mg_dns_resource_record *prev) { > + struct mg_dns_resource_record *rr; > + > + for (rr = (prev == NULL ? msg->answers : prev + 1); > + rr - msg->answers < msg->num_answers; rr++) { > + if (rr->rtype == query) { > + return rr; > + } > + } > + return NULL; > +} > + > +int mg_dns_parse_record_data(struct mg_dns_message *msg, > + struct mg_dns_resource_record *rr, void *data, > + size_t data_len) { > + switch (rr->rtype) { > + case MG_DNS_A_RECORD: > + if (data_len < sizeof(struct in_addr)) { > + return -1; > + } > + if (rr->rdata.p + data_len > msg->pkt.p + msg->pkt.len) { > + return -1; > + } > + memcpy(data, rr->rdata.p, data_len); > + return 0; > +#if MG_ENABLE_IPV6 > + case MG_DNS_AAAA_RECORD: > + if (data_len < sizeof(struct in6_addr)) { > + return -1; /* LCOV_EXCL_LINE */ > + } > + memcpy(data, rr->rdata.p, data_len); > + return 0; > +#endif > + case MG_DNS_CNAME_RECORD: > + mg_dns_uncompress_name(msg, &rr->rdata, (char *) data, data_len); > + return 0; > + } > + > + return -1; > +} > + > +int mg_dns_insert_header(struct mbuf *io, size_t pos, > + struct mg_dns_message *msg) { > + struct mg_dns_header header; > + > + memset(&header, 0, sizeof(header)); > + header.transaction_id = msg->transaction_id; > + header.flags = htons(msg->flags); > + header.num_questions = htons(msg->num_questions); > + header.num_answers = htons(msg->num_answers); > + > + return mbuf_insert(io, pos, &header, sizeof(header)); > +} > + > +int mg_dns_copy_questions(struct mbuf *io, struct mg_dns_message *msg) { > + unsigned char *begin, *end; > + struct mg_dns_resource_record *last_q; > + if (msg->num_questions <= 0) return 0; > + begin = (unsigned char *) msg->pkt.p + sizeof(struct mg_dns_header); > + last_q = &msg->questions[msg->num_questions - 1]; > + end = (unsigned char *) last_q->name.p + last_q->name.len + 4; > + return mbuf_append(io, begin, end - begin); > +} > + > +int mg_dns_encode_name(struct mbuf *io, const char *name, size_t len) { > + const char *s; > + unsigned char n; > + size_t pos = io->len; > + > + do { > + if ((s = strchr(name, '.')) == NULL) { > + s = name + len; > + } > + > + if (s - name > 127) { > + return -1; /* TODO(mkm) cover */ > + } > + n = s - name; /* chunk length */ > + mbuf_append(io, &n, 1); /* send length */ > + mbuf_append(io, name, n); > + > + if (*s == '.') { > + n++; > + } > + > + name += n; > + len -= n; > + } while (*s != '\0'); > + mbuf_append(io, "\0", 1); /* Mark end of host name */ > + > + return io->len - pos; > +} > + > +int mg_dns_encode_record(struct mbuf *io, struct mg_dns_resource_record *rr, > + const char *name, size_t nlen, const void *rdata, > + size_t rlen) { > + size_t pos = io->len; > + uint16_t u16; > + uint32_t u32; > + > + if (rr->kind == MG_DNS_INVALID_RECORD) { > + return -1; /* LCOV_EXCL_LINE */ > + } > + > + if (mg_dns_encode_name(io, name, nlen) == -1) { > + return -1; > + } > + > + u16 = htons(rr->rtype); > + mbuf_append(io, &u16, 2); > + u16 = htons(rr->rclass); > + mbuf_append(io, &u16, 2); > + > + if (rr->kind == MG_DNS_ANSWER) { > + u32 = htonl(rr->ttl); > + mbuf_append(io, &u32, 4); > + > + if (rr->rtype == MG_DNS_CNAME_RECORD) { > + int clen; > + /* fill size after encoding */ > + size_t off = io->len; > + mbuf_append(io, &u16, 2); > + if ((clen = mg_dns_encode_name(io, (const char *) rdata, rlen)) == -1) { > + return -1; > + } > + u16 = clen; > + io->buf[off] = u16 >> 8; > + io->buf[off + 1] = u16 & 0xff; > + } else { > + u16 = htons((uint16_t) rlen); > + mbuf_append(io, &u16, 2); > + mbuf_append(io, rdata, rlen); > + } > + } > + > + return io->len - pos; > +} > + > +void mg_send_dns_query(struct mg_connection *nc, const char *name, > + int query_type) { > + struct mg_dns_message *msg = > + (struct mg_dns_message *) MG_CALLOC(1, sizeof(*msg)); > + struct mbuf pkt; > + struct mg_dns_resource_record *rr = &msg->questions[0]; > + > + DBG(("%s %d", name, query_type)); > + > + mbuf_init(&pkt, 64 /* Start small, it'll grow as needed. */); > + > + msg->transaction_id = ++mg_dns_tid; > + msg->flags = 0x100; > + msg->num_questions = 1; > + > + mg_dns_insert_header(&pkt, 0, msg); > + > + rr->rtype = query_type; > + rr->rclass = 1; /* Class: inet */ > + rr->kind = MG_DNS_QUESTION; > + > + if (mg_dns_encode_record(&pkt, rr, name, strlen(name), NULL, 0) == -1) { > + /* TODO(mkm): return an error code */ > + goto cleanup; /* LCOV_EXCL_LINE */ > + } > + > + /* TCP DNS requires messages to be prefixed with len */ > + if (!(nc->flags & MG_F_UDP)) { > + uint16_t len = htons((uint16_t) pkt.len); > + mbuf_insert(&pkt, 0, &len, 2); > + } > + > + mg_send(nc, pkt.buf, pkt.len); > + mbuf_free(&pkt); > + > +cleanup: > + MG_FREE(msg); > +} > + > +static unsigned char *mg_parse_dns_resource_record( > + unsigned char *data, unsigned char *end, struct mg_dns_resource_record *rr, > + int reply) { > + unsigned char *name = data; > + int chunk_len, data_len; > + > + while (data < end && (chunk_len = *data)) { > + if (((unsigned char *) data)[0] & 0xc0) { > + data += 1; > + break; > + } > + data += chunk_len + 1; > + } > + > + if (data > end - 5) { > + return NULL; > + } > + > + rr->name.p = (char *) name; > + rr->name.len = data - name + 1; > + data++; > + > + rr->rtype = data[0] << 8 | data[1]; > + data += 2; > + > + rr->rclass = data[0] << 8 | data[1]; > + data += 2; > + > + rr->kind = reply ? MG_DNS_ANSWER : MG_DNS_QUESTION; > + if (reply) { > + if (data >= end - 6) { > + return NULL; > + } > + > + rr->ttl = (uint32_t) data[0] << 24 | (uint32_t) data[1] << 16 | > + data[2] << 8 | data[3]; > + data += 4; > + > + data_len = *data << 8 | *(data + 1); > + data += 2; > + > + rr->rdata.p = (char *) data; > + rr->rdata.len = data_len; > + data += data_len; > + } > + return data; > +} > + > +int mg_parse_dns(const char *buf, int len, struct mg_dns_message *msg) { > + struct mg_dns_header *header = (struct mg_dns_header *) buf; > + unsigned char *data = (unsigned char *) buf + sizeof(*header); > + unsigned char *end = (unsigned char *) buf + len; > + int i; > + > + memset(msg, 0, sizeof(*msg)); > + msg->pkt.p = buf; > + msg->pkt.len = len; > + > + if (len < (int) sizeof(*header)) return -1; > + > + msg->transaction_id = header->transaction_id; > + msg->flags = ntohs(header->flags); > + msg->num_questions = ntohs(header->num_questions); > + if (msg->num_questions > (int) ARRAY_SIZE(msg->questions)) { > + msg->num_questions = (int) ARRAY_SIZE(msg->questions); > + } > + msg->num_answers = ntohs(header->num_answers); > + if (msg->num_answers > (int) ARRAY_SIZE(msg->answers)) { > + msg->num_answers = (int) ARRAY_SIZE(msg->answers); > + } > + > + for (i = 0; i < msg->num_questions; i++) { > + data = mg_parse_dns_resource_record(data, end, &msg->questions[i], 0); > + if (data == NULL) return -1; > + } > + > + for (i = 0; i < msg->num_answers; i++) { > + data = mg_parse_dns_resource_record(data, end, &msg->answers[i], 1); > + if (data == NULL) return -1; > + } > + > + return 0; > +} > + > +size_t mg_dns_uncompress_name(struct mg_dns_message *msg, struct mg_str *name, > + char *dst, int dst_len) { > + int chunk_len, num_ptrs = 0; > + char *old_dst = dst; > + const unsigned char *data = (unsigned char *) name->p; > + const unsigned char *end = (unsigned char *) msg->pkt.p + msg->pkt.len; > + > + if (data >= end) { > + return 0; > + } > + > + while ((chunk_len = *data++)) { > + int leeway = dst_len - (dst - old_dst); > + if (data >= end) { > + return 0; > + } > + > + if ((chunk_len & 0xc0) == 0xc0) { > + uint16_t off = (data[-1] & (~0xc0)) << 8 | data[0]; > + if (off >= msg->pkt.len) { > + return 0; > + } > + /* Basic circular loop avoidance: allow up to 16 pointer hops. */ > + if (++num_ptrs > 15) { > + return 0; > + } > + data = (unsigned char *) msg->pkt.p + off; > + continue; > + } > + if (chunk_len > 63) { > + return 0; > + } > + if (chunk_len > leeway) { > + chunk_len = leeway; > + } > + > + if (data + chunk_len >= end) { > + return 0; > + } > + > + memcpy(dst, data, chunk_len); > + data += chunk_len; > + dst += chunk_len; > + leeway -= chunk_len; > + if (leeway == 0) { > + return dst - old_dst; > + } > + *dst++ = '.'; > + } > + > + if (dst != old_dst) { > + *--dst = 0; > + } > + return dst - old_dst; > +} > + > +static void dns_handler(struct mg_connection *nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data)) { > + struct mbuf *io = &nc->recv_mbuf; > + struct mg_dns_message msg; > + > + /* Pass low-level events to the user handler */ > + nc->handler(nc, ev, ev_data MG_UD_ARG(user_data)); > + > + switch (ev) { > + case MG_EV_RECV: > + if (!(nc->flags & MG_F_UDP)) { > + mbuf_remove(&nc->recv_mbuf, 2); > + } > + if (mg_parse_dns(nc->recv_mbuf.buf, nc->recv_mbuf.len, &msg) == -1) { > + /* reply + recursion allowed + format error */ > + memset(&msg, 0, sizeof(msg)); > + msg.flags = 0x8081; > + mg_dns_insert_header(io, 0, &msg); > + if (!(nc->flags & MG_F_UDP)) { > + uint16_t len = htons((uint16_t) io->len); > + mbuf_insert(io, 0, &len, 2); > + } > + mg_send(nc, io->buf, io->len); > + } else { > + /* Call user handler with parsed message */ > + nc->handler(nc, MG_DNS_MESSAGE, &msg MG_UD_ARG(user_data)); > + } > + mbuf_remove(io, io->len); > + break; > + } > +} > + > +void mg_set_protocol_dns(struct mg_connection *nc) { > + nc->proto_handler = dns_handler; > +} > + > +#endif /* MG_ENABLE_DNS */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/dns_server.c" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_DNS_SERVER > + > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/dns-server.h" */ > + > +struct mg_dns_reply mg_dns_create_reply(struct mbuf *io, > + struct mg_dns_message *msg) { > + struct mg_dns_reply rep; > + rep.msg = msg; > + rep.io = io; > + rep.start = io->len; > + > + /* reply + recursion allowed */ > + msg->flags |= 0x8080; > + mg_dns_copy_questions(io, msg); > + > + msg->num_answers = 0; > + return rep; > +} > + > +void mg_dns_send_reply(struct mg_connection *nc, struct mg_dns_reply *r) { > + size_t sent = r->io->len - r->start; > + mg_dns_insert_header(r->io, r->start, r->msg); > + if (!(nc->flags & MG_F_UDP)) { > + uint16_t len = htons((uint16_t) sent); > + mbuf_insert(r->io, r->start, &len, 2); > + } > + > + if (&nc->send_mbuf != r->io) { > + mg_send(nc, r->io->buf + r->start, r->io->len - r->start); > + r->io->len = r->start; > + } > +} > + > +int mg_dns_reply_record(struct mg_dns_reply *reply, > + struct mg_dns_resource_record *question, > + const char *name, int rtype, int ttl, const void *rdata, > + size_t rdata_len) { > + struct mg_dns_message *msg = (struct mg_dns_message *) reply->msg; > + char rname[512]; > + struct mg_dns_resource_record *ans = &msg->answers[msg->num_answers]; > + if (msg->num_answers >= MG_MAX_DNS_ANSWERS) { > + return -1; /* LCOV_EXCL_LINE */ > + } > + > + if (name == NULL) { > + name = rname; > + rname[511] = 0; > + mg_dns_uncompress_name(msg, &question->name, rname, sizeof(rname) - 1); > + } > + > + *ans = *question; > + ans->kind = MG_DNS_ANSWER; > + ans->rtype = rtype; > + ans->ttl = ttl; > + > + if (mg_dns_encode_record(reply->io, ans, name, strlen(name), rdata, > + rdata_len) == -1) { > + return -1; /* LCOV_EXCL_LINE */ > + }; > + > + msg->num_answers++; > + return 0; > +} > + > +#endif /* MG_ENABLE_DNS_SERVER */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/resolv.c" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_ASYNC_RESOLVER > + > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/resolv.h" */ > + > +#ifndef MG_DEFAULT_NAMESERVER > +#define MG_DEFAULT_NAMESERVER "8.8.8.8" > +#endif > + > +struct mg_resolve_async_request { > + char name[1024]; > + int query; > + mg_resolve_callback_t callback; > + void *data; > + time_t timeout; > + int max_retries; > + enum mg_resolve_err err; > + > + /* state */ > + time_t last_time; > + int retries; > +}; > + > +/* > + * Find what nameserver to use. > + * > + * Return 0 if OK, -1 if error > + */ > +static int mg_get_ip_address_of_nameserver(char *name, size_t name_len) { > + int ret = -1; > + > +#ifdef _WIN32 > + int i; > + LONG err; > + HKEY hKey, hSub; > + wchar_t subkey[512], value[128], > + *key = L"SYSTEM\\ControlSet001\\Services\\Tcpip\\Parameters\\Interfaces"; > + > + if ((err = RegOpenKeyExW(HKEY_LOCAL_MACHINE, key, 0, KEY_READ, &hKey)) != > + ERROR_SUCCESS) { > + fprintf(stderr, "cannot open reg key %S: %ld\n", key, err); > + ret = -1; > + } else { > + for (ret = -1, i = 0; 1; i++) { > + DWORD subkey_size = sizeof(subkey), type, len = sizeof(value); > + if (RegEnumKeyExW(hKey, i, subkey, &subkey_size, NULL, NULL, NULL, > + NULL) != ERROR_SUCCESS) { > + break; > + } > + if (RegOpenKeyExW(hKey, subkey, 0, KEY_READ, &hSub) == ERROR_SUCCESS && > + ((RegQueryValueExW(hSub, L"NameServer", 0, &type, (void *) value, > + &len) == ERROR_SUCCESS && > + value[0] != '\0') || > + (RegQueryValueExW(hSub, L"DhcpNameServer", 0, &type, (void *) value, > + &len) == ERROR_SUCCESS && > + value[0] != '\0'))) { > + /* > + * See https://github.com/cesanta/mongoose/issues/176 > + * The value taken from the registry can be empty, a single > + * IP address, or multiple IP addresses separated by comma. > + * If it's empty, check the next interface. > + * If it's multiple IP addresses, take the first one. > + */ > + wchar_t *comma = wcschr(value, ','); > + if (comma != NULL) { > + *comma = '\0'; > + } > + /* %S will convert wchar_t -> char */ > + snprintf(name, name_len, "%S", value); > + ret = 0; > + RegCloseKey(hSub); > + break; > + } > + } > + RegCloseKey(hKey); > + } > +#elif MG_ENABLE_FILESYSTEM && defined(MG_RESOLV_CONF_FILE_NAME) > + FILE *fp; > + char line[512]; > + > + if ((fp = mg_fopen(MG_RESOLV_CONF_FILE_NAME, "r")) == NULL) { > + ret = -1; > + } else { > + /* Try to figure out what nameserver to use */ > + for (ret = -1; fgets(line, sizeof(line), fp) != NULL;) { > + unsigned int a, b, c, d; > + if (sscanf(line, "nameserver %u.%u.%u.%u", &a, &b, &c, &d) == 4) { > + snprintf(name, name_len, "%u.%u.%u.%u", a, b, c, d); > + ret = 0; > + break; > + } > + } > + (void) fclose(fp); > + } > +#else > + snprintf(name, name_len, "%s", MG_DEFAULT_NAMESERVER); > +#endif /* _WIN32 */ > + > + return ret; > +} > + > +int mg_resolve_from_hosts_file(const char *name, union socket_address *usa) { > +#if MG_ENABLE_FILESYSTEM && defined(MG_HOSTS_FILE_NAME) > + /* TODO(mkm) cache /etc/hosts */ > + FILE *fp; > + char line[1024]; > + char *p; > + char alias[256]; > + unsigned int a, b, c, d; > + int len = 0; > + > + if ((fp = mg_fopen(MG_HOSTS_FILE_NAME, "r")) == NULL) { > + return -1; > + } > + > + for (; fgets(line, sizeof(line), fp) != NULL;) { > + if (line[0] == '#') continue; > + > + if (sscanf(line, "%u.%u.%u.%u%n", &a, &b, &c, &d, &len) == 0) { > + /* TODO(mkm): handle ipv6 */ > + continue; > + } > + for (p = line + len; sscanf(p, "%s%n", alias, &len) == 1; p += len) { > + if (strcmp(alias, name) == 0) { > + usa->sin.sin_addr.s_addr = htonl(a << 24 | b << 16 | c << 8 | d); > + fclose(fp); > + return 0; > + } > + } > + } > + > + fclose(fp); > +#else > + (void) name; > + (void) usa; > +#endif > + > + return -1; > +} > + > +static void mg_resolve_async_eh(struct mg_connection *nc, int ev, > + void *data MG_UD_ARG(void *user_data)) { > + time_t now = (time_t) mg_time(); > + struct mg_resolve_async_request *req; > + struct mg_dns_message *msg; > + int first = 0; > +#if !MG_ENABLE_CALLBACK_USERDATA > + void *user_data = nc->user_data; > +#endif > + > + if (ev != MG_EV_POLL) DBG(("ev=%d user_data=%p", ev, user_data)); > + > + req = (struct mg_resolve_async_request *) user_data; > + > + if (req == NULL) { > + return; > + } > + > + switch (ev) { > + case MG_EV_CONNECT: > + /* don't depend on timer not being at epoch for sending out first req */ > + first = 1; > + /* fallthrough */ > + case MG_EV_POLL: > + if (req->retries > req->max_retries) { > + req->err = MG_RESOLVE_EXCEEDED_RETRY_COUNT; > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + break; > + } > + if (first || now - req->last_time >= req->timeout) { > + mg_send_dns_query(nc, req->name, req->query); > + req->last_time = now; > + req->retries++; > + } > + break; > + case MG_EV_RECV: > + msg = (struct mg_dns_message *) MG_MALLOC(sizeof(*msg)); > + if (mg_parse_dns(nc->recv_mbuf.buf, *(int *) data, msg) == 0 && > + msg->num_answers > 0) { > + req->callback(msg, req->data, MG_RESOLVE_OK); > + nc->user_data = NULL; > + MG_FREE(req); > + } else { > + req->err = MG_RESOLVE_NO_ANSWERS; > + } > + MG_FREE(msg); > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + break; > + case MG_EV_SEND: > + /* > + * If a send error occurs, prevent closing of the connection by the core. > + * We will retry after timeout. > + */ > + nc->flags &= ~MG_F_CLOSE_IMMEDIATELY; > + mbuf_remove(&nc->send_mbuf, nc->send_mbuf.len); > + break; > + case MG_EV_TIMER: > + req->err = MG_RESOLVE_TIMEOUT; > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + break; > + case MG_EV_CLOSE: > + /* If we got here with request still not done, fire an error callback. */ > + if (req != NULL) { > + char addr[32]; > + mg_sock_addr_to_str(&nc->sa, addr, sizeof(addr), MG_SOCK_STRINGIFY_IP); > +#ifdef MG_LOG_DNS_FAILURES > + LOG(LL_ERROR, ("Failed to resolve '%s', server %s", req->name, addr)); > +#endif > + req->callback(NULL, req->data, req->err); > + nc->user_data = NULL; > + MG_FREE(req); > + } > + break; > + } > } > > -static int pthread_cond_broadcast(pthread_cond_t *cv) { > - // Implementation with PulseEvent() has race condition, see > - // http://www.cs.wustl.edu/~schmidt/win32-cv-1.html > - return PulseEvent(cv->broadcast) == 0 ? -1 : 0; > +int mg_resolve_async(struct mg_mgr *mgr, const char *name, int query, > + mg_resolve_callback_t cb, void *data) { > + struct mg_resolve_async_opts opts; > + memset(&opts, 0, sizeof(opts)); > + return mg_resolve_async_opt(mgr, name, query, cb, data, opts); > } > > -static int pthread_cond_destroy(pthread_cond_t *cv) { > - return CloseHandle(cv->signal) && CloseHandle(cv->broadcast) ? 0 : -1; > -} > +int mg_resolve_async_opt(struct mg_mgr *mgr, const char *name, int query, > + mg_resolve_callback_t cb, void *data, > + struct mg_resolve_async_opts opts) { > + struct mg_resolve_async_request *req; > + struct mg_connection *dns_nc; > + const char *nameserver = opts.nameserver; > + char dns_server_buff[17], nameserver_url[26]; > > -// For Windows, change all slashes to backslashes in path names. > -static void change_slashes_to_backslashes(char *path) { > - int i; > + if (nameserver == NULL) { > + nameserver = mgr->nameserver; > + } > + > + DBG(("%s %d %p", name, query, opts.dns_conn)); > > - for (i = 0; path[i] != '\0'; i++) { > - if (path[i] == '/') > - path[i] = '\\'; > - // i > 0 check is to preserve UNC paths, like \\server\file.txt > - if (path[i] == '\\' && i > 0) > - while (path[i + 1] == '\\' || path[i + 1] == '/') > - (void) memmove(path + i + 1, > - path + i + 2, strlen(path + i + 1)); > + /* resolve with DNS */ > + req = (struct mg_resolve_async_request *) MG_CALLOC(1, sizeof(*req)); > + if (req == NULL) { > + return -1; > + } > + > + strncpy(req->name, name, sizeof(req->name)); > + req->query = query; > + req->callback = cb; > + req->data = data; > + /* TODO(mkm): parse defaults out of resolve.conf */ > + req->max_retries = opts.max_retries ? opts.max_retries : 2; > + req->timeout = opts.timeout ? opts.timeout : 5; > + > + /* Lazily initialize dns server */ > + if (nameserver == NULL) { > + if (mg_get_ip_address_of_nameserver(dns_server_buff, > + sizeof(dns_server_buff)) != -1) { > + nameserver = dns_server_buff; > + } else { > + nameserver = MG_DEFAULT_NAMESERVER; > + } > } > -} > > -// Encode 'path' which is assumed UTF-8 string, into UNICODE string. > -// wbuf and wbuf_len is a target buffer and its length. > -static void to_unicode(const char *path, wchar_t *wbuf, size_t wbuf_len) { > - char buf[PATH_MAX], buf2[PATH_MAX]; > + snprintf(nameserver_url, sizeof(nameserver_url), "udp://%s:53", nameserver); > > - mg_strlcpy(buf, path, sizeof(buf)); > - change_slashes_to_backslashes(buf); > + dns_nc = mg_connect(mgr, nameserver_url, MG_CB(mg_resolve_async_eh, NULL)); > + if (dns_nc == NULL) { > + MG_FREE(req); > + return -1; > + } > + dns_nc->user_data = req; > + if (opts.dns_conn != NULL) { > + *opts.dns_conn = dns_nc; > + } > > - // Convert to Unicode and back. If doubly-converted string does not > - // match the original, something is fishy, reject. > - memset(wbuf, 0, wbuf_len * sizeof(wchar_t)); > - MultiByteToWideChar(CP_UTF8, 0, buf, -1, wbuf, (int) wbuf_len); > - WideCharToMultiByte(CP_UTF8, 0, wbuf, (int) wbuf_len, buf2, sizeof(buf2), > - NULL, NULL); > - if (strcmp(buf, buf2) != 0) { > - wbuf[0] = L'\0'; > + return 0; > +} > + > +void mg_set_nameserver(struct mg_mgr *mgr, const char *nameserver) { > + MG_FREE((char *) mgr->nameserver); > + mgr->nameserver = NULL; > + if (nameserver != NULL) { > + mgr->nameserver = strdup(nameserver); > } > } > > -#if defined(_WIN32_WCE) > -static time_t time(time_t *ptime) { > - time_t t; > - SYSTEMTIME st; > - FILETIME ft; > +#endif /* MG_ENABLE_ASYNC_RESOLVER */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/coap.c" > +#endif > +/* > + * Copyright (c) 2015 Cesanta Software Limited > + * All rights reserved > + * This software is dual-licensed: you can redistribute it and/or modify > + * it under the terms of the GNU General Public License version 2 as > + * published by the Free Software Foundation. For the terms of this > + * license, see <http://www.gnu.org/licenses/>. > + * > + * You are free to use this software under the terms of the GNU General > + * Public License, but WITHOUT ANY WARRANTY; without even the implied > + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. > + * See the GNU General Public License for more details. > + * > + * Alternatively, you can license this software under a commercial > + * license, as set out in <https://www.cesanta.com/license>. > + */ > + > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/coap.h" */ > + > +#if MG_ENABLE_COAP > + > +void mg_coap_free_options(struct mg_coap_message *cm) { > + while (cm->options != NULL) { > + struct mg_coap_option *next = cm->options->next; > + MG_FREE(cm->options); > + cm->options = next; > + } > +} > + > +struct mg_coap_option *mg_coap_add_option(struct mg_coap_message *cm, > + uint32_t number, char *value, > + size_t len) { > + struct mg_coap_option *new_option = > + (struct mg_coap_option *) MG_CALLOC(1, sizeof(*new_option)); > + > + new_option->number = number; > + new_option->value.p = value; > + new_option->value.len = len; > + > + if (cm->options == NULL) { > + cm->options = cm->optiomg_tail = new_option; > + } else { > + /* > + * A very simple attention to help clients to compose options: > + * CoAP wants to see options ASC ordered. > + * Could be change by using sort in coap_compose > + */ > + if (cm->optiomg_tail->number <= new_option->number) { > + /* if option is already ordered just add it */ > + cm->optiomg_tail = cm->optiomg_tail->next = new_option; > + } else { > + /* looking for appropriate position */ > + struct mg_coap_option *current_opt = cm->options; > + struct mg_coap_option *prev_opt = 0; > > - GetSystemTime(&st); > - SystemTimeToFileTime(&st, &ft); > - t = SYS2UNIX_TIME(ft.dwLowDateTime, ft.dwHighDateTime); > + while (current_opt != NULL) { > + if (current_opt->number > new_option->number) { > + break; > + } > + prev_opt = current_opt; > + current_opt = current_opt->next; > + } > > - if (ptime != NULL) { > - *ptime = t; > + if (prev_opt != NULL) { > + prev_opt->next = new_option; > + new_option->next = current_opt; > + } else { > + /* insert new_option to the beginning */ > + new_option->next = cm->options; > + cm->options = new_option; > + } > + } > } > > - return t; > + return new_option; > } > > -static struct tm *localtime(const time_t *ptime, struct tm *ptm) { > - int64_t t = ((int64_t) *ptime) * RATE_DIFF + EPOCH_DIFF; > - FILETIME ft, lft; > - SYSTEMTIME st; > - TIME_ZONE_INFORMATION tzinfo; > +/* > + * Fills CoAP header in mg_coap_message. > + * > + * Helper function. > + */ > +static char *coap_parse_header(char *ptr, struct mbuf *io, > + struct mg_coap_message *cm) { > + if (io->len < sizeof(uint32_t)) { > + cm->flags |= MG_COAP_NOT_ENOUGH_DATA; > + return NULL; > + } > + > + /* > + * Version (Ver): 2-bit unsigned integer. Indicates the CoAP version > + * number. Implementations of this specification MUST set this field > + * to 1 (01 binary). Other values are reserved for future versions. > + * Messages with unknown version numbers MUST be silently ignored. > + */ > + if (((uint8_t) *ptr >> 6) != 1) { > + cm->flags |= MG_COAP_IGNORE; > + return NULL; > + } > > - if (ptm == NULL) { > + /* > + * Type (T): 2-bit unsigned integer. Indicates if this message is of > + * type Confirmable (0), Non-confirmable (1), Acknowledgement (2), or > + * Reset (3). > + */ > + cm->msg_type = ((uint8_t) *ptr & 0x30) >> 4; > + cm->flags |= MG_COAP_MSG_TYPE_FIELD; > + > + /* > + * Token Length (TKL): 4-bit unsigned integer. Indicates the length of > + * the variable-length Token field (0-8 bytes). Lengths 9-15 are > + * reserved, MUST NOT be sent, and MUST be processed as a message > + * format error. > + */ > + cm->token.len = *ptr & 0x0F; > + if (cm->token.len > 8) { > + cm->flags |= MG_COAP_FORMAT_ERROR; > return NULL; > } > > - * (int64_t *) &ft = t; > - FileTimeToLocalFileTime(&ft, &lft); > - FileTimeToSystemTime(&lft, &st); > - ptm->tm_year = st.wYear - 1900; > - ptm->tm_mon = st.wMonth - 1; > - ptm->tm_wday = st.wDayOfWeek; > - ptm->tm_mday = st.wDay; > - ptm->tm_hour = st.wHour; > - ptm->tm_min = st.wMinute; > - ptm->tm_sec = st.wSecond; > - ptm->tm_yday = 0; // hope nobody uses this > - ptm->tm_isdst = > - GetTimeZoneInformation(&tzinfo) == TIME_ZONE_ID_DAYLIGHT ? 1 : 0; > + ptr++; > > - return ptm; > -} > + /* > + * Code: 8-bit unsigned integer, split into a 3-bit class (most > + * significant bits) and a 5-bit detail (least significant bits) > + */ > + cm->code_class = (uint8_t) *ptr >> 5; > + cm->code_detail = *ptr & 0x1F; > + cm->flags |= (MG_COAP_CODE_CLASS_FIELD | MG_COAP_CODE_DETAIL_FIELD); > > -static struct tm *gmtime(const time_t *ptime, struct tm *ptm) { > - // FIXME(lsm): fix this. > - return localtime(ptime, ptm); > -} > + ptr++; > > -static size_t strftime(char *dst, size_t dst_size, const char *fmt, > - const struct tm *tm) { > - (void) snprintf(dst, dst_size, "implement strftime() for WinCE"); > - return 0; > + /* Message ID: 16-bit unsigned integer in network byte order. */ > + cm->msg_id = (uint8_t) *ptr << 8 | (uint8_t) * (ptr + 1); > + cm->flags |= MG_COAP_MSG_ID_FIELD; > + > + ptr += 2; > + > + return ptr; > } > -#endif > > -// Windows happily opens files with some garbage at the end of file name. > -// For example, fopen("a.cgi ", "r") on Windows successfully opens > -// "a.cgi", despite one would expect an error back. > -// This function returns non-0 if path ends with some garbage. > -static int path_cannot_disclose_cgi(const char *path) { > - static const char *allowed_last_characters = "_-"; > - int last = path[strlen(path) - 1]; > - return isalnum(last) || strchr(allowed_last_characters, last) != NULL; > +/* > + * Fills token information in mg_coap_message. > + * > + * Helper function. > + */ > +static char *coap_get_token(char *ptr, struct mbuf *io, > + struct mg_coap_message *cm) { > + if (cm->token.len != 0) { > + if (ptr + cm->token.len > io->buf + io->len) { > + cm->flags |= MG_COAP_NOT_ENOUGH_DATA; > + return NULL; > + } else { > + cm->token.p = ptr; > + ptr += cm->token.len; > + cm->flags |= MG_COAP_TOKEN_FIELD; > + } > + } > + > + return ptr; > } > > -static int mg_stat(struct mg_connection *conn, const char *path, > - struct file *filep) { > - wchar_t wbuf[PATH_MAX]; > - WIN32_FILE_ATTRIBUTE_DATA info; > +/* > + * Returns Option Delta or Length. > + * > + * Helper function. > + */ > +static int coap_get_ext_opt(char *ptr, struct mbuf *io, uint16_t *opt_info) { > + int ret = 0; > > - if (!is_file_in_memory(conn, path, filep)) { > - to_unicode(path, wbuf, ARRAY_SIZE(wbuf)); > - if (GetFileAttributesExW(wbuf, GetFileExInfoStandard, &info) != 0) { > - filep->size = MAKEUQUAD(info.nFileSizeLow, info.nFileSizeHigh); > - filep->modification_time = SYS2UNIX_TIME( > - info.ftLastWriteTime.dwLowDateTime, > - info.ftLastWriteTime.dwHighDateTime); > - filep->is_directory = info.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY; > - // If file name is fishy, reset the file structure and return error. > - // Note it is important to reset, not just return the error, cause > - // functions like is_file_opened() check the struct. > - if (!filep->is_directory && !path_cannot_disclose_cgi(path)) { > - memset(filep, 0, sizeof(*filep)); > - } > + if (*opt_info == 13) { > + /* > + * 13: An 8-bit unsigned integer follows the initial byte and > + * indicates the Option Delta/Length minus 13. > + */ > + if (ptr < io->buf + io->len) { > + *opt_info = (uint8_t) *ptr + 13; > + ret = sizeof(uint8_t); > + } else { > + ret = -1; /* LCOV_EXCL_LINE */ > + } > + } else if (*opt_info == 14) { > + /* > + * 14: A 16-bit unsigned integer in network byte order follows the > + * initial byte and indicates the Option Delta/Length minus 269. > + */ > + if (ptr + sizeof(uint8_t) < io->buf + io->len) { > + *opt_info = ((uint8_t) *ptr << 8 | (uint8_t) * (ptr + 1)) + 269; > + ret = sizeof(uint16_t); > + } else { > + ret = -1; /* LCOV_EXCL_LINE */ > } > } > > - return filep->membuf != NULL || filep->modification_time != 0; > + return ret; > } > > -static int mg_remove(const char *path) { > - wchar_t wbuf[PATH_MAX]; > - to_unicode(path, wbuf, ARRAY_SIZE(wbuf)); > - return DeleteFileW(wbuf) ? 0 : -1; > -} > +/* > + * Fills options in mg_coap_message. > + * > + * Helper function. > + * > + * General options format: > + * +---------------+---------------+ > + * | Option Delta | Option Length | 1 byte > + * +---------------+---------------+ > + * \ Option Delta (extended) \ 0-2 bytes > + * +-------------------------------+ > + * / Option Length (extended) \ 0-2 bytes > + * +-------------------------------+ > + * \ Option Value \ 0 or more bytes > + * +-------------------------------+ > + */ > +static char *coap_get_options(char *ptr, struct mbuf *io, > + struct mg_coap_message *cm) { > + uint16_t prev_opt = 0; > + > + if (ptr == io->buf + io->len) { > + /* end of packet, ok */ > + return NULL; > + } > > -static int mg_mkdir(const char *path, int mode) { > - char buf[PATH_MAX]; > - wchar_t wbuf[PATH_MAX]; > + /* 0xFF is payload marker */ > + while (ptr < io->buf + io->len && (uint8_t) *ptr != 0xFF) { > + uint16_t option_delta, option_lenght; > + int optinfo_len; > > - (void) mode; > - mg_strlcpy(buf, path, sizeof(buf)); > - change_slashes_to_backslashes(buf); > + /* Option Delta: 4-bit unsigned integer */ > + option_delta = ((uint8_t) *ptr & 0xF0) >> 4; > + /* Option Length: 4-bit unsigned integer */ > + option_lenght = *ptr & 0x0F; > > - (void) MultiByteToWideChar(CP_UTF8, 0, buf, -1, wbuf, ARRAY_SIZE(wbuf)); > + if (option_delta == 15 || option_lenght == 15) { > + /* > + * 15: Reserved for future use. If the field is set to this value, > + * it MUST be processed as a message format error > + */ > + cm->flags |= MG_COAP_FORMAT_ERROR; > + break; > + } > > - return CreateDirectoryW(wbuf, NULL) ? 0 : -1; > -} > + ptr++; > > -// Implementation of POSIX opendir/closedir/readdir for Windows. > -static DIR * opendir(const char *name) { > - DIR *dir = NULL; > - wchar_t wpath[PATH_MAX]; > - DWORD attrs; > + /* check for extended option delta */ > + optinfo_len = coap_get_ext_opt(ptr, io, &option_delta); > + if (optinfo_len == -1) { > + cm->flags |= MG_COAP_NOT_ENOUGH_DATA; /* LCOV_EXCL_LINE */ > + break; /* LCOV_EXCL_LINE */ > + } > > - if (name == NULL) { > - SetLastError(ERROR_BAD_ARGUMENTS); > - } else if ((dir = (DIR *) malloc(sizeof(*dir))) == NULL) { > - SetLastError(ERROR_NOT_ENOUGH_MEMORY); > - } else { > - to_unicode(name, wpath, ARRAY_SIZE(wpath)); > - attrs = GetFileAttributesW(wpath); > - if (attrs != 0xFFFFFFFF && > - ((attrs & FILE_ATTRIBUTE_DIRECTORY) == FILE_ATTRIBUTE_DIRECTORY)) { > - (void) wcscat(wpath, L"\\*"); > - dir->handle = FindFirstFileW(wpath, &dir->info); > - dir->result.d_name[0] = '\0'; > - } else { > - free(dir); > - dir = NULL; > + ptr += optinfo_len; > + > + /* check or extended option lenght */ > + optinfo_len = coap_get_ext_opt(ptr, io, &option_lenght); > + if (optinfo_len == -1) { > + cm->flags |= MG_COAP_NOT_ENOUGH_DATA; /* LCOV_EXCL_LINE */ > + break; /* LCOV_EXCL_LINE */ > } > - } > > - return dir; > -} > + ptr += optinfo_len; > > -static int closedir(DIR *dir) { > - int result = 0; > + /* > + * Instead of specifying the Option Number directly, the instances MUST > + * appear in order of their Option Numbers and a delta encoding is used > + * between them. > + */ > + option_delta += prev_opt; > > - if (dir != NULL) { > - if (dir->handle != INVALID_HANDLE_VALUE) > - result = FindClose(dir->handle) ? 0 : -1; > + mg_coap_add_option(cm, option_delta, ptr, option_lenght); > > - free(dir); > - } else { > - result = -1; > - SetLastError(ERROR_BAD_ARGUMENTS); > - } > + prev_opt = option_delta; > > - return result; > -} > + if (ptr + option_lenght > io->buf + io->len) { > + cm->flags |= MG_COAP_NOT_ENOUGH_DATA; /* LCOV_EXCL_LINE */ > + break; /* LCOV_EXCL_LINE */ > + } > > -static struct dirent *readdir(DIR *dir) { > - struct dirent *result = 0; > + ptr += option_lenght; > + } > > - if (dir) { > - if (dir->handle != INVALID_HANDLE_VALUE) { > - result = &dir->result; > - (void) WideCharToMultiByte(CP_UTF8, 0, > - dir->info.cFileName, -1, result->d_name, > - sizeof(result->d_name), NULL, NULL); > + if ((cm->flags & MG_COAP_ERROR) != 0) { > + mg_coap_free_options(cm); > + return NULL; > + } > > - if (!FindNextFileW(dir->handle, &dir->info)) { > - (void) FindClose(dir->handle); > - dir->handle = INVALID_HANDLE_VALUE; > - } > + cm->flags |= MG_COAP_OPTIOMG_FIELD; > > - } else { > - SetLastError(ERROR_FILE_NOT_FOUND); > - } > - } else { > - SetLastError(ERROR_BAD_ARGUMENTS); > + if (ptr == io->buf + io->len) { > + /* end of packet, ok */ > + return NULL; > } > > - return result; > + ptr++; > + > + return ptr; > } > > -#ifndef HAVE_POLL > -static int poll(struct pollfd *pfd, int n, int milliseconds) { > - struct timeval tv; > - fd_set set; > - int i, result; > +uint32_t mg_coap_parse(struct mbuf *io, struct mg_coap_message *cm) { > + char *ptr; > > - tv.tv_sec = milliseconds / 1000; > - tv.tv_usec = (milliseconds % 1000) * 1000; > - FD_ZERO(&set); > + memset(cm, 0, sizeof(*cm)); > > - for (i = 0; i < n; i++) { > - FD_SET((SOCKET) pfd[i].fd, &set); > - pfd[i].revents = 0; > + if ((ptr = coap_parse_header(io->buf, io, cm)) == NULL) { > + return cm->flags; > } > > - if ((result = select(0, &set, NULL, NULL, &tv)) > 0) { > - for (i = 0; i < n; i++) { > - if (FD_ISSET(pfd[i].fd, &set)) { > - pfd[i].revents = POLLIN; > - } > - } > + if ((ptr = coap_get_token(ptr, io, cm)) == NULL) { > + return cm->flags; > } > > - return result; > + if ((ptr = coap_get_options(ptr, io, cm)) == NULL) { > + return cm->flags; > + } > + > + /* the rest is payload */ > + cm->payload.len = io->len - (ptr - io->buf); > + if (cm->payload.len != 0) { > + cm->payload.p = ptr; > + cm->flags |= MG_COAP_PAYLOAD_FIELD; > + } > + > + return cm->flags; > } > -#endif // HAVE_POLL > > -#define set_close_on_exec(x) // No FD_CLOEXEC on Windows > +/* > + * Calculates extended size of given Opt Number/Length in coap message. > + * > + * Helper function. > + */ > +static size_t coap_get_ext_opt_size(uint32_t value) { > + int ret = 0; > + > + if (value >= 13 && value <= 0xFF + 13) { > + ret = sizeof(uint8_t); > + } else if (value > 0xFF + 13 && value <= 0xFFFF + 269) { > + ret = sizeof(uint16_t); > + } > > -int mg_start_thread(mg_thread_func_t f, void *p) { > - return (long)_beginthread((void (__cdecl *)(void *)) f, 0, p) == -1L ? -1 : 0; > + return ret; > } > > -static HANDLE dlopen(const char *dll_name, int flags) { > - wchar_t wbuf[PATH_MAX]; > - (void) flags; > - to_unicode(dll_name, wbuf, ARRAY_SIZE(wbuf)); > - return LoadLibraryW(wbuf); > +/* > + * Splits given Opt Number/Length into base and ext values. > + * > + * Helper function. > + */ > +static int coap_split_opt(uint32_t value, uint8_t *base, uint16_t *ext) { > + int ret = 0; > + > + if (value < 13) { > + *base = value; > + } else if (value >= 13 && value <= 0xFF + 13) { > + *base = 13; > + *ext = value - 13; > + ret = sizeof(uint8_t); > + } else if (value > 0xFF + 13 && value <= 0xFFFF + 269) { > + *base = 14; > + *ext = value - 269; > + ret = sizeof(uint16_t); > + } > + > + return ret; > } > > -#if !defined(NO_CGI) > -#define SIGKILL 0 > -static int kill(pid_t pid, int sig_num) { > - (void) TerminateProcess(pid, sig_num); > - (void) CloseHandle(pid); > +/* > + * Puts uint16_t (in network order) into given char stream. > + * > + * Helper function. > + */ > +static char *coap_add_uint16(char *ptr, uint16_t val) { > + *ptr = val >> 8; > + ptr++; > + *ptr = val & 0x00FF; > + ptr++; > + return ptr; > +} > + > +/* > + * Puts extended value of Opt Number/Length into given char stream. > + * > + * Helper function. > + */ > +static char *coap_add_opt_info(char *ptr, uint16_t val, size_t len) { > + if (len == sizeof(uint8_t)) { > + *ptr = (char) val; > + ptr++; > + } else if (len == sizeof(uint16_t)) { > + ptr = coap_add_uint16(ptr, val); > + } > + > + return ptr; > +} > + > +/* > + * Verifies given mg_coap_message and calculates message size for it. > + * > + * Helper function. > + */ > +static uint32_t coap_calculate_packet_size(struct mg_coap_message *cm, > + size_t *len) { > + struct mg_coap_option *opt; > + uint32_t prev_opt_number; > + > + *len = 4; /* header */ > + if (cm->msg_type > MG_COAP_MSG_MAX) { > + return MG_COAP_ERROR | MG_COAP_MSG_TYPE_FIELD; > + } > + if (cm->token.len > 8) { > + return MG_COAP_ERROR | MG_COAP_TOKEN_FIELD; > + } > + if (cm->code_class > 7) { > + return MG_COAP_ERROR | MG_COAP_CODE_CLASS_FIELD; > + } > + if (cm->code_detail > 31) { > + return MG_COAP_ERROR | MG_COAP_CODE_DETAIL_FIELD; > + } > + > + *len += cm->token.len; > + if (cm->payload.len != 0) { > + *len += cm->payload.len + 1; /* ... + 1; add payload marker */ > + } > + > + opt = cm->options; > + prev_opt_number = 0; > + while (opt != NULL) { > + *len += 1; /* basic delta/length */ > + *len += coap_get_ext_opt_size(opt->number - prev_opt_number); > + *len += coap_get_ext_opt_size((uint32_t) opt->value.len); > + /* > + * Current implementation performs check if > + * option_number > previous option_number and produces an error > + * TODO(alashkin): write design doc with limitations > + * May be resorting is more suitable solution. > + */ > + if ((opt->next != NULL && opt->number > opt->next->number) || > + opt->value.len > 0xFFFF + 269 || > + opt->number - prev_opt_number > 0xFFFF + 269) { > + return MG_COAP_ERROR | MG_COAP_OPTIOMG_FIELD; > + } > + *len += opt->value.len; > + prev_opt_number = opt->number; > + opt = opt->next; > + } > + > return 0; > } > > -static void trim_trailing_whitespaces(char *s) { > - char *e = s + strlen(s) - 1; > - while (e > s && isspace(* (unsigned char *) e)) { > - *e-- = '\0'; > +uint32_t mg_coap_compose(struct mg_coap_message *cm, struct mbuf *io) { > + struct mg_coap_option *opt; > + uint32_t res, prev_opt_number; > + size_t prev_io_len, packet_size; > + char *ptr; > + > + res = coap_calculate_packet_size(cm, &packet_size); > + if (res != 0) { > + return res; > } > -} > > -static pid_t spawn_process(struct mg_connection *conn, const char *prog, > - char *envblk, char *envp[], int fd_stdin, > - int fd_stdout, const char *dir) { > - HANDLE me; > - char *p, *interp, full_interp[PATH_MAX], full_dir[PATH_MAX], > - cmdline[PATH_MAX], buf[PATH_MAX]; > - struct file file = STRUCT_FILE_INITIALIZER; > - STARTUPINFOA si; > - PROCESS_INFORMATION pi = { 0 }; > + /* saving previous lenght to handle non-empty mbuf */ > + prev_io_len = io->len; > + if (mbuf_append(io, NULL, packet_size) == 0) return MG_COAP_ERROR; > + ptr = io->buf + prev_io_len; > > - (void) envp; > + /* > + * since cm is verified, it is possible to use bits shift operator > + * without additional zeroing of unused bits > + */ > > - memset(&si, 0, sizeof(si)); > - si.cb = sizeof(si); > + /* ver: 2 bits, msg_type: 2 bits, toklen: 4 bits */ > + *ptr = (1 << 6) | (cm->msg_type << 4) | (uint8_t)(cm->token.len); > + ptr++; > > - // TODO(lsm): redirect CGI errors to the error log file > - si.dwFlags = STARTF_USESTDHANDLES | STARTF_USESHOWWINDOW; > - si.wShowWindow = SW_HIDE; > + /* code class: 3 bits, code detail: 5 bits */ > + *ptr = (cm->code_class << 5) | (cm->code_detail); > + ptr++; > > - me = GetCurrentProcess(); > - DuplicateHandle(me, (HANDLE) _get_osfhandle(fd_stdin), me, > - &si.hStdInput, 0, TRUE, DUPLICATE_SAME_ACCESS); > - DuplicateHandle(me, (HANDLE) _get_osfhandle(fd_stdout), me, > - &si.hStdOutput, 0, TRUE, DUPLICATE_SAME_ACCESS); > + ptr = coap_add_uint16(ptr, cm->msg_id); > > - // If CGI file is a script, try to read the interpreter line > - interp = conn->ctx->config[CGI_INTERPRETER]; > - if (interp == NULL) { > - buf[0] = buf[1] = '\0'; > + if (cm->token.len != 0) { > + memcpy(ptr, cm->token.p, cm->token.len); > + ptr += cm->token.len; > + } > > - // Read the first line of the script into the buffer > - snprintf(cmdline, sizeof(cmdline), "%s%c%s", dir, '/', prog); > - if (mg_fopen(conn, cmdline, "r", &file)) { > - p = (char *) file.membuf; > - mg_fgets(buf, sizeof(buf), &file, &p); > - mg_fclose(&file); > - buf[sizeof(buf) - 1] = '\0'; > - } > + opt = cm->options; > + prev_opt_number = 0; > + while (opt != NULL) { > + uint8_t delta_base = 0, length_base = 0; > + uint16_t delta_ext = 0, length_ext = 0; > > - if (buf[0] == '#' && buf[1] == '!') { > - trim_trailing_whitespaces(buf + 2); > - } else { > - buf[2] = '\0'; > + size_t opt_delta_len = > + coap_split_opt(opt->number - prev_opt_number, &delta_base, &delta_ext); > + size_t opt_lenght_len = > + coap_split_opt((uint32_t) opt->value.len, &length_base, &length_ext); > + > + *ptr = (delta_base << 4) | length_base; > + ptr++; > + > + ptr = coap_add_opt_info(ptr, delta_ext, opt_delta_len); > + ptr = coap_add_opt_info(ptr, length_ext, opt_lenght_len); > + > + if (opt->value.len != 0) { > + memcpy(ptr, opt->value.p, opt->value.len); > + ptr += opt->value.len; > } > - interp = buf + 2; > + > + prev_opt_number = opt->number; > + opt = opt->next; > } > > - if (interp[0] != '\0') { > - GetFullPathNameA(interp, sizeof(full_interp), full_interp, NULL); > - interp = full_interp; > + if (cm->payload.len != 0) { > + *ptr = (char) -1; > + ptr++; > + memcpy(ptr, cm->payload.p, cm->payload.len); > } > - GetFullPathNameA(dir, sizeof(full_dir), full_dir, NULL); > > - mg_snprintf(conn, cmdline, sizeof(cmdline), "%s%s%s\\%s", > - interp, interp[0] == '\0' ? "" : " ", full_dir, prog); > + return 0; > +} > + > +uint32_t mg_coap_send_message(struct mg_connection *nc, > + struct mg_coap_message *cm) { > + struct mbuf packet_out; > + uint32_t compose_res; > > - DEBUG_TRACE(("Running [%s]", cmdline)); > - if (CreateProcessA(NULL, cmdline, NULL, NULL, TRUE, > - CREATE_NEW_PROCESS_GROUP, envblk, NULL, &si, &pi) == 0) { > - cry(conn, "%s: CreateProcess(%s): %ld", > - __func__, cmdline, ERRNO); > - pi.hProcess = (pid_t) -1; > + mbuf_init(&packet_out, 0); > + compose_res = mg_coap_compose(cm, &packet_out); > + if (compose_res != 0) { > + return compose_res; /* LCOV_EXCL_LINE */ > } > > - // Always close these to prevent handle leakage. > - (void) close(fd_stdin); > - (void) close(fd_stdout); > - > - (void) CloseHandle(si.hStdOutput); > - (void) CloseHandle(si.hStdInput); > - (void) CloseHandle(pi.hThread); > + mg_send(nc, packet_out.buf, (int) packet_out.len); > + mbuf_free(&packet_out); > > - return (pid_t) pi.hProcess; > + return 0; > } > -#endif // !NO_CGI > > -static int set_non_blocking_mode(SOCKET sock) { > - unsigned long on = 1; > - return ioctlsocket(sock, FIONBIO, &on); > +uint32_t mg_coap_send_ack(struct mg_connection *nc, uint16_t msg_id) { > + struct mg_coap_message cm; > + memset(&cm, 0, sizeof(cm)); > + cm.msg_type = MG_COAP_MSG_ACK; > + cm.msg_id = msg_id; > + > + return mg_coap_send_message(nc, &cm); > } > > -#else > -static int mg_stat(struct mg_connection *conn, const char *path, > - struct file *filep) { > - struct stat st; > - > - if (!is_file_in_memory(conn, path, filep) && !stat(path, &st)) { > - filep->size = st.st_size; > - filep->modification_time = st.st_mtime; > - filep->is_directory = S_ISDIR(st.st_mode); > - } else { > - filep->modification_time = (time_t) 0; > +static void coap_handler(struct mg_connection *nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data)) { > + struct mbuf *io = &nc->recv_mbuf; > + struct mg_coap_message cm; > + uint32_t parse_res; > + > + memset(&cm, 0, sizeof(cm)); > + > + nc->handler(nc, ev, ev_data MG_UD_ARG(user_data)); > + > + switch (ev) { > + case MG_EV_RECV: > + parse_res = mg_coap_parse(io, &cm); > + if ((parse_res & MG_COAP_IGNORE) == 0) { > + if ((cm.flags & MG_COAP_NOT_ENOUGH_DATA) != 0) { > + /* > + * Since we support UDP only > + * MG_COAP_NOT_ENOUGH_DATA == MG_COAP_FORMAT_ERROR > + */ > + cm.flags |= MG_COAP_FORMAT_ERROR; /* LCOV_EXCL_LINE */ > + } /* LCOV_EXCL_LINE */ > + nc->handler(nc, MG_COAP_EVENT_BASE + cm.msg_type, > + &cm MG_UD_ARG(user_data)); > + } > + > + mg_coap_free_options(&cm); > + mbuf_remove(io, io->len); > + break; > + } > +} > +/* > + * Attach built-in CoAP event handler to the given connection. > + * > + * The user-defined event handler will receive following extra events: > + * > + * - MG_EV_COAP_CON > + * - MG_EV_COAP_NOC > + * - MG_EV_COAP_ACK > + * - MG_EV_COAP_RST > + */ > +int mg_set_protocol_coap(struct mg_connection *nc) { > + /* supports UDP only */ > + if ((nc->flags & MG_F_UDP) == 0) { > + return -1; > } > > - return filep->membuf != NULL || filep->modification_time != (time_t) 0; > + nc->proto_handler = coap_handler; > + > + return 0; > } > > -static void set_close_on_exec(int fd) { > - fcntl(fd, F_SETFD, FD_CLOEXEC); > +#endif /* MG_ENABLE_COAP */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/tun.c" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_TUN > + > +/* Amalgamated: #include "common/cs_dbg.h" */ > +/* Amalgamated: #include "mongoose/src/http.h" */ > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/net.h" */ > +/* Amalgamated: #include "mongoose/src/net_if_tun.h" */ > +/* Amalgamated: #include "mongoose/src/tun.h" */ > +/* Amalgamated: #include "mongoose/src/util.h" */ > + > +static void mg_tun_reconnect(struct mg_tun_client *client, int timeout); > + > +static void mg_tun_init_client(struct mg_tun_client *client, struct mg_mgr *mgr, > + struct mg_iface *iface, const char *dispatcher, > + struct mg_tun_ssl_opts ssl) { > + client->mgr = mgr; > + client->iface = iface; > + client->disp_url = dispatcher; > + client->last_stream_id = 0; > + client->ssl = ssl; > + > + client->disp = NULL; /* will be set by mg_tun_reconnect */ > + client->listener = NULL; /* will be set by mg_do_bind */ > + client->reconnect = NULL; /* will be set by mg_tun_reconnect */ > +} > + > +void mg_tun_log_frame(struct mg_tun_frame *frame) { > + LOG(LL_DEBUG, ("Got TUN frame: type=0x%x, flags=0x%x stream_id=0x%x, " > + "len=%d", > + frame->type, frame->flags, (unsigned int) frame->stream_id, > + (int) frame->body.len)); > +#if MG_ENABLE_HEXDUMP > + { > + char hex[512]; > + mg_hexdump(frame->body.p, frame->body.len, hex, sizeof(hex) - 1); > + hex[sizeof(hex) - 1] = '\0'; > + LOG(LL_DEBUG, ("body:\n%s", hex)); > + } > +#else > + LOG(LL_DEBUG, ("body: '%.*s'", (int) frame->body.len, frame->body.p)); > +#endif > } > > -int mg_start_thread(mg_thread_func_t func, void *param) { > - pthread_t thread_id; > - pthread_attr_t attr; > +static void mg_tun_close_all(struct mg_tun_client *client) { > + struct mg_connection *nc; > + for (nc = client->mgr->active_connections; nc != NULL; nc = nc->next) { > + if (nc->iface == client->iface && !(nc->flags & MG_F_LISTENING)) { > + LOG(LL_DEBUG, ("Closing tunneled connection %p", nc)); > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + /* mg_close_conn(nc); */ > + } > + } > +} > > - (void) pthread_attr_init(&attr); > - (void) pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED); > - // TODO(lsm): figure out why mongoose dies on Linux if next line is enabled > - // (void) pthread_attr_setstacksize(&attr, sizeof(struct mg_connection) * 5); > - > - return pthread_create(&thread_id, &attr, func, param); > -} > - > -#ifndef NO_CGI > -static pid_t spawn_process(struct mg_connection *conn, const char *prog, > - char *envblk, char *envp[], int fd_stdin, > - int fd_stdout, const char *dir) { > - pid_t pid; > - const char *interp; > - > - (void) envblk; > - > - if ((pid = fork()) == -1) { > - // Parent > - send_http_error(conn, 500, http_500_error, "fork(): %s", strerror(ERRNO)); > - } else if (pid == 0) { > - // Child > - if (chdir(dir) != 0) { > - cry(conn, "%s: chdir(%s): %s", __func__, dir, strerror(ERRNO)); > - } else if (dup2(fd_stdin, 0) == -1) { > - cry(conn, "%s: dup2(%d, 0): %s", __func__, fd_stdin, strerror(ERRNO)); > - } else if (dup2(fd_stdout, 1) == -1) { > - cry(conn, "%s: dup2(%d, 1): %s", __func__, fd_stdout, strerror(ERRNO)); > - } else { > - (void) dup2(fd_stdout, 2); > - (void) close(fd_stdin); > - (void) close(fd_stdout); > - > - // After exec, all signal handlers are restored to their default values, > - // with one exception of SIGCHLD. According to POSIX.1-2001 and Linux's > - // implementation, SIGCHLD's handler will leave unchanged after exec > - // if it was set to be ignored. Restore it to default action. > - signal(SIGCHLD, SIG_DFL); > - > - interp = conn->ctx->config[CGI_INTERPRETER]; > - if (interp == NULL) { > - (void) execle(prog, prog, NULL, envp); > - cry(conn, "%s: execle(%s): %s", __func__, prog, strerror(ERRNO)); > +static void mg_tun_client_handler(struct mg_connection *nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data)) { > +#if !MG_ENABLE_CALLBACK_USERDATA > + void *user_data = nc->user_data; > +#else > + (void) nc; > +#endif > + struct mg_tun_client *client = (struct mg_tun_client *) user_data; > + > + switch (ev) { > + case MG_EV_CONNECT: { > + int err = *(int *) ev_data; > + > + if (err) { > + LOG(LL_ERROR, ("Cannot connect to the tunnel dispatcher: %d", err)); > } else { > - (void) execle(interp, interp, prog, NULL, envp); > - cry(conn, "%s: execle(%s %s): %s", __func__, interp, prog, > - strerror(ERRNO)); > + LOG(LL_INFO, ("Connected to the tunnel dispatcher")); > } > + break; > } > - exit(EXIT_FAILURE); > - } > + case MG_EV_HTTP_REPLY: { > + struct http_message *hm = (struct http_message *) ev_data; > > - // Parent. Close stdio descriptors > - (void) close(fd_stdin); > - (void) close(fd_stdout); > - > - return pid; > -} > -#endif // !NO_CGI > + if (hm->resp_code != 200) { > + LOG(LL_ERROR, > + ("Tunnel dispatcher reply non-OK status code %d", hm->resp_code)); > + } > + break; > + } > + case MG_EV_WEBSOCKET_HANDSHAKE_DONE: { > + LOG(LL_INFO, ("Tunnel dispatcher handshake done")); > + break; > + } > + case MG_EV_WEBSOCKET_FRAME: { > + struct websocket_message *wm = (struct websocket_message *) ev_data; > + struct mg_connection *tc; > + struct mg_tun_frame frame; > > -static int set_non_blocking_mode(SOCKET sock) { > - int flags; > + if (mg_tun_parse_frame(wm->data, wm->size, &frame) == -1) { > + LOG(LL_ERROR, ("Got invalid tun frame dropping")); > + break; > + } > > - flags = fcntl(sock, F_GETFL, 0); > - (void) fcntl(sock, F_SETFL, flags | O_NONBLOCK); > + mg_tun_log_frame(&frame); > > - return 0; > + tc = mg_tun_if_find_conn(client, frame.stream_id); > + if (tc == NULL) { > + if (frame.body.len > 0) { > + LOG(LL_DEBUG, ("Got frame after receiving end has been closed")); > + } > + break; > + } > + if (frame.body.len > 0) { > + mg_if_recv_tcp_cb(tc, (void *) frame.body.p, frame.body.len, > + 0 /* own */); > + } > + if (frame.flags & MG_TUN_F_END_STREAM) { > + LOG(LL_DEBUG, ("Closing tunneled connection because got end of stream " > + "from other end")); > + tc->flags |= MG_F_CLOSE_IMMEDIATELY; > + mg_close_conn(tc); > + } > + break; > + } > + case MG_EV_CLOSE: { > + LOG(LL_DEBUG, ("Closing all tunneled connections")); > + /* > + * The client might have been already freed when the listening socket is > + * closed. > + */ > + if (client != NULL) { > + mg_tun_close_all(client); > + client->disp = NULL; > + LOG(LL_INFO, ("Dispatcher connection is no more, reconnecting")); > + /* TODO(mkm): implement exp back off */ > + mg_tun_reconnect(client, MG_TUN_RECONNECT_INTERVAL); > + } > + break; > + } > + default: > + break; > + } > } > -#endif // _WIN32 > > -// Write data to the IO channel - opened file descriptor, socket or SSL > -// descriptor. Return number of bytes written. > -static int64_t push(FILE *fp, SOCKET sock, SSL *ssl, const char *buf, > - int64_t len) { > - int64_t sent; > - int n, k; > - > - (void) ssl; // Get rid of warning > - sent = 0; > - while (sent < len) { > +static void mg_tun_do_reconnect(struct mg_tun_client *client) { > + struct mg_connection *dc; > + struct mg_connect_opts opts; > + memset(&opts, 0, sizeof(opts)); > +#if MG_ENABLE_SSL > + opts.ssl_cert = client->ssl.ssl_cert; > + opts.ssl_key = client->ssl.ssl_key; > + opts.ssl_ca_cert = client->ssl.ssl_ca_cert; > +#endif > + /* HTTP/Websocket listener */ > + if ((dc = mg_connect_ws_opt(client->mgr, MG_CB(mg_tun_client_handler, client), > + opts, client->disp_url, MG_TUN_PROTO_NAME, > + NULL)) == NULL) { > + LOG(LL_ERROR, > + ("Cannot connect to WS server on addr [%s]\n", client->disp_url)); > + return; > + } > > - // How many bytes we send in this iteration > - k = len - sent > INT_MAX ? INT_MAX : (int) (len - sent); > + client->disp = dc; > +#if !MG_ENABLE_CALLBACK_USERDATA > + dc->user_data = client; > +#endif > +} > > -#ifndef NO_SSL > - if (ssl != NULL) { > - n = SSL_write(ssl, buf + sent, k); > - } else > +void mg_tun_reconnect_ev_handler(struct mg_connection *nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data)) { > +#if !MG_ENABLE_CALLBACK_USERDATA > + void *user_data = nc->user_data; > +#else > + (void) nc; > #endif > - if (fp != NULL) { > - n = (int) fwrite(buf + sent, 1, (size_t) k, fp); > - if (ferror(fp)) > - n = -1; > - } else { > - n = send(sock, buf + sent, (size_t) k, MSG_NOSIGNAL); > - } > + struct mg_tun_client *client = (struct mg_tun_client *) user_data; > + (void) ev_data; > > - if (n <= 0) > + switch (ev) { > + case MG_EV_TIMER: > + if (!(client->listener->flags & MG_F_TUN_DO_NOT_RECONNECT)) { > + mg_tun_do_reconnect(client); > + } else { > + /* Reconnecting is suppressed, we'll check again at the next poll */ > + mg_tun_reconnect(client, 0); > + } > break; > + } > +} > + > +static void mg_tun_reconnect(struct mg_tun_client *client, int timeout) { > + if (client->reconnect == NULL) { > + client->reconnect = mg_add_sock(client->mgr, INVALID_SOCKET, > + MG_CB(mg_tun_reconnect_ev_handler, client)); > +#if !MG_ENABLE_CALLBACK_USERDATA > + client->reconnect->user_data = client; > +#endif > + } > + client->reconnect->ev_timer_time = mg_time() + timeout; > +} > > - sent += n; > +static struct mg_tun_client *mg_tun_create_client(struct mg_mgr *mgr, > + const char *dispatcher, > + struct mg_tun_ssl_opts ssl) { > + struct mg_tun_client *client = NULL; > + struct mg_iface *iface = mg_find_iface(mgr, &mg_tun_iface_vtable, NULL); > + if (iface == NULL) { > + LOG(LL_ERROR, ("The tun feature requires the manager to have a tun " > + "interface enabled")); > + return NULL; > } > > - return sent; > + client = (struct mg_tun_client *) MG_MALLOC(sizeof(*client)); > + mg_tun_init_client(client, mgr, iface, dispatcher, ssl); > + iface->data = client; > + > + /* > + * We need to give application a chance to set MG_F_TUN_DO_NOT_RECONNECT on a > + * listening connection right after mg_tun_bind_opt() returned it, so we > + * should use mg_tun_reconnect() here, instead of mg_tun_do_reconnect() > + */ > + mg_tun_reconnect(client, 0); > + return client; > } > > -// Read from IO channel - opened file descriptor, socket, or SSL descriptor. > -// Return negative value on error, or number of bytes read on success. > -static int pull(FILE *fp, struct mg_connection *conn, char *buf, int len) { > - int nread; > +void mg_tun_destroy_client(struct mg_tun_client *client) { > + /* > + * NOTE: > + * `client` is NULL in case of OOM > + * `client->disp` is NULL if connection failed > + * `client->iface is NULL is `mg_find_iface` failed > + */ > > - if (fp != NULL) { > - // Use read() instead of fread(), because if we're reading from the CGI > - // pipe, fread() may block until IO buffer is filled up. We cannot afford > - // to block and must pass all read bytes immediately to the client. > - nread = read(fileno(fp), buf, (size_t) len); > -#ifndef NO_SSL > - } else if (conn->ssl != NULL) { > - nread = SSL_read(conn->ssl, buf, len); > -#endif > - } else { > - nread = recv(conn->client.sock, buf, (size_t) len, 0); > + if (client != NULL && client->disp != NULL) { > + /* the dispatcher connection handler will in turn close all tunnels */ > + client->disp->flags |= MG_F_CLOSE_IMMEDIATELY; > + /* this is used as a signal to other tun handlers that the party is over */ > + client->disp->user_data = NULL; > } > > - return conn->ctx->stop_flag ? -1 : nread; > -} > + if (client != NULL && client->reconnect != NULL) { > + client->reconnect->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > > -int mg_read(struct mg_connection *conn, void *buf, size_t len) { > - int n, buffered_len, nread; > - const char *body; > + if (client != NULL && client->iface != NULL) { > + client->iface->data = NULL; > + } > > - nread = 0; > - if (conn->consumed_content < conn->content_len) { > - // Adjust number of bytes to read. > - int64_t to_read = conn->content_len - conn->consumed_content; > - if (to_read < (int64_t) len) { > - len = (size_t) to_read; > - } > + MG_FREE(client); > +} > > - // Return buffered data > - body = conn->buf + conn->request_len + conn->consumed_content; > - buffered_len = &conn->buf[conn->data_len] - body; > - if (buffered_len > 0) { > - if (len < (size_t) buffered_len) { > - buffered_len = (int) len; > - } > - memcpy(buf, body, (size_t) buffered_len); > - len -= buffered_len; > - conn->consumed_content += buffered_len; > - nread += buffered_len; > - buf = (char *) buf + buffered_len; > - } > +static struct mg_connection *mg_tun_do_bind(struct mg_tun_client *client, > + MG_CB(mg_event_handler_t handler, > + void *user_data), > + struct mg_bind_opts opts) { > + struct mg_connection *lc; > + opts.iface = client->iface; > + lc = mg_bind_opt(client->mgr, ":1234" /* dummy port */, > + MG_CB(handler, user_data), opts); > + client->listener = lc; > + return lc; > +} > > - // We have returned all buffered data. Read new data from the remote socket. > - while (len > 0) { > - n = pull(NULL, conn, (char *) buf, (int) len); > - if (n < 0) { > - nread = n; // Propagate the error > - break; > - } else if (n == 0) { > - break; // No more data to read > - } else { > - buf = (char *) buf + n; > - conn->consumed_content += n; > - nread += n; > - len -= n; > - } > - } > +struct mg_connection *mg_tun_bind_opt(struct mg_mgr *mgr, > + const char *dispatcher, > + MG_CB(mg_event_handler_t handler, > + void *user_data), > + struct mg_bind_opts opts) { > +#if MG_ENABLE_SSL > + struct mg_tun_ssl_opts ssl = {opts.ssl_cert, opts.ssl_key, opts.ssl_ca_cert}; > +#else > + struct mg_tun_ssl_opts ssl = {0}; > +#endif > + struct mg_tun_client *client = mg_tun_create_client(mgr, dispatcher, ssl); > + if (client == NULL) { > + return NULL; > } > - return nread; > +#if MG_ENABLE_SSL > + /* these options don't make sense in the local mouth of the tunnel */ > + opts.ssl_cert = NULL; > + opts.ssl_key = NULL; > + opts.ssl_ca_cert = NULL; > +#endif > + return mg_tun_do_bind(client, MG_CB(handler, user_data), opts); > } > > -int mg_write(struct mg_connection *conn, const void *buf, size_t len) { > - time_t now; > - int64_t n, total, allowed; > +int mg_tun_parse_frame(void *data, size_t len, struct mg_tun_frame *frame) { > + const size_t header_size = sizeof(uint32_t) + sizeof(uint8_t) * 2; > + if (len < header_size) { > + return -1; > + } > > - if (conn->throttle > 0) { > - if ((now = time(NULL)) != conn->last_throttle_time) { > - conn->last_throttle_time = now; > - conn->last_throttle_bytes = 0; > - } > - allowed = conn->throttle - conn->last_throttle_bytes; > - if (allowed > (int64_t) len) { > - allowed = len; > - } > - if ((total = push(NULL, conn->client.sock, conn->ssl, (const char *) buf, > - (int64_t) allowed)) == allowed) { > - buf = (char *) buf + total; > - conn->last_throttle_bytes += total; > - while (total < (int64_t) len && conn->ctx->stop_flag == 0) { > - allowed = conn->throttle > (int64_t) len - total ? > - (int64_t) len - total : conn->throttle; > - if ((n = push(NULL, conn->client.sock, conn->ssl, (const char *) buf, > - (int64_t) allowed)) != allowed) { > - break; > - } > - sleep(1); > - conn->last_throttle_bytes = allowed; > - conn->last_throttle_time = time(NULL); > - buf = (char *) buf + n; > - total += n; > - } > - } > - } else { > - total = push(NULL, conn->client.sock, conn->ssl, (const char *) buf, > - (int64_t) len); > + frame->type = *(uint8_t *) (data); > + frame->flags = *(uint8_t *) ((char *) data + 1); > + memcpy(&frame->stream_id, (char *) data + 2, sizeof(uint32_t)); > + frame->stream_id = ntohl(frame->stream_id); > + frame->body.p = (char *) data + header_size; > + frame->body.len = len - header_size; > + return 0; > +} > + > +void mg_tun_send_frame(struct mg_connection *ws, uint32_t stream_id, > + uint8_t type, uint8_t flags, struct mg_str msg) { > + stream_id = htonl(stream_id); > + { > + struct mg_str parts[] = { > + {(char *) &type, sizeof(type)}, > + {(char *) &flags, sizeof(flags)}, > + {(char *) &stream_id, sizeof(stream_id)}, > + {msg.p, msg.len} /* vc6 doesn't like just `msg` here */}; > + mg_send_websocket_framev(ws, WEBSOCKET_OP_BINARY, parts, > + sizeof(parts) / sizeof(parts[0])); > } > - return (int) total; > } > > -// Print message to buffer. If buffer is large enough to hold the message, > -// return buffer. If buffer is to small, allocate large enough buffer on heap, > -// and return allocated buffer. > -static int alloc_vprintf(char **buf, size_t size, const char *fmt, va_list ap) { > - va_list ap_copy; > - int len; > +#endif /* MG_ENABLE_TUN */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/sntp.c" > +#endif > +/* > + * Copyright (c) 2016 Cesanta Software Limited > + * All rights reserved > + */ > > - // Windows is not standard-compliant, and vsnprintf() returns -1 if > - // buffer is too small. Also, older versions of msvcrt.dll do not have > - // _vscprintf(). However, if size is 0, vsnprintf() behaves correctly. > - // Therefore, we make two passes: on first pass, get required message length. > - // On second pass, actually print the message. > - va_copy(ap_copy, ap); > - len = vsnprintf(NULL, 0, fmt, ap_copy); > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/sntp.h" */ > +/* Amalgamated: #include "mongoose/src/util.h" */ > > - if (len > (int) size && > - (size = len + 1) > 0 && > - (*buf = (char *) malloc(size)) == NULL) { > - len = -1; // Allocation failed, mark failure > - } else { > - va_copy(ap_copy, ap); > - vsnprintf(*buf, size, fmt, ap_copy); > - } > +#if MG_ENABLE_SNTP > > - return len; > -} > +#define SNTP_TIME_OFFSET 2208988800 > > -int mg_vprintf(struct mg_connection *conn, const char *fmt, va_list ap) { > - char mem[MG_BUF_LEN], *buf = mem; > - int len; > +#ifndef SNTP_TIMEOUT > +#define SNTP_TIMEOUT 10 > +#endif > > - if ((len = alloc_vprintf(&buf, sizeof(mem), fmt, ap)) > 0) { > - len = mg_write(conn, buf, (size_t) len); > - } > - if (buf != mem && buf != NULL) { > - free(buf); > - } > +#ifndef SNTP_ATTEMPTS > +#define SNTP_ATTEMPTS 3 > +#endif > > - return len; > +static uint64_t mg_get_sec(uint64_t val) { > + return (val & 0xFFFFFFFF00000000) >> 32; > +} > + > +static uint64_t mg_get_usec(uint64_t val) { > + uint64_t tmp = (val & 0x00000000FFFFFFFF); > + tmp *= 1000000; > + tmp >>= 32; > + return tmp; > +} > + > +static void mg_ntp_to_tv(uint64_t val, struct timeval *tv) { > + uint64_t tmp; > + tmp = mg_get_sec(val); > + tmp -= SNTP_TIME_OFFSET; > + tv->tv_sec = tmp; > + tv->tv_usec = mg_get_usec(val); > +} > + > +static void mg_get_ntp_ts(const char *ntp, uint64_t *val) { > + uint32_t tmp; > + memcpy(&tmp, ntp, sizeof(tmp)); > + tmp = ntohl(tmp); > + *val = (uint64_t) tmp << 32; > + memcpy(&tmp, ntp + 4, sizeof(tmp)); > + tmp = ntohl(tmp); > + *val |= tmp; > +} > + > +void mg_sntp_send_request(struct mg_connection *c) { > + uint8_t buf[48] = {0}; > + /* > + * header - 8 bit: > + * LI (2 bit) - 3 (not in sync), VN (3 bit) - 4 (version), > + * mode (3 bit) - 3 (client) > + */ > + buf[0] = (3 << 6) | (4 << 3) | 3; > + > +/* > + * Next fields should be empty in client request > + * stratum, 8 bit > + * poll interval, 8 bit > + * rrecision, 8 bit > + * root delay, 32 bit > + * root dispersion, 32 bit > + * ref id, 32 bit > + * ref timestamp, 64 bit > + * originate Timestamp, 64 bit > + * receive Timestamp, 64 bit > +*/ > + > +/* > + * convert time to sntp format (sntp starts from 00:00:00 01.01.1900) > + * according to rfc868 it is 2208988800L sec > + * this information is used to correct roundtrip delay > + * but if local clock is absolutely broken (and doesn't work even > + * as simple timer), it is better to disable it > +*/ > +#ifndef MG_SNTP_NO_DELAY_CORRECTION > + uint32_t sec; > + sec = htonl((uint32_t)(mg_time() + SNTP_TIME_OFFSET)); > + memcpy(&buf[40], &sec, sizeof(sec)); > +#endif > + > + mg_send(c, buf, sizeof(buf)); > } > > -int mg_printf(struct mg_connection *conn, const char *fmt, ...) { > - va_list ap; > - va_start(ap, fmt); > - return mg_vprintf(conn, fmt, ap); > +#ifndef MG_SNTP_NO_DELAY_CORRECTION > +static uint64_t mg_calculate_delay(uint64_t t1, uint64_t t2, uint64_t t3) { > + /* roundloop delay = (T4 - T1) - (T3 - T2) */ > + uint64_t d1 = ((mg_time() + SNTP_TIME_OFFSET) * 1000000) - > + (mg_get_sec(t1) * 1000000 + mg_get_usec(t1)); > + uint64_t d2 = (mg_get_sec(t3) * 1000000 + mg_get_usec(t3)) - > + (mg_get_sec(t2) * 1000000 + mg_get_usec(t2)); > + > + return (d1 > d2) ? d1 - d2 : 0; > } > +#endif > > -// URL-decode input buffer into destination buffer. > -// 0-terminate the destination buffer. Return the length of decoded data. > -// form-url-encoded data differs from URI encoding in a way that it > -// uses '+' as character for space, see RFC 1866 section 8.2.1 > -// http://ftp.ics.uci.edu/pub/ietf/html/rfc1866.txt > -static int url_decode(const char *src, int src_len, char *dst, > - int dst_len, int is_form_url_encoded) { > - int i, j, a, b; > -#define HEXTOI(x) (isdigit(x) ? x - '0' : x - 'W') > +MG_INTERNAL int mg_sntp_parse_reply(const char *buf, int len, > + struct mg_sntp_message *msg) { > + uint8_t hdr; > + uint64_t trsm_ts_T3, delay = 0; > + int mode; > + struct timeval tv; > > - for (i = j = 0; i < src_len && j < dst_len - 1; i++, j++) { > - if (src[i] == '%' && i < src_len - 2 && > - isxdigit(* (const unsigned char *) (src + i + 1)) && > - isxdigit(* (const unsigned char *) (src + i + 2))) { > - a = tolower(* (const unsigned char *) (src + i + 1)); > - b = tolower(* (const unsigned char *) (src + i + 2)); > - dst[j] = (char) ((HEXTOI(a) << 4) | HEXTOI(b)); > - i += 2; > - } else if (is_form_url_encoded && src[i] == '+') { > - dst[j] = ' '; > - } else { > - dst[j] = src[i]; > - } > + if (len < 48) { > + return -1; > } > > - dst[j] = '\0'; // Null-terminate the destination > + hdr = buf[0]; > > - return i >= src_len ? j : -1; > -} > + if ((hdr & 0x38) >> 3 != 4) { > + /* Wrong version */ > + return -1; > + } > > -int mg_get_var(const char *data, size_t data_len, const char *name, > - char *dst, size_t dst_len) { > - const char *p, *e, *s; > - size_t name_len; > - int len; > + mode = hdr & 0x7; > + if (mode != 4 && mode != 5) { > + /* Not a server reply */ > + return -1; > + } > > - if (dst == NULL || dst_len == 0) { > - len = -2; > - } else if (data == NULL || name == NULL || data_len == 0) { > - len = -1; > - dst[0] = '\0'; > - } else { > - name_len = strlen(name); > - e = data + data_len; > - len = -1; > - dst[0] = '\0'; > + memset(msg, 0, sizeof(*msg)); > > - // data is "var1=val1&var2=val2...". Find variable first > - for (p = data; p + name_len < e; p++) { > - if ((p == data || p[-1] == '&') && p[name_len] == '=' && > - !mg_strncasecmp(name, p, name_len)) { > + msg->kiss_of_death = (buf[1] == 0); /* Server asks to not send requests */ > > - // Point p to variable value > - p += name_len + 1; > + mg_get_ntp_ts(&buf[40], &trsm_ts_T3); > > - // Point s to the end of the value > - s = (const char *) memchr(p, '&', (size_t)(e - p)); > - if (s == NULL) { > - s = e; > - } > - assert(s >= p); > +#ifndef MG_SNTP_NO_DELAY_CORRECTION > + { > + uint64_t orig_ts_T1, recv_ts_T2; > + mg_get_ntp_ts(&buf[24], &orig_ts_T1); > + mg_get_ntp_ts(&buf[32], &recv_ts_T2); > + delay = mg_calculate_delay(orig_ts_T1, recv_ts_T2, trsm_ts_T3); > + } > +#endif > > - // Decode variable into destination buffer > - len = url_decode(p, (size_t)(s - p), dst, dst_len, 1); > + mg_ntp_to_tv(trsm_ts_T3, &tv); > > - // Redirect error code from -1 to -2 (destination buffer too small). > - if (len == -1) { > - len = -2; > - } > - break; > - } > - } > - } > + msg->time = (double) tv.tv_sec + (((double) tv.tv_usec + delay) / 1000000.0); > > - return len; > + return 0; > } > > -int mg_get_cookie(const char *cookie_header, const char *var_name, > - char *dst, size_t dst_size) { > - const char *s, *p, *end; > - int name_len, len = -1; > +static void mg_sntp_handler(struct mg_connection *c, int ev, > + void *ev_data MG_UD_ARG(void *user_data)) { > + struct mbuf *io = &c->recv_mbuf; > + struct mg_sntp_message msg; > > - if (dst == NULL || dst_size == 0) { > - len = -2; > - } else if (var_name == NULL || (s = cookie_header) == NULL) { > - len = -1; > - dst[0] = '\0'; > - } else { > - name_len = (int) strlen(var_name); > - end = s + strlen(s); > - dst[0] = '\0'; > + c->handler(c, ev, ev_data MG_UD_ARG(user_data)); > > - for (; (s = mg_strcasestr(s, var_name)) != NULL; s += name_len) { > - if (s[name_len] == '=') { > - s += name_len + 1; > - if ((p = strchr(s, ' ')) == NULL) > - p = end; > - if (p[-1] == ';') > - p--; > - if (*s == '"' && p[-1] == '"' && p > s + 1) { > - s++; > - p--; > - } > - if ((size_t) (p - s) < dst_size) { > - len = p - s; > - mg_strlcpy(dst, s, (size_t) len + 1); > - } else { > - len = -3; > - } > - break; > + switch (ev) { > + case MG_EV_RECV: { > + if (mg_sntp_parse_reply(io->buf, io->len, &msg) < 0) { > + DBG(("Invalid SNTP packet received (%d)", (int) io->len)); > + c->handler(c, MG_SNTP_MALFORMED_REPLY, NULL MG_UD_ARG(user_data)); > + } else { > + c->handler(c, MG_SNTP_REPLY, (void *) &msg MG_UD_ARG(user_data)); > } > - } > - } > - return len; > -} > > -static void convert_uri_to_file_name(struct mg_connection *conn, char *buf, > - size_t buf_len, struct file *filep) { > - struct vec a, b; > - const char *rewrite, *uri = conn->request_info.uri; > - char *p; > - int match_len; > - > - // Using buf_len - 1 because memmove() for PATH_INFO may shift part > - // of the path one byte on the right. > - mg_snprintf(conn, buf, buf_len - 1, "%s%s", conn->ctx->config[DOCUMENT_ROOT], > - uri); > - > - rewrite = conn->ctx->config[REWRITE]; > - while ((rewrite = next_option(rewrite, &a, &b)) != NULL) { > - if ((match_len = match_prefix(a.ptr, a.len, uri)) > 0) { > - mg_snprintf(conn, buf, buf_len - 1, "%.*s%s", (int) b.len, b.ptr, > - uri + match_len); > + mbuf_remove(io, io->len); > break; > } > } > - > - if (!mg_stat(conn, buf, filep)) { > - // Support PATH_INFO for CGI scripts. > - for (p = buf + strlen(buf); p > buf + 1; p--) { > - if (*p == '/') { > - *p = '\0'; > - if (match_prefix(conn->ctx->config[CGI_EXTENSIONS], > - strlen(conn->ctx->config[CGI_EXTENSIONS]), buf) > 0 && > - mg_stat(conn, buf, filep)) { > - // Shift PATH_INFO block one character right, e.g. > - // "/x.cgi/foo/bar\x00" => "/x.cgi\x00/foo/bar\x00" > - // conn->path_info is pointing to the local variable "path" declared > - // in handle_request(), so PATH_INFO is not valid after > - // handle_request returns. > - conn->path_info = p + 1; > - memmove(p + 2, p + 1, strlen(p + 1) + 1); // +1 is for trailing \0 > - p[1] = '/'; > - break; > - } else { > - *p = '/'; > - } > - } > - } > - } > } > > -// Check whether full request is buffered. Return: > -// -1 if request is malformed > -// 0 if request is not yet fully buffered > -// >0 actual request length, including last \r\n\r\n > -int get_request_len(const char *buf, int buflen) { > - const char *s, *e; > - int len = 0; > +int mg_set_protocol_sntp(struct mg_connection *c) { > + if ((c->flags & MG_F_UDP) == 0) { > + return -1; > + } > > - for (s = buf, e = s + buflen - 1; len <= 0 && s < e; s++) > - // Control characters are not allowed but >=128 is. > - if (!isprint(* (const unsigned char *) s) && *s != '\r' && > - *s != '\n' && * (const unsigned char *) s < 128) { > - len = -1; > - break; // [i_a] abort scan as soon as one malformed character is found; > - // don't let subsequent \r\n\r\n win us over anyhow > - } else if (s[0] == '\n' && s[1] == '\n') { > - len = (int) (s - buf) + 2; > - } else if (s[0] == '\n' && &s[1] < e && > - s[1] == '\r' && s[2] == '\n') { > - len = (int) (s - buf) + 3; > - } > + c->proto_handler = mg_sntp_handler; > > - return len; > + return 0; > } > > -// Convert month to the month number. Return -1 on error, or month number > -static int get_month_index(const char *s) { > - size_t i; > +struct mg_connection *mg_sntp_connect(struct mg_mgr *mgr, > + MG_CB(mg_event_handler_t event_handler, > + void *user_data), > + const char *sntp_server_name) { > + struct mg_connection *c = NULL; > + char url[100], *p_url = url; > + const char *proto = "", *port = "", *tmp; > > - for (i = 0; i < ARRAY_SIZE(month_names); i++) > - if (!strcmp(s, month_names[i])) > - return (int) i; > + /* If port is not specified, use default (123) */ > + tmp = strchr(sntp_server_name, ':'); > + if (tmp != NULL && *(tmp + 1) == '/') { > + tmp = strchr(tmp + 1, ':'); > + } > > - return -1; > -} > + if (tmp == NULL) { > + port = ":123"; > + } > > -static int num_leap_years(int year) { > - return year / 4 - year / 100 + year / 400; > -} > + /* Add udp:// if needed */ > + if (strncmp(sntp_server_name, "udp://", 6) != 0) { > + proto = "udp://"; > + } > > -// Parse UTC date-time string, and return the corresponding time_t value. > -static time_t parse_date_string(const char *datetime) { > - static const unsigned short days_before_month[] = { > - 0, 31, 59, 90, 120, 151, 181, 212, 243, 273, 304, 334 > - }; > - char month_str[32]; > - int second, minute, hour, day, month, year, leap_days, days; > - time_t result = (time_t) 0; > + mg_asprintf(&p_url, sizeof(url), "%s%s%s", proto, sntp_server_name, port); > > - if (((sscanf(datetime, "%d/%3s/%d %d:%d:%d", > - &day, month_str, &year, &hour, &minute, &second) == 6) || > - (sscanf(datetime, "%d %3s %d %d:%d:%d", > - &day, month_str, &year, &hour, &minute, &second) == 6) || > - (sscanf(datetime, "%*3s, %d %3s %d %d:%d:%d", > - &day, month_str, &year, &hour, &minute, &second) == 6) || > - (sscanf(datetime, "%d-%3s-%d %d:%d:%d", > - &day, month_str, &year, &hour, &minute, &second) == 6)) && > - year > 1970 && > - (month = get_month_index(month_str)) != -1) { > - leap_days = num_leap_years(year) - num_leap_years(1970); > - year -= 1970; > - days = year * 365 + days_before_month[month] + (day - 1) + leap_days; > - result = days * 24 * 3600 + hour * 3600 + minute * 60 + second; > + c = mg_connect(mgr, p_url, event_handler MG_UD_ARG(user_data)); > + > + if (c == NULL) { > + goto cleanup; > } > > - return result; > -} > + mg_set_protocol_sntp(c); > > -// Protect against directory disclosure attack by removing '..', > -// excessive '/' and '\' characters > -static void remove_double_dots_and_double_slashes(char *s) { > - char *p = s; > - > - while (*s != '\0') { > - *p++ = *s++; > - if (s[-1] == '/' || s[-1] == '\\') { > - // Skip all following slashes, backslashes and double-dots > - while (s[0] != '\0') { > - if (s[0] == '/' || s[0] == '\\') { > - s++; > - } else if (s[0] == '.' && s[1] == '.') { > - s += 2; > - } else { > - break; > - } > - } > - } > +cleanup: > + if (p_url != url) { > + MG_FREE(p_url); > } > - *p = '\0'; > + > + return c; > } > > -static const struct { > - const char *extension; > - size_t ext_len; > - const char *mime_type; > -} builtin_mime_types[] = { > - {".html", 5, "text/html"}, > - {".htm", 4, "text/html"}, > - {".shtm", 5, "text/html"}, > - {".shtml", 6, "text/html"}, > - {".css", 4, "text/css"}, > - {".js", 3, "application/x-javascript"}, > - {".ico", 4, "image/x-icon"}, > - {".gif", 4, "image/gif"}, > - {".jpg", 4, "image/jpeg"}, > - {".jpeg", 5, "image/jpeg"}, > - {".png", 4, "image/png"}, > - {".svg", 4, "image/svg+xml"}, > - {".txt", 4, "text/plain"}, > - {".torrent", 8, "application/x-bittorrent"}, > - {".wav", 4, "audio/x-wav"}, > - {".mp3", 4, "audio/x-mp3"}, > - {".mid", 4, "audio/mid"}, > - {".m3u", 4, "audio/x-mpegurl"}, > - {".ogg", 4, "audio/ogg"}, > - {".ram", 4, "audio/x-pn-realaudio"}, > - {".xml", 4, "text/xml"}, > - {".json", 5, "text/json"}, > - {".xslt", 5, "application/xml"}, > - {".xsl", 4, "application/xml"}, > - {".ra", 3, "audio/x-pn-realaudio"}, > - {".doc", 4, "application/msword"}, > - {".exe", 4, "application/octet-stream"}, > - {".zip", 4, "application/x-zip-compressed"}, > - {".xls", 4, "application/excel"}, > - {".tgz", 4, "application/x-tar-gz"}, > - {".tar", 4, "application/x-tar"}, > - {".gz", 3, "application/x-gunzip"}, > - {".arj", 4, "application/x-arj-compressed"}, > - {".rar", 4, "application/x-arj-compressed"}, > - {".rtf", 4, "application/rtf"}, > - {".pdf", 4, "application/pdf"}, > - {".swf", 4, "application/x-shockwave-flash"}, > - {".mpg", 4, "video/mpeg"}, > - {".webm", 5, "video/webm"}, > - {".mpeg", 5, "video/mpeg"}, > - {".mp4", 4, "video/mp4"}, > - {".m4v", 4, "video/x-m4v"}, > - {".asf", 4, "video/x-ms-asf"}, > - {".avi", 4, "video/x-msvideo"}, > - {".bmp", 4, "image/bmp"}, > - {NULL, 0, NULL} > +struct sntp_data { > + mg_event_handler_t hander; > + int count; > }; > > -const char *mg_get_builtin_mime_type(const char *path) { > - const char *ext; > - size_t i, path_len; > +static void mg_sntp_util_ev_handler(struct mg_connection *c, int ev, > + void *ev_data MG_UD_ARG(void *user_data)) { > +#if !MG_ENABLE_CALLBACK_USERDATA > + void *user_data = c->user_data; > +#endif > + struct sntp_data *sd = (struct sntp_data *) user_data; > > - path_len = strlen(path); > + switch (ev) { > + case MG_EV_CONNECT: > + if (*(int *) ev_data != 0) { > + mg_call(c, sd->hander, c->user_data, MG_SNTP_FAILED, NULL); > + break; > + } > + /* fallthrough */ > + case MG_EV_TIMER: > + if (sd->count <= SNTP_ATTEMPTS) { > + mg_sntp_send_request(c); > + mg_set_timer(c, mg_time() + 10); > + sd->count++; > + } else { > + mg_call(c, sd->hander, c->user_data, MG_SNTP_FAILED, NULL); > + c->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > + break; > + case MG_SNTP_MALFORMED_REPLY: > + mg_call(c, sd->hander, c->user_data, MG_SNTP_FAILED, NULL); > + c->flags |= MG_F_CLOSE_IMMEDIATELY; > + break; > + case MG_SNTP_REPLY: > + mg_call(c, sd->hander, c->user_data, MG_SNTP_REPLY, ev_data); > + c->flags |= MG_F_CLOSE_IMMEDIATELY; > + break; > + case MG_EV_CLOSE: > + MG_FREE(user_data); > + c->user_data = NULL; > + break; > + } > +} > > - for (i = 0; builtin_mime_types[i].extension != NULL; i++) { > - ext = path + (path_len - builtin_mime_types[i].ext_len); > - if (path_len > builtin_mime_types[i].ext_len && > - mg_strcasecmp(ext, builtin_mime_types[i].extension) == 0) { > - return builtin_mime_types[i].mime_type; > - } > +struct mg_connection *mg_sntp_get_time(struct mg_mgr *mgr, > + mg_event_handler_t event_handler, > + const char *sntp_server_name) { > + struct mg_connection *c; > + struct sntp_data *sd = (struct sntp_data *) MG_CALLOC(1, sizeof(*sd)); > + if (sd == NULL) { > + return NULL; > } > > - return "text/plain"; > -} > + c = mg_sntp_connect(mgr, MG_CB(mg_sntp_util_ev_handler, sd), > + sntp_server_name); > + if (c == NULL) { > + MG_FREE(sd); > + return NULL; > + } > > -// Look at the "path" extension and figure what mime type it has. > -// Store mime type in the vector. > -static void get_mime_type(struct mg_context *ctx, const char *path, > - struct vec *vec) { > - struct vec ext_vec, mime_vec; > - const char *list, *ext; > - size_t path_len; > + sd->hander = event_handler; > +#if !MG_ENABLE_CALLBACK_USERDATA > + c->user_data = sd; > +#endif > > - path_len = strlen(path); > + return c; > +} > > - // Scan user-defined mime types first, in case user wants to > - // override default mime types. > - list = ctx->config[EXTRA_MIME_TYPES]; > - while ((list = next_option(list, &ext_vec, &mime_vec)) != NULL) { > - // ext now points to the path suffix > - ext = path + path_len - ext_vec.len; > - if (mg_strncasecmp(ext, ext_vec.ptr, ext_vec.len) == 0) { > - *vec = mime_vec; > - return; > +#endif /* MG_ENABLE_SNTP */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/socks.c" > +#endif > +/* > + * Copyright (c) 2017 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if MG_ENABLE_SOCKS > + > +/* Amalgamated: #include "mongoose/src/socks.h" */ > +/* Amalgamated: #include "mongoose/src/internal.h" */ > + > +/* > + * https://www.ietf.org/rfc/rfc1928.txt paragraph 3, handle client handshake > + * > + * +----+----------+----------+ > + * |VER | NMETHODS | METHODS | > + * +----+----------+----------+ > + * | 1 | 1 | 1 to 255 | > + * +----+----------+----------+ > + */ > +static void mg_socks5_handshake(struct mg_connection *c) { > + struct mbuf *r = &c->recv_mbuf; > + if (r->buf[0] != MG_SOCKS_VERSION) { > + c->flags |= MG_F_CLOSE_IMMEDIATELY; > + } else if (r->len > 2 && (size_t) r->buf[1] + 2 <= r->len) { > + /* https://www.ietf.org/rfc/rfc1928.txt paragraph 3 */ > + unsigned char reply[2] = {MG_SOCKS_VERSION, MG_SOCKS_HANDSHAKE_FAILURE}; > + int i; > + for (i = 2; i < r->buf[1] + 2; i++) { > + /* TODO(lsm): support other auth methods */ > + if (r->buf[i] == MG_SOCKS_HANDSHAKE_NOAUTH) reply[1] = r->buf[i]; > } > + mbuf_remove(r, 2 + r->buf[1]); > + mg_send(c, reply, sizeof(reply)); > + c->flags |= MG_SOCKS_HANDSHAKE_DONE; /* Mark handshake done */ > } > - > - vec->ptr = mg_get_builtin_mime_type(path); > - vec->len = strlen(vec->ptr); > } > > -static int is_big_endian(void) { > - static const int n = 1; > - return ((char *) &n)[0] == 0; > +static void disband(struct mg_connection *c) { > + struct mg_connection *c2 = (struct mg_connection *) c->user_data; > + if (c2 != NULL) { > + c2->flags |= MG_F_SEND_AND_CLOSE; > + c2->user_data = NULL; > + } > + c->flags |= MG_F_SEND_AND_CLOSE; > + c->user_data = NULL; > } > > -#ifndef HAVE_MD5 > -typedef struct MD5Context { > - uint32_t buf[4]; > - uint32_t bits[2]; > - unsigned char in[64]; > -} MD5_CTX; > - > -static void byteReverse(unsigned char *buf, unsigned longs) { > - uint32_t t; > - > - // Forrest: MD5 expect LITTLE_ENDIAN, swap if BIG_ENDIAN > - if (is_big_endian()) { > - do { > - t = (uint32_t) ((unsigned) buf[3] << 8 | buf[2]) << 16 | > - ((unsigned) buf[1] << 8 | buf[0]); > - * (uint32_t *) buf = t; > - buf += 4; > - } while (--longs); > +static void relay_data(struct mg_connection *c) { > + struct mg_connection *c2 = (struct mg_connection *) c->user_data; > + if (c2 != NULL) { > + mg_send(c2, c->recv_mbuf.buf, c->recv_mbuf.len); > + mbuf_remove(&c->recv_mbuf, c->recv_mbuf.len); > + } else { > + c->flags |= MG_F_SEND_AND_CLOSE; > + } > +} > + > +static void serv_ev_handler(struct mg_connection *c, int ev, void *ev_data) { > + if (ev == MG_EV_CLOSE) { > + disband(c); > + } else if (ev == MG_EV_RECV) { > + relay_data(c); > + } else if (ev == MG_EV_CONNECT) { > + int res = *(int *) ev_data; > + if (res != 0) LOG(LL_ERROR, ("connect error: %d", res)); > + } > +} > + > +static void mg_socks5_connect(struct mg_connection *c, const char *addr) { > + struct mg_connection *serv = mg_connect(c->mgr, addr, serv_ev_handler); > + serv->user_data = c; > + c->user_data = serv; > +} > + > +/* > + * Request, https://www.ietf.org/rfc/rfc1928.txt paragraph 4 > + * > + * +----+-----+-------+------+----------+----------+ > + * |VER | CMD | RSV | ATYP | DST.ADDR | DST.PORT | > + * +----+-----+-------+------+----------+----------+ > + * | 1 | 1 | X'00' | 1 | Variable | 2 | > + * +----+-----+-------+------+----------+----------+ > + */ > +static void mg_socks5_handle_request(struct mg_connection *c) { > + struct mbuf *r = &c->recv_mbuf; > + unsigned char *p = (unsigned char *) r->buf; > + unsigned char addr_len = 4, reply = MG_SOCKS_SUCCESS; > + int ver, cmd, atyp; > + char addr[300]; > + > + if (r->len < 8) return; /* return if not fully buffered. min DST.ADDR is 2 */ > + ver = p[0]; > + cmd = p[1]; > + atyp = p[3]; > + > + /* TODO(lsm): support other commands */ > + if (ver != MG_SOCKS_VERSION || cmd != MG_SOCKS_CMD_CONNECT) { > + reply = MG_SOCKS_CMD_NOT_SUPPORTED; > + } else if (atyp == MG_SOCKS_ADDR_IPV4) { > + addr_len = 4; > + if (r->len < (size_t) addr_len + 6) return; /* return if not buffered */ > + snprintf(addr, sizeof(addr), "%d.%d.%d.%d:%d", p[4], p[5], p[6], p[7], > + p[8] << 8 | p[9]); > + mg_socks5_connect(c, addr); > + } else if (atyp == MG_SOCKS_ADDR_IPV6) { > + addr_len = 16; > + if (r->len < (size_t) addr_len + 6) return; /* return if not buffered */ > + snprintf(addr, sizeof(addr), "[%x:%x:%x:%x:%x:%x:%x:%x]:%d", > + p[4] << 8 | p[5], p[6] << 8 | p[7], p[8] << 8 | p[9], > + p[10] << 8 | p[11], p[12] << 8 | p[13], p[14] << 8 | p[15], > + p[16] << 8 | p[17], p[18] << 8 | p[19], p[20] << 8 | p[21]); > + mg_socks5_connect(c, addr); > + } else if (atyp == MG_SOCKS_ADDR_DOMAIN) { > + addr_len = p[4] + 1; > + if (r->len < (size_t) addr_len + 6) return; /* return if not buffered */ > + snprintf(addr, sizeof(addr), "%.*s:%d", p[4], p + 5, > + p[4 + addr_len] << 8 | p[4 + addr_len + 1]); > + mg_socks5_connect(c, addr); > + } else { > + reply = MG_SOCKS_ADDR_NOT_SUPPORTED; > + } > + > + /* > + * Reply, https://www.ietf.org/rfc/rfc1928.txt paragraph 5 > + * > + * +----+-----+-------+------+----------+----------+ > + * |VER | REP | RSV | ATYP | BND.ADDR | BND.PORT | > + * +----+-----+-------+------+----------+----------+ > + * | 1 | 1 | X'00' | 1 | Variable | 2 | > + * +----+-----+-------+------+----------+----------+ > + */ > + { > + unsigned char buf[] = {MG_SOCKS_VERSION, reply, 0}; > + mg_send(c, buf, sizeof(buf)); > + } > + mg_send(c, r->buf + 3, addr_len + 1 + 2); > + > + mbuf_remove(r, 6 + addr_len); /* Remove request from the input stream */ > + c->flags |= MG_SOCKS_CONNECT_DONE; /* Mark ourselves as connected */ > +} > + > +static void socks_handler(struct mg_connection *c, int ev, void *ev_data) { > + if (ev == MG_EV_RECV) { > + if (!(c->flags & MG_SOCKS_HANDSHAKE_DONE)) mg_socks5_handshake(c); > + if (c->flags & MG_SOCKS_HANDSHAKE_DONE && > + !(c->flags & MG_SOCKS_CONNECT_DONE)) { > + mg_socks5_handle_request(c); > + } > + if (c->flags & MG_SOCKS_CONNECT_DONE) relay_data(c); > + } else if (ev == MG_EV_CLOSE) { > + disband(c); > } > + (void) ev_data; > } > > -#define F1(x, y, z) (z ^ (x & (y ^ z))) > -#define F2(x, y, z) F1(z, x, y) > -#define F3(x, y, z) (x ^ y ^ z) > -#define F4(x, y, z) (y ^ (x | ~z)) > - > -#define MD5STEP(f, w, x, y, z, data, s) \ > - ( w += f(x, y, z) + data, w = w<<s | w>>(32-s), w += x ) > - > -// Start MD5 accumulation. Set bit count to 0 and buffer to mysterious > -// initialization constants. > -static void MD5Init(MD5_CTX *ctx) { > - ctx->buf[0] = 0x67452301; > - ctx->buf[1] = 0xefcdab89; > - ctx->buf[2] = 0x98badcfe; > - ctx->buf[3] = 0x10325476; > - > - ctx->bits[0] = 0; > - ctx->bits[1] = 0; > +void mg_set_protocol_socks(struct mg_connection *c) { > + c->proto_handler = socks_handler; > } > +#endif > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/cc3200/cc3200_libc.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > -static void MD5Transform(uint32_t buf[4], uint32_t const in[16]) { > - register uint32_t a, b, c, d; > - > - a = buf[0]; > - b = buf[1]; > - c = buf[2]; > - d = buf[3]; > - > - MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); > - MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); > - MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); > - MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); > - MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); > - MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12); > - MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17); > - MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22); > - MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); > - MD5STEP(F1, d, a, b, c, in[9] + 0x8b44f7af, 12); > - MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17); > - MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22); > - MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7); > - MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12); > - MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17); > - MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22); > - > - MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); > - MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); > - MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14); > - MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20); > - MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5); > - MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9); > - MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14); > - MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20); > - MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5); > - MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9); > - MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14); > - MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20); > - MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5); > - MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9); > - MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14); > - MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20); > +#if CS_PLATFORM == CS_P_CC3200 > > - MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4); > - MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11); > - MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16); > - MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23); > - MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4); > - MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11); > - MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16); > - MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23); > - MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4); > - MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11); > - MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16); > - MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23); > - MD5STEP(F3, a, b, c, d, in[9] + 0xd9d4d039, 4); > - MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11); > - MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16); > - MD5STEP(F3, b, c, d, a, in[2] + 0xc4ac5665, 23); > +/* Amalgamated: #include "common/mg_mem.h" */ > +#include <stdio.h> > +#include <string.h> > > - MD5STEP(F4, a, b, c, d, in[0] + 0xf4292244, 6); > - MD5STEP(F4, d, a, b, c, in[7] + 0x432aff97, 10); > - MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15); > - MD5STEP(F4, b, c, d, a, in[5] + 0xfc93a039, 21); > - MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6); > - MD5STEP(F4, d, a, b, c, in[3] + 0x8f0ccc92, 10); > - MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15); > - MD5STEP(F4, b, c, d, a, in[1] + 0x85845dd1, 21); > - MD5STEP(F4, a, b, c, d, in[8] + 0x6fa87e4f, 6); > - MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10); > - MD5STEP(F4, c, d, a, b, in[6] + 0xa3014314, 15); > - MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21); > - MD5STEP(F4, a, b, c, d, in[4] + 0xf7537e82, 6); > - MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10); > - MD5STEP(F4, c, d, a, b, in[2] + 0x2ad7d2bb, 15); > - MD5STEP(F4, b, c, d, a, in[9] + 0xeb86d391, 21); > +#ifndef __TI_COMPILER_VERSION__ > +#include <reent.h> > +#include <sys/stat.h> > +#include <sys/time.h> > +#include <unistd.h> > +#endif > > - buf[0] += a; > - buf[1] += b; > - buf[2] += c; > - buf[3] += d; > -} > +#include <inc/hw_types.h> > +#include <inc/hw_memmap.h> > +#include <driverlib/prcm.h> > +#include <driverlib/rom.h> > +#include <driverlib/rom_map.h> > +#include <driverlib/uart.h> > +#include <driverlib/utils.h> > > -static void MD5Update(MD5_CTX *ctx, unsigned char const *buf, unsigned len) { > - uint32_t t; > +#define CONSOLE_UART UARTA0_BASE > > - t = ctx->bits[0]; > - if ((ctx->bits[0] = t + ((uint32_t) len << 3)) < t) > - ctx->bits[1]++; > - ctx->bits[1] += len >> 29; > +#ifdef __TI_COMPILER_VERSION__ > +int asprintf(char **strp, const char *fmt, ...) { > + va_list ap; > + int len; > > - t = (t >> 3) & 0x3f; > + *strp = MG_MALLOC(BUFSIZ); > + if (*strp == NULL) return -1; > > - if (t) { > - unsigned char *p = (unsigned char *) ctx->in + t; > + va_start(ap, fmt); > + len = vsnprintf(*strp, BUFSIZ, fmt, ap); > + va_end(ap); > > - t = 64 - t; > - if (len < t) { > - memcpy(p, buf, len); > - return; > - } > - memcpy(p, buf, t); > - byteReverse(ctx->in, 16); > - MD5Transform(ctx->buf, (uint32_t *) ctx->in); > - buf += t; > - len -= t; > + if (len > 0) { > + *strp = MG_REALLOC(*strp, len + 1); > + if (*strp == NULL) return -1; > } > > - while (len >= 64) { > - memcpy(ctx->in, buf, 64); > - byteReverse(ctx->in, 16); > - MD5Transform(ctx->buf, (uint32_t *) ctx->in); > - buf += 64; > - len -= 64; > + if (len >= BUFSIZ) { > + va_start(ap, fmt); > + len = vsnprintf(*strp, len + 1, fmt, ap); > + va_end(ap); > } > > - memcpy(ctx->in, buf, len); > + return len; > } > > -static void MD5Final(unsigned char digest[16], MD5_CTX *ctx) { > - unsigned count; > - unsigned char *p; > - uint32_t *a; > +#if MG_TI_NO_HOST_INTERFACE > +time_t HOSTtime() { > + struct timeval tp; > + gettimeofday(&tp, NULL); > + return tp.tv_sec; > +} > +#endif > > - count = (ctx->bits[0] >> 3) & 0x3F; > +#endif /* __TI_COMPILER_VERSION__ */ > > - p = ctx->in + count; > - *p++ = 0x80; > - count = 64 - 1 - count; > - if (count < 8) { > - memset(p, 0, count); > - byteReverse(ctx->in, 16); > - MD5Transform(ctx->buf, (uint32_t *) ctx->in); > - memset(ctx->in, 0, 56); > - } else { > - memset(p, 0, count - 8); > +void fprint_str(FILE *fp, const char *str) { > + while (*str != '\0') { > + if (*str == '\n') MAP_UARTCharPut(CONSOLE_UART, '\r'); > + MAP_UARTCharPut(CONSOLE_UART, *str++); > } > - byteReverse(ctx->in, 14); > +} > > - a = (uint32_t *)ctx->in; > - a[14] = ctx->bits[0]; > - a[15] = ctx->bits[1]; > +void _exit(int status) { > + fprint_str(stderr, "_exit\n"); > + /* cause an unaligned access exception, that will drop you into gdb */ > + *(int *) 1 = status; > + while (1) > + ; /* avoid gcc warning because stdlib abort() has noreturn attribute */ > +} > > - MD5Transform(ctx->buf, (uint32_t *) ctx->in); > - byteReverse((unsigned char *) ctx->buf, 4); > - memcpy(digest, ctx->buf, 16); > - memset((char *) ctx, 0, sizeof(*ctx)); > +void _not_implemented(const char *what) { > + fprint_str(stderr, what); > + fprint_str(stderr, " is not implemented\n"); > + _exit(42); > } > -#endif // !HAVE_MD5 > > -// Stringify binary data. Output buffer must be twice as big as input, > -// because each byte takes 2 bytes in string representation > -static void bin2str(char *to, const unsigned char *p, size_t len) { > - static const char *hex = "0123456789abcdef"; > +int _kill(int pid, int sig) { > + (void) pid; > + (void) sig; > + _not_implemented("_kill"); > + return -1; > +} > > - for (; len--; p++) { > - *to++ = hex[p[0] >> 4]; > - *to++ = hex[p[0] & 0x0f]; > - } > - *to = '\0'; > +int _getpid() { > + fprint_str(stderr, "_getpid is not implemented\n"); > + return 42; > } > > -// Return stringified MD5 hash for list of strings. Buffer must be 33 bytes. > -char *mg_md5(char buf[33], ...) { > - unsigned char hash[16]; > - const char *p; > - va_list ap; > - MD5_CTX ctx; > +int _isatty(int fd) { > + /* 0, 1 and 2 are TTYs. */ > + return fd < 2; > +} > > - MD5Init(&ctx); > +#endif /* CS_PLATFORM == CS_P_CC3200 */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/msp432/msp432_libc.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > - va_start(ap, buf); > - while ((p = va_arg(ap, const char *)) != NULL) { > - MD5Update(&ctx, (const unsigned char *) p, (unsigned) strlen(p)); > - } > - va_end(ap); > +#if CS_PLATFORM == CS_P_MSP432 > > - MD5Final(hash, &ctx); > - bin2str(buf, hash, sizeof(hash)); > - return buf; > +#include <ti/sysbios/BIOS.h> > +#include <ti/sysbios/knl/Clock.h> > + > +int gettimeofday(struct timeval *tp, void *tzp) { > + uint32_t ticks = Clock_getTicks(); > + tp->tv_sec = ticks / 1000; > + tp->tv_usec = (ticks % 1000) * 1000; > + return 0; > } > > -// Check the user's password, return 1 if OK > -static int check_password(const char *method, const char *ha1, const char *uri, > - const char *nonce, const char *nc, const char *cnonce, > - const char *qop, const char *response) { > - char ha2[32 + 1], expected_response[32 + 1]; > +#endif /* CS_PLATFORM == CS_P_MSP432 */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/nrf5/nrf5_libc.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#if (CS_PLATFORM == CS_P_NRF51 || CS_PLATFORM == CS_P_NRF52) && \ > + defined(__ARMCC_VERSION) > +int gettimeofday(struct timeval *tp, void *tzp) { > + /* TODO */ > + tp->tv_sec = 0; > + tp->tv_usec = 0; > + return 0; > +} > +#endif > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/simplelink/sl_fs_slfs.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > - // Some of the parameters may be NULL > - if (method == NULL || nonce == NULL || nc == NULL || cnonce == NULL || > - qop == NULL || response == NULL) { > - return 0; > - } > +#ifndef CS_COMMON_PLATFORMS_SIMPLELINK_SL_FS_SLFS_H_ > +#define CS_COMMON_PLATFORMS_SIMPLELINK_SL_FS_SLFS_H_ > > - // NOTE(lsm): due to a bug in MSIE, we do not compare the URI > - // TODO(lsm): check for authentication timeout > - if (// strcmp(dig->uri, c->ouri) != 0 || > - strlen(response) != 32 > - // || now - strtoul(dig->nonce, NULL, 10) > 3600 > - ) { > - return 0; > - } > +#if defined(MG_FS_SLFS) > + > +#include <stdio.h> > +#ifndef __TI_COMPILER_VERSION__ > +#include <unistd.h> > +#include <sys/stat.h> > +#endif > > - mg_md5(ha2, method, ":", uri, NULL); > - mg_md5(expected_response, ha1, ":", nonce, ":", nc, > - ":", cnonce, ":", qop, ":", ha2, NULL); > +#define MAX_OPEN_SLFS_FILES 8 > > - return mg_strcasecmp(response, expected_response) == 0; > -} > +/* Indirect libc interface - same functions, different names. */ > +int fs_slfs_open(const char *pathname, int flags, mode_t mode); > +int fs_slfs_close(int fd); > +ssize_t fs_slfs_read(int fd, void *buf, size_t count); > +ssize_t fs_slfs_write(int fd, const void *buf, size_t count); > +int fs_slfs_stat(const char *pathname, struct stat *s); > +int fs_slfs_fstat(int fd, struct stat *s); > +off_t fs_slfs_lseek(int fd, off_t offset, int whence); > +int fs_slfs_unlink(const char *filename); > +int fs_slfs_rename(const char *from, const char *to); > > -// Use the global passwords file, if specified by auth_gpass option, > -// or search for .htpasswd in the requested directory. > -static void open_auth_file(struct mg_connection *conn, const char *path, > - struct file *filep) { > - char name[PATH_MAX]; > - const char *p, *e, *gpass = conn->ctx->config[GLOBAL_PASSWORDS_FILE]; > +void fs_slfs_set_new_file_size(const char *name, size_t size); > > - if (gpass != NULL) { > - // Use global passwords file > - if (!mg_fopen(conn, gpass, "r", filep)) { > - cry(conn, "fopen(%s): %s", gpass, strerror(ERRNO)); > - } > - } else if (mg_stat(conn, path, filep) && filep->is_directory) { > - mg_snprintf(conn, name, sizeof(name), "%s%c%s", > - path, '/', PASSWORDS_FILE_NAME); > - mg_fopen(conn, name, "r", filep); > - } else { > - // Try to find .htpasswd in requested directory. > - for (p = path, e = p + strlen(p) - 1; e > p; e--) > - if (e[0] == '/') > - break; > - mg_snprintf(conn, name, sizeof(name), "%.*s%c%s", > - (int) (e - p), p, '/', PASSWORDS_FILE_NAME); > - mg_fopen(conn, name, "r", filep); > - } > +#endif /* defined(MG_FS_SLFS) */ > + > +#endif /* CS_COMMON_PLATFORMS_SIMPLELINK_SL_FS_SLFS_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/simplelink/sl_fs_slfs.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +/* Standard libc interface to TI SimpleLink FS. */ > + > +#if defined(MG_FS_SLFS) || defined(CC3200_FS_SLFS) > + > +/* Amalgamated: #include "common/platforms/simplelink/sl_fs_slfs.h" */ > + > +#include <errno.h> > + > +#if CS_PLATFORM == CS_P_CC3200 > +#include <inc/hw_types.h> > +#endif > + > +/* Amalgamated: #include "common/cs_dbg.h" */ > +/* Amalgamated: #include "common/mg_mem.h" */ > + > +#if SL_MAJOR_VERSION_NUM < 2 > +int slfs_open(const unsigned char *fname, uint32_t flags) { > + _i32 fh; > + _i32 r = sl_FsOpen(fname, flags, NULL /* token */, &fh); > + return (r < 0 ? r : fh); > +} > +#else /* SL_MAJOR_VERSION_NUM >= 2 */ > +int slfs_open(const unsigned char *fname, uint32_t flags) { > + return sl_FsOpen(fname, flags, NULL /* token */); > } > +#endif > > -// Parsed Authorization header > -struct ah { > - char *user, *uri, *cnonce, *response, *qop, *nc, *nonce; > -}; > +/* From sl_fs.c */ > +int set_errno(int e); > +const char *drop_dir(const char *fname, bool *is_slfs); > > -// Return 1 on success. Always initializes the ah structure. > -static int parse_auth_header(struct mg_connection *conn, char *buf, > - size_t buf_size, struct ah *ah) { > - char *name, *value, *s; > - const char *auth_header; > +/* > + * With SLFS, you have to pre-declare max file size. Yes. Really. > + * 64K should be enough for everyone. Right? > + */ > +#ifndef FS_SLFS_MAX_FILE_SIZE > +#define FS_SLFS_MAX_FILE_SIZE (64 * 1024) > +#endif > > - (void) memset(ah, 0, sizeof(*ah)); > - if ((auth_header = mg_get_header(conn, "Authorization")) == NULL || > - mg_strncasecmp(auth_header, "Digest ", 7) != 0) { > - return 0; > - } > +struct sl_file_size_hint { > + char *name; > + size_t size; > +}; > + > +struct sl_fd_info { > + _i32 fh; > + _off_t pos; > + size_t size; > +}; > > - // Make modifiable copy of the auth header > - (void) mg_strlcpy(buf, auth_header + 7, buf_size); > - s = buf; > +static struct sl_fd_info s_sl_fds[MAX_OPEN_SLFS_FILES]; > +static struct sl_file_size_hint s_sl_file_size_hints[MAX_OPEN_SLFS_FILES]; > > - // Parse authorization header > - for (;;) { > - // Gobble initial spaces > - while (isspace(* (unsigned char *) s)) { > - s++; > +static int sl_fs_to_errno(_i32 r) { > + DBG(("SL error: %d", (int) r)); > + switch (r) { > + case SL_FS_OK: > + return 0; > + case SL_ERROR_FS_FILE_NAME_EXIST: > + return EEXIST; > + case SL_ERROR_FS_WRONG_FILE_NAME: > + return EINVAL; > + case SL_ERROR_FS_NO_AVAILABLE_NV_INDEX: > + case SL_ERROR_FS_NOT_ENOUGH_STORAGE_SPACE: > + return ENOSPC; > + case SL_ERROR_FS_FAILED_TO_ALLOCATE_MEM: > + return ENOMEM; > + case SL_ERROR_FS_FILE_NOT_EXISTS: > + return ENOENT; > + case SL_ERROR_FS_NOT_SUPPORTED: > + return ENOTSUP; > + } > + return ENXIO; > +} > + > +int fs_slfs_open(const char *pathname, int flags, mode_t mode) { > + int fd; > + for (fd = 0; fd < MAX_OPEN_SLFS_FILES; fd++) { > + if (s_sl_fds[fd].fh <= 0) break; > + } > + if (fd >= MAX_OPEN_SLFS_FILES) return set_errno(ENOMEM); > + struct sl_fd_info *fi = &s_sl_fds[fd]; > + > + /* > + * Apply path manipulations again, in case we got here directly > + * (via TI libc's "add_device"). > + */ > + pathname = drop_dir(pathname, NULL); > + > + _u32 am = 0; > + fi->size = (size_t) -1; > + int rw = (flags & 3); > + size_t new_size = FS_SLFS_MAX_FILE_SIZE; > + if (rw == O_RDONLY) { > + SlFsFileInfo_t sl_fi; > + _i32 r = sl_FsGetInfo((const _u8 *) pathname, 0, &sl_fi); > + if (r == SL_FS_OK) { > + fi->size = SL_FI_FILE_SIZE(sl_fi); > + } > + am = SL_FS_READ; > + } else { > + if (!(flags & O_TRUNC) || (flags & O_APPEND)) { > + // FailFS files cannot be opened for append and will be truncated > + // when opened for write. > + return set_errno(ENOTSUP); > } > - name = skip_quoted(&s, "=", " ", 0); > - // Value is either quote-delimited, or ends at first comma or space. > - if (s[0] == '\"') { > - s++; > - value = skip_quoted(&s, "\"", " ", '\\'); > - if (s[0] == ',') { > - s++; > + if (flags & O_CREAT) { > + size_t i; > + for (i = 0; i < MAX_OPEN_SLFS_FILES; i++) { > + if (s_sl_file_size_hints[i].name != NULL && > + strcmp(s_sl_file_size_hints[i].name, pathname) == 0) { > + new_size = s_sl_file_size_hints[i].size; > + MG_FREE(s_sl_file_size_hints[i].name); > + s_sl_file_size_hints[i].name = NULL; > + break; > + } > } > + am = FS_MODE_OPEN_CREATE(new_size, 0); > } else { > - value = skip_quoted(&s, ", ", " ", 0); // IE uses commas, FF uses spaces > - } > - if (*name == '\0') { > - break; > - } > - > - if (!strcmp(name, "username")) { > - ah->user = value; > - } else if (!strcmp(name, "cnonce")) { > - ah->cnonce = value; > - } else if (!strcmp(name, "response")) { > - ah->response = value; > - } else if (!strcmp(name, "uri")) { > - ah->uri = value; > - } else if (!strcmp(name, "qop")) { > - ah->qop = value; > - } else if (!strcmp(name, "nc")) { > - ah->nc = value; > - } else if (!strcmp(name, "nonce")) { > - ah->nonce = value; > + am = SL_FS_WRITE; > } > } > - > - // CGI needs it as REMOTE_USER > - if (ah->user != NULL) { > - conn->request_info.remote_user = mg_strdup(ah->user); > + fi->fh = slfs_open((_u8 *) pathname, am); > + LOG(LL_DEBUG, ("sl_FsOpen(%s, 0x%x) sz %u = %d", pathname, (int) am, > + (unsigned int) new_size, (int) fi->fh)); > + int r; > + if (fi->fh >= 0) { > + fi->pos = 0; > + r = fd; > } else { > + r = set_errno(sl_fs_to_errno(fi->fh)); > + } > + return r; > +} > + > +int fs_slfs_close(int fd) { > + struct sl_fd_info *fi = &s_sl_fds[fd]; > + if (fi->fh <= 0) return set_errno(EBADF); > + _i32 r = sl_FsClose(fi->fh, NULL, NULL, 0); > + LOG(LL_DEBUG, ("sl_FsClose(%d) = %d", (int) fi->fh, (int) r)); > + s_sl_fds[fd].fh = -1; > + return set_errno(sl_fs_to_errno(r)); > +} > + > +ssize_t fs_slfs_read(int fd, void *buf, size_t count) { > + struct sl_fd_info *fi = &s_sl_fds[fd]; > + if (fi->fh <= 0) return set_errno(EBADF); > + /* Simulate EOF. sl_FsRead @ file_size return SL_FS_ERR_OFFSET_OUT_OF_RANGE. > + */ > + if (fi->pos == fi->size) return 0; > + _i32 r = sl_FsRead(fi->fh, fi->pos, buf, count); > + DBG(("sl_FsRead(%d, %d, %d) = %d", (int) fi->fh, (int) fi->pos, (int) count, > + (int) r)); > + if (r >= 0) { > + fi->pos += r; > + return r; > + } > + return set_errno(sl_fs_to_errno(r)); > +} > + > +ssize_t fs_slfs_write(int fd, const void *buf, size_t count) { > + struct sl_fd_info *fi = &s_sl_fds[fd]; > + if (fi->fh <= 0) return set_errno(EBADF); > + _i32 r = sl_FsWrite(fi->fh, fi->pos, (_u8 *) buf, count); > + DBG(("sl_FsWrite(%d, %d, %d) = %d", (int) fi->fh, (int) fi->pos, (int) count, > + (int) r)); > + if (r >= 0) { > + fi->pos += r; > + return r; > + } > + return set_errno(sl_fs_to_errno(r)); > +} > + > +int fs_slfs_stat(const char *pathname, struct stat *s) { > + SlFsFileInfo_t sl_fi; > + /* > + * Apply path manipulations again, in case we got here directly > + * (via TI libc's "add_device"). > + */ > + pathname = drop_dir(pathname, NULL); > + _i32 r = sl_FsGetInfo((const _u8 *) pathname, 0, &sl_fi); > + if (r == SL_FS_OK) { > + s->st_mode = S_IFREG | 0666; > + s->st_nlink = 1; > + s->st_size = SL_FI_FILE_SIZE(sl_fi); > return 0; > } > - > - return 1; > + return set_errno(sl_fs_to_errno(r)); > } > > -static char *mg_fgets(char *buf, size_t size, struct file *filep, char **p) { > - char *eof; > - size_t len; > - > - if (filep->membuf != NULL && *p != NULL) { > - eof = memchr(*p, '\n', &filep->membuf[filep->size] - *p); > - len = (size_t) (eof - *p) > size - 1 ? size - 1 : (size_t) (eof - *p); > - memcpy(buf, *p, len); > - buf[len] = '\0'; > - *p = eof; > - return eof; > - } else if (filep->fp != NULL) { > - return fgets(buf, size, filep->fp); > - } else { > - return NULL; > - } > +int fs_slfs_fstat(int fd, struct stat *s) { > + struct sl_fd_info *fi = &s_sl_fds[fd]; > + if (fi->fh <= 0) return set_errno(EBADF); > + s->st_mode = 0666; > + s->st_mode = S_IFREG | 0666; > + s->st_nlink = 1; > + s->st_size = fi->size; > + return 0; > } > > -// Authorize against the opened passwords file. Return 1 if authorized. > -static int authorize(struct mg_connection *conn, struct file *filep) { > - struct ah ah; > - char line[256], f_user[256], ha1[256], f_domain[256], buf[MG_BUF_LEN], *p; > - > - if (!parse_auth_header(conn, buf, sizeof(buf), &ah)) { > - return 0; > - } > - > - // Loop over passwords file > - p = (char *) filep->membuf; > - while (mg_fgets(line, sizeof(line), filep, &p) != NULL) { > - if (sscanf(line, "%[^:]:%[^:]:%s", f_user, f_domain, ha1) != 3) { > - continue; > - } > - > - if (!strcmp(ah.user, f_user) && > - !strcmp(conn->ctx->config[AUTHENTICATION_DOMAIN], f_domain)) > - return check_password(conn->request_info.request_method, ha1, ah.uri, > - ah.nonce, ah.nc, ah.cnonce, ah.qop, ah.response); > +off_t fs_slfs_lseek(int fd, off_t offset, int whence) { > + if (s_sl_fds[fd].fh <= 0) return set_errno(EBADF); > + switch (whence) { > + case SEEK_SET: > + s_sl_fds[fd].pos = offset; > + break; > + case SEEK_CUR: > + s_sl_fds[fd].pos += offset; > + break; > + case SEEK_END: > + return set_errno(ENOTSUP); > } > - > return 0; > } > > -// Return 1 if request is authorised, 0 otherwise. > -static int check_authorization(struct mg_connection *conn, const char *path) { > - char fname[PATH_MAX]; > - struct vec uri_vec, filename_vec; > - const char *list; > - struct file file = STRUCT_FILE_INITIALIZER; > - int authorized = 1; > +int fs_slfs_unlink(const char *pathname) { > + /* > + * Apply path manipulations again, in case we got here directly > + * (via TI libc's "add_device"). > + */ > + pathname = drop_dir(pathname, NULL); > + return set_errno(sl_fs_to_errno(sl_FsDel((const _u8 *) pathname, 0))); > +} > > - list = conn->ctx->config[PROTECT_URI]; > - while ((list = next_option(list, &uri_vec, &filename_vec)) != NULL) { > - if (!memcmp(conn->request_info.uri, uri_vec.ptr, uri_vec.len)) { > - mg_snprintf(conn, fname, sizeof(fname), "%.*s", > - (int) filename_vec.len, filename_vec.ptr); > - if (!mg_fopen(conn, fname, "r", &file)) { > - cry(conn, "%s: cannot open %s: %s", __func__, fname, strerror(errno)); > - } > +int fs_slfs_rename(const char *from, const char *to) { > + return set_errno(ENOTSUP); > +} > + > +void fs_slfs_set_new_file_size(const char *name, size_t size) { > + int i; > + for (i = 0; i < MAX_OPEN_SLFS_FILES; i++) { > + if (s_sl_file_size_hints[i].name == NULL) { > + DBG(("File size hint: %s %d", name, (int) size)); > + s_sl_file_size_hints[i].name = strdup(name); > + s_sl_file_size_hints[i].size = size; > break; > } > } > +} > > - if (!is_file_opened(&file)) { > - open_auth_file(conn, path, &file); > - } > +#endif /* defined(MG_FS_SLFS) || defined(CC3200_FS_SLFS) */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/simplelink/sl_fs.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > - if (is_file_opened(&file)) { > - authorized = authorize(conn, &file); > - mg_fclose(&file); > - } > +#if MG_NET_IF == MG_NET_IF_SIMPLELINK && \ > + (defined(MG_FS_SLFS) || defined(MG_FS_SPIFFS)) > > - return authorized; > +int set_errno(int e) { > + errno = e; > + return (e == 0 ? 0 : -1); > } > > -static void send_authorization_request(struct mg_connection *conn) { > - conn->status_code = 401; > - mg_printf(conn, > - "HTTP/1.1 401 Unauthorized\r\n" > - "Content-Length: 0\r\n" > - "WWW-Authenticate: Digest qop=\"auth\", " > - "realm=\"%s\", nonce=\"%lu\"\r\n\r\n", > - conn->ctx->config[AUTHENTICATION_DOMAIN], > - (unsigned long) time(NULL)); > +const char *drop_dir(const char *fname, bool *is_slfs) { > + if (is_slfs != NULL) { > + *is_slfs = (strncmp(fname, "SL:", 3) == 0); > + if (*is_slfs) fname += 3; > + } > + /* Drop "./", if any */ > + if (fname[0] == '.' && fname[1] == '/') { > + fname += 2; > + } > + /* > + * Drop / if it is the only one in the path. > + * This allows use of /pretend/directories but serves /file.txt as normal. > + */ > + if (fname[0] == '/' && strchr(fname + 1, '/') == NULL) { > + fname++; > + } > + return fname; > } > > -static int is_authorized_for_put(struct mg_connection *conn) { > - struct file file = STRUCT_FILE_INITIALIZER; > - const char *passfile = conn->ctx->config[PUT_DELETE_PASSWORDS_FILE]; > - int ret = 0; > +#if !defined(MG_FS_NO_VFS) > > - if (passfile != NULL && mg_fopen(conn, passfile, "r", &file)) { > - ret = authorize(conn, &file); > - mg_fclose(&file); > - } > +#include <errno.h> > +#include <stdbool.h> > +#include <stdio.h> > +#include <stdlib.h> > +#include <string.h> > +#ifdef __TI_COMPILER_VERSION__ > +#include <file.h> > +#endif > > - return ret; > -} > +/* Amalgamated: #include "common/cs_dbg.h" */ > +/* Amalgamated: #include "common/platform.h" */ > > -int mg_modify_passwords_file(const char *fname, const char *domain, > - const char *user, const char *pass) { > - int found; > - char line[512], u[512], d[512], ha1[33], tmp[PATH_MAX]; > - FILE *fp, *fp2; > +#ifdef CC3200_FS_SPIFFS > +/* Amalgamated: #include "cc3200_fs_spiffs.h" */ > +#endif > > - found = 0; > - fp = fp2 = NULL; > +#ifdef MG_FS_SLFS > +/* Amalgamated: #include "sl_fs_slfs.h" */ > +#endif > > - // Regard empty password as no password - remove user record. > - if (pass != NULL && pass[0] == '\0') { > - pass = NULL; > +#define NUM_SYS_FDS 3 > +#define SPIFFS_FD_BASE 10 > +#define SLFS_FD_BASE 100 > + > +#if !defined(MG_UART_CHAR_PUT) && !defined(MG_UART_WRITE) > +#if CS_PLATFORM == CS_P_CC3200 > +#include <inc/hw_types.h> > +#include <inc/hw_memmap.h> > +#include <driverlib/rom.h> > +#include <driverlib/rom_map.h> > +#include <driverlib/uart.h> > +#define MG_UART_CHAR_PUT(fd, c) MAP_UARTCharPut(UARTA0_BASE, c); > +#else > +#define MG_UART_WRITE(fd, buf, len) > +#endif /* CS_PLATFORM == CS_P_CC3200 */ > +#endif /* !MG_UART_CHAR_PUT */ > + > +enum fd_type { > + FD_INVALID, > + FD_SYS, > +#ifdef CC3200_FS_SPIFFS > + FD_SPIFFS, > +#endif > +#ifdef MG_FS_SLFS > + FD_SLFS > +#endif > +}; > +static int fd_type(int fd) { > + if (fd >= 0 && fd < NUM_SYS_FDS) return FD_SYS; > +#ifdef CC3200_FS_SPIFFS > + if (fd >= SPIFFS_FD_BASE && fd < SPIFFS_FD_BASE + MAX_OPEN_SPIFFS_FILES) { > + return FD_SPIFFS; > } > +#endif > +#ifdef MG_FS_SLFS > + if (fd >= SLFS_FD_BASE && fd < SLFS_FD_BASE + MAX_OPEN_SLFS_FILES) { > + return FD_SLFS; > + } > +#endif > + return FD_INVALID; > +} > > - (void) snprintf(tmp, sizeof(tmp), "%s.tmp", fname); > +#if MG_TI_NO_HOST_INTERFACE > +int open(const char *pathname, unsigned flags, int mode) { > +#else > +int _open(const char *pathname, int flags, mode_t mode) { > +#endif > + int fd = -1; > + bool is_sl; > + const char *fname = drop_dir(pathname, &is_sl); > + if (is_sl) { > +#ifdef MG_FS_SLFS > + fd = fs_slfs_open(fname, flags, mode); > + if (fd >= 0) fd += SLFS_FD_BASE; > +#endif > + } else { > +#ifdef CC3200_FS_SPIFFS > + fd = fs_spiffs_open(fname, flags, mode); > + if (fd >= 0) fd += SPIFFS_FD_BASE; > +#endif > + } > + LOG(LL_DEBUG, > + ("open(%s, 0x%x) = %d, fname = %s", pathname, flags, fd, fname)); > + return fd; > +} > + > +int _stat(const char *pathname, struct stat *st) { > + int res = -1; > + bool is_sl; > + const char *fname = drop_dir(pathname, &is_sl); > + memset(st, 0, sizeof(*st)); > + /* Simulate statting the root directory. */ > + if (fname[0] == '\0' || strcmp(fname, ".") == 0) { > + st->st_ino = 0; > + st->st_mode = S_IFDIR | 0777; > + st->st_nlink = 1; > + st->st_size = 0; > + return 0; > + } > + if (is_sl) { > +#ifdef MG_FS_SLFS > + res = fs_slfs_stat(fname, st); > +#endif > + } else { > +#ifdef CC3200_FS_SPIFFS > + res = fs_spiffs_stat(fname, st); > +#endif > + } > + LOG(LL_DEBUG, ("stat(%s) = %d; fname = %s", pathname, res, fname)); > + return res; > +} > > - // Create the file if does not exist > - if ((fp = fopen(fname, "a+")) != NULL) { > - (void) fclose(fp); > +#if MG_TI_NO_HOST_INTERFACE > +int close(int fd) { > +#else > +int _close(int fd) { > +#endif > + int r = -1; > + switch (fd_type(fd)) { > + case FD_INVALID: > + r = set_errno(EBADF); > + break; > + case FD_SYS: > + r = set_errno(EACCES); > + break; > +#ifdef CC3200_FS_SPIFFS > + case FD_SPIFFS: > + r = fs_spiffs_close(fd - SPIFFS_FD_BASE); > + break; > +#endif > +#ifdef MG_FS_SLFS > + case FD_SLFS: > + r = fs_slfs_close(fd - SLFS_FD_BASE); > + break; > +#endif > } > + DBG(("close(%d) = %d", fd, r)); > + return r; > +} > > - // Open the given file and temporary file > - if ((fp = fopen(fname, "r")) == NULL) { > - return 0; > - } else if ((fp2 = fopen(tmp, "w+")) == NULL) { > - fclose(fp); > - return 0; > +#if MG_TI_NO_HOST_INTERFACE > +off_t lseek(int fd, off_t offset, int whence) { > +#else > +off_t _lseek(int fd, off_t offset, int whence) { > +#endif > + int r = -1; > + switch (fd_type(fd)) { > + case FD_INVALID: > + r = set_errno(EBADF); > + break; > + case FD_SYS: > + r = set_errno(ESPIPE); > + break; > +#ifdef CC3200_FS_SPIFFS > + case FD_SPIFFS: > + r = fs_spiffs_lseek(fd - SPIFFS_FD_BASE, offset, whence); > + break; > +#endif > +#ifdef MG_FS_SLFS > + case FD_SLFS: > + r = fs_slfs_lseek(fd - SLFS_FD_BASE, offset, whence); > + break; > +#endif > } > + DBG(("lseek(%d, %d, %d) = %d", fd, (int) offset, whence, r)); > + return r; > +} > > - // Copy the stuff to temporary file > - while (fgets(line, sizeof(line), fp) != NULL) { > - if (sscanf(line, "%[^:]:%[^:]:%*s", u, d) != 2) { > - continue; > +int _fstat(int fd, struct stat *s) { > + int r = -1; > + memset(s, 0, sizeof(*s)); > + switch (fd_type(fd)) { > + case FD_INVALID: > + r = set_errno(EBADF); > + break; > + case FD_SYS: { > + /* Create barely passable stats for STD{IN,OUT,ERR}. */ > + memset(s, 0, sizeof(*s)); > + s->st_ino = fd; > + s->st_mode = S_IFCHR | 0666; > + r = 0; > + break; > } > +#ifdef CC3200_FS_SPIFFS > + case FD_SPIFFS: > + r = fs_spiffs_fstat(fd - SPIFFS_FD_BASE, s); > + break; > +#endif > +#ifdef MG_FS_SLFS > + case FD_SLFS: > + r = fs_slfs_fstat(fd - SLFS_FD_BASE, s); > + break; > +#endif > + } > + DBG(("fstat(%d) = %d", fd, r)); > + return r; > +} > > - if (!strcmp(u, user) && !strcmp(d, domain)) { > - found++; > - if (pass != NULL) { > - mg_md5(ha1, user, ":", domain, ":", pass, NULL); > - fprintf(fp2, "%s:%s:%s\n", user, domain, ha1); > +#if MG_TI_NO_HOST_INTERFACE > +int read(int fd, char *buf, unsigned count) { > +#else > +ssize_t _read(int fd, void *buf, size_t count) { > +#endif > + int r = -1; > + switch (fd_type(fd)) { > + case FD_INVALID: > + r = set_errno(EBADF); > + break; > + case FD_SYS: { > + if (fd != 0) { > + r = set_errno(EACCES); > + break; > } > - } else { > - fprintf(fp2, "%s", line); > + /* Should we allow reading from stdin = uart? */ > + r = set_errno(ENOTSUP); > + break; > } > +#ifdef CC3200_FS_SPIFFS > + case FD_SPIFFS: > + r = fs_spiffs_read(fd - SPIFFS_FD_BASE, buf, count); > + break; > +#endif > +#ifdef MG_FS_SLFS > + case FD_SLFS: > + r = fs_slfs_read(fd - SLFS_FD_BASE, buf, count); > + break; > +#endif > } > - > - // If new user, just add it > - if (!found && pass != NULL) { > - mg_md5(ha1, user, ":", domain, ":", pass, NULL); > - fprintf(fp2, "%s:%s:%s\n", user, domain, ha1); > - } > - > - // Close files > - fclose(fp); > - fclose(fp2); > - > - // Put the temp file in place of real file > - remove(fname); > - rename(tmp, fname); > - > - return 1; > + DBG(("read(%d, %u) = %d", fd, count, r)); > + return r; > } > > -struct de { > - struct mg_connection *conn; > - char *file_name; > - struct file file; > -}; > - > -static void url_encode(const char *src, char *dst, size_t dst_len) { > - static const char *dont_escape = "._-$,;~()"; > - static const char *hex = "0123456789abcdef"; > - const char *end = dst + dst_len - 1; > - > - for (; *src != '\0' && dst < end; src++, dst++) { > - if (isalnum(*(const unsigned char *) src) || > - strchr(dont_escape, * (const unsigned char *) src) != NULL) { > - *dst = *src; > - } else if (dst + 2 < end) { > - dst[0] = '%'; > - dst[1] = hex[(* (const unsigned char *) src) >> 4]; > - dst[2] = hex[(* (const unsigned char *) src) & 0xf]; > - dst += 2; > +#if MG_TI_NO_HOST_INTERFACE > +int write(int fd, const char *buf, unsigned count) { > +#else > +ssize_t _write(int fd, const void *buf, size_t count) { > +#endif > + int r = -1; > + switch (fd_type(fd)) { > + case FD_INVALID: > + r = set_errno(EBADF); > + break; > + case FD_SYS: { > + if (fd == 0) { > + r = set_errno(EACCES); > + break; > + } > +#ifdef MG_UART_WRITE > + MG_UART_WRITE(fd, buf, count); > +#elif defined(MG_UART_CHAR_PUT) > + { > + size_t i; > + for (i = 0; i < count; i++) { > + const char c = ((const char *) buf)[i]; > + if (c == '\n') MG_UART_CHAR_PUT(fd, '\r'); > + MG_UART_CHAR_PUT(fd, c); > + } > + } > +#endif > + r = count; > + break; > } > +#ifdef CC3200_FS_SPIFFS > + case FD_SPIFFS: > + r = fs_spiffs_write(fd - SPIFFS_FD_BASE, buf, count); > + break; > +#endif > +#ifdef MG_FS_SLFS > + case FD_SLFS: > + r = fs_slfs_write(fd - SLFS_FD_BASE, buf, count); > + break; > +#endif > } > - > - *dst = '\0'; > + return r; > +} > + > +/* > + * On Newlib we override rename directly too, because the default > + * implementation using _link and _unlink doesn't work for us. > + */ > +#if MG_TI_NO_HOST_INTERFACE || defined(_NEWLIB_VERSION) > +int rename(const char *frompath, const char *topath) { > + int r = -1; > + bool is_sl_from, is_sl_to; > + const char *from = drop_dir(frompath, &is_sl_from); > + const char *to = drop_dir(topath, &is_sl_to); > + if (is_sl_from || is_sl_to) { > + set_errno(ENOTSUP); > + } else { > +#ifdef CC3200_FS_SPIFFS > + r = fs_spiffs_rename(from, to); > +#endif > + } > + DBG(("rename(%s, %s) = %d", from, to, r)); > + return r; > } > +#endif /* MG_TI_NO_HOST_INTERFACE || defined(_NEWLIB_VERSION) */ > > -static void print_dir_entry(struct de *de) { > - char size[64], mod[64], href[PATH_MAX]; > - > - if (de->file.is_directory) { > - mg_snprintf(de->conn, size, sizeof(size), "%s", "[DIRECTORY]"); > +#if MG_TI_NO_HOST_INTERFACE > +int unlink(const char *pathname) { > +#else > +int _unlink(const char *pathname) { > +#endif > + int r = -1; > + bool is_sl; > + const char *fname = drop_dir(pathname, &is_sl); > + if (is_sl) { > +#ifdef MG_FS_SLFS > + r = fs_slfs_unlink(fname); > +#endif > } else { > - // We use (signed) cast below because MSVC 6 compiler cannot > - // convert unsigned __int64 to double. Sigh. > - if (de->file.size < 1024) { > - mg_snprintf(de->conn, size, sizeof(size), "%d", (int) de->file.size); > - } else if (de->file.size < 0x100000) { > - mg_snprintf(de->conn, size, sizeof(size), > - "%.1fk", (double) de->file.size / 1024.0); > - } else if (de->file.size < 0x40000000) { > - mg_snprintf(de->conn, size, sizeof(size), > - "%.1fM", (double) de->file.size / 1048576); > - } else { > - mg_snprintf(de->conn, size, sizeof(size), > - "%.1fG", (double) de->file.size / 1073741824); > - } > +#ifdef CC3200_FS_SPIFFS > + r = fs_spiffs_unlink(fname); > +#endif > } > - strftime(mod, sizeof(mod), "%d-%b-%Y %H:%M", > - localtime(&de->file.modification_time)); > - url_encode(de->file_name, href, sizeof(href)); > - de->conn->num_bytes_sent += mg_printf(de->conn, > - "<tr><td><a href=\"%s%s%s\">%s%s</a></td>" > - "<td> %s</td><td> %s</td></tr>\n", > - de->conn->request_info.uri, href, de->file.is_directory ? "/" : "", > - de->file_name, de->file.is_directory ? "/" : "", mod, size); > + DBG(("unlink(%s) = %d, fname = %s", pathname, r, fname)); > + return r; > } > > -// This function is called from send_directory() and used for > -// sorting directory entries by size, or name, or modification time. > -// On windows, __cdecl specification is needed in case if project is built > -// with __stdcall convention. qsort always requires __cdels callback. > -static int WINCDECL compare_dir_entries(const void *p1, const void *p2) { > - const struct de *a = (const struct de *) p1, *b = (const struct de *) p2; > - const char *query_string = a->conn->request_info.query_string; > - int cmp_result = 0; > - > - if (query_string == NULL) { > - query_string = "na"; > +#ifdef CC3200_FS_SPIFFS /* FailFS does not support listing files. */ > +DIR *opendir(const char *dir_name) { > + DIR *r = NULL; > + bool is_sl; > + drop_dir(dir_name, &is_sl); > + if (is_sl) { > + r = NULL; > + set_errno(ENOTSUP); > + } else { > + r = fs_spiffs_opendir(dir_name); > } > + DBG(("opendir(%s) = %p", dir_name, r)); > + return r; > +} > > - if (a->file.is_directory && !b->file.is_directory) { > - return -1; // Always put directories on top > - } else if (!a->file.is_directory && b->file.is_directory) { > - return 1; // Always put directories on top > - } else if (*query_string == 'n') { > - cmp_result = strcmp(a->file_name, b->file_name); > - } else if (*query_string == 's') { > - cmp_result = a->file.size == b->file.size ? 0 : > - a->file.size > b->file.size ? 1 : -1; > - } else if (*query_string == 'd') { > - cmp_result = a->file.modification_time == b->file.modification_time ? 0 : > - a->file.modification_time > b->file.modification_time ? 1 : -1; > - } > +struct dirent *readdir(DIR *dir) { > + struct dirent *res = fs_spiffs_readdir(dir); > + DBG(("readdir(%p) = %p", dir, res)); > + return res; > +} > > - return query_string[1] == 'd' ? -cmp_result : cmp_result; > +int closedir(DIR *dir) { > + int res = fs_spiffs_closedir(dir); > + DBG(("closedir(%p) = %d", dir, res)); > + return res; > } > > -static int must_hide_file(struct mg_connection *conn, const char *path) { > - const char *pw_pattern = "**" PASSWORDS_FILE_NAME "$"; > - const char *pattern = conn->ctx->config[HIDE_FILES]; > - return match_prefix(pw_pattern, strlen(pw_pattern), path) > 0 || > - (pattern != NULL && match_prefix(pattern, strlen(pattern), path) > 0); > +int rmdir(const char *path) { > + return fs_spiffs_rmdir(path); > } > > -static int scan_directory(struct mg_connection *conn, const char *dir, > - void *data, void (*cb)(struct de *, void *)) { > - char path[PATH_MAX]; > - struct dirent *dp; > - DIR *dirp; > - struct de de; > +int mkdir(const char *path, mode_t mode) { > + (void) path; > + (void) mode; > + /* for spiffs supports only root dir, which comes from mongoose as '.' */ > + return (strlen(path) == 1 && *path == '.') ? 0 : ENOTDIR; > +} > +#endif > > - if ((dirp = opendir(dir)) == NULL) { > - return 0; > - } else { > - de.conn = conn; > +int sl_fs_init(void) { > + int ret = 1; > +#ifdef __TI_COMPILER_VERSION__ > +#ifdef MG_FS_SLFS > +#pragma diag_push > +#pragma diag_suppress 169 /* Nothing we can do about the prototype mismatch. \ > + */ > + ret = (add_device("SL", _MSA, fs_slfs_open, fs_slfs_close, fs_slfs_read, > + fs_slfs_write, fs_slfs_lseek, fs_slfs_unlink, > + fs_slfs_rename) == 0); > +#pragma diag_pop > +#endif > +#endif > + return ret; > +} > > - while ((dp = readdir(dirp)) != NULL) { > - // Do not show current dir and hidden files > - if (!strcmp(dp->d_name, ".") || > - !strcmp(dp->d_name, "..") || > - must_hide_file(conn, dp->d_name)) { > - continue; > - } > +#endif /* !defined(MG_FS_NO_VFS) */ > +#endif /* MG_NET_IF == MG_NET_IF_SIMPLELINK && (defined(MG_FS_SLFS) || \ > + defined(MG_FS_SPIFFS)) */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/simplelink/sl_socket.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > - mg_snprintf(conn, path, sizeof(path), "%s%c%s", dir, '/', dp->d_name); > +#if MG_NET_IF == MG_NET_IF_SIMPLELINK > > - // If we don't memset stat structure to zero, mtime will have > - // garbage and strftime() will segfault later on in > - // print_dir_entry(). memset is required only if mg_stat() > - // fails. For more details, see > - // http://code.google.com/p/mongoose/issues/detail?id=79 > - memset(&de.file, 0, sizeof(de.file)); > - mg_stat(conn, path, &de.file); > +#include <errno.h> > +#include <stdio.h> > > - de.file_name = dp->d_name; > - cb(&de, data); > - } > - (void) closedir(dirp); > +/* Amalgamated: #include "common/platform.h" */ > + > +const char *inet_ntop(int af, const void *src, char *dst, socklen_t size) { > + int res; > + struct in_addr *in = (struct in_addr *) src; > + if (af != AF_INET) { > + errno = ENOTSUP; > + return NULL; > } > - return 1; > + res = snprintf(dst, size, "%lu.%lu.%lu.%lu", SL_IPV4_BYTE(in->s_addr, 0), > + SL_IPV4_BYTE(in->s_addr, 1), SL_IPV4_BYTE(in->s_addr, 2), > + SL_IPV4_BYTE(in->s_addr, 3)); > + return res > 0 ? dst : NULL; > } > > -struct dir_scan_data { > - struct de *entries; > - int num_entries; > - int arr_size; > -}; > - > -static void dir_scan_callback(struct de *de, void *data) { > - struct dir_scan_data *dsd = (struct dir_scan_data *) data; > +char *inet_ntoa(struct in_addr n) { > + static char a[16]; > + return (char *) inet_ntop(AF_INET, &n, a, sizeof(a)); > +} > > - if (dsd->entries == NULL || dsd->num_entries >= dsd->arr_size) { > - dsd->arr_size *= 2; > - dsd->entries = (struct de *) realloc(dsd->entries, dsd->arr_size * > - sizeof(dsd->entries[0])); > +int inet_pton(int af, const char *src, void *dst) { > + uint32_t a0, a1, a2, a3; > + uint8_t *db = (uint8_t *) dst; > + if (af != AF_INET) { > + errno = ENOTSUP; > + return 0; > } > - if (dsd->entries == NULL) { > - // TODO(lsm): propagate an error to the caller > - dsd->num_entries = 0; > - } else { > - dsd->entries[dsd->num_entries].file_name = mg_strdup(de->file_name); > - dsd->entries[dsd->num_entries].file = de->file; > - dsd->entries[dsd->num_entries].conn = de->conn; > - dsd->num_entries++; > + if (sscanf(src, "%lu.%lu.%lu.%lu", &a0, &a1, &a2, &a3) != 4) { > + return 0; > } > + *db = a3; > + *(db + 1) = a2; > + *(db + 2) = a1; > + *(db + 3) = a0; > + return 1; > } > > -static void handle_directory_request(struct mg_connection *conn, > - const char *dir) { > - int i, sort_direction; > - struct dir_scan_data data = { NULL, 0, 128 }; > +#endif /* MG_NET_IF == MG_NET_IF_SIMPLELINK */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/simplelink/sl_mg_task.c" > +#endif > +#if MG_NET_IF == MG_NET_IF_SIMPLELINK && !defined(MG_SIMPLELINK_NO_OSI) > > - if (!scan_directory(conn, dir, &data, dir_scan_callback)) { > - send_http_error(conn, 500, "Cannot open directory", > - "Error: opendir(%s): %s", dir, strerror(ERRNO)); > - return; > - } > +/* Amalgamated: #include "mg_task.h" */ > > - sort_direction = conn->request_info.query_string != NULL && > - conn->request_info.query_string[1] == 'd' ? 'a' : 'd'; > - > - conn->must_close = 1; > - mg_printf(conn, "%s", > - "HTTP/1.1 200 OK\r\n" > - "Connection: close\r\n" > - "Content-Type: text/html; charset=utf-8\r\n\r\n"); > - > - conn->num_bytes_sent += mg_printf(conn, > - "<html><head><title>Index of %s</title>" > - "<style>th {text-align: left;}</style></head>" > - "<body><h1>Index of %s</h1><pre><table cellpadding=\"0\">" > - "<tr><th><a href=\"?n%c\">Name</a></th>" > - "<th><a href=\"?d%c\">Modified</a></th>" > - "<th><a href=\"?s%c\">Size</a></th></tr>" > - "<tr><td colspan=\"3\"><hr></td></tr>", > - conn->request_info.uri, conn->request_info.uri, > - sort_direction, sort_direction, sort_direction); > - > - // Print first entry - link to a parent directory > - conn->num_bytes_sent += mg_printf(conn, > - "<tr><td><a href=\"%s%s\">%s</a></td>" > - "<td> %s</td><td> %s</td></tr>\n", > - conn->request_info.uri, "..", "Parent directory", "-", "-"); > - > - // Sort and print directory entries > - qsort(data.entries, (size_t) data.num_entries, sizeof(data.entries[0]), > - compare_dir_entries); > - for (i = 0; i < data.num_entries; i++) { > - print_dir_entry(&data.entries[i]); > - free(data.entries[i].file_name); > - } > - free(data.entries); > - > - conn->num_bytes_sent += mg_printf(conn, "%s", "</table></body></html>"); > - conn->status_code = 200; > -} > - > -// Send len bytes from the opened file to the client. > -static void send_file_data(struct mg_connection *conn, struct file *filep, > - int64_t offset, int64_t len) { > - char buf[MG_BUF_LEN]; > - int to_read, num_read, num_written; > - > - if (len > 0 && filep->membuf != NULL && filep->size > 0) { > - if (len > filep->size - offset) { > - len = filep->size - offset; > - } > - mg_write(conn, filep->membuf + offset, (size_t) len); > - } else if (len > 0 && filep->fp != NULL) { > - fseeko(filep->fp, offset, SEEK_SET); > - while (len > 0) { > - // Calculate how much to read from the file in the buffer > - to_read = sizeof(buf); > - if ((int64_t) to_read > len) { > - to_read = (int) len; > - } > - > - // Read from file, exit the loop on error > - if ((num_read = fread(buf, 1, (size_t) to_read, filep->fp)) <= 0) { > - break; > - } > +#include <oslib/osi.h> > > - // Send read bytes to the client, exit the loop on error > - if ((num_written = mg_write(conn, buf, (size_t) num_read)) != num_read) { > - break; > +enum mg_q_msg_type { > + MG_Q_MSG_CB, > +}; > +struct mg_q_msg { > + enum mg_q_msg_type type; > + void (*cb)(struct mg_mgr *mgr, void *arg); > + void *arg; > +}; > +static OsiMsgQ_t s_mg_q; > +static void mg_task(void *arg); > + > +bool mg_start_task(int priority, int stack_size, mg_init_cb mg_init) { > + if (osi_MsgQCreate(&s_mg_q, "MG", sizeof(struct mg_q_msg), 16) != OSI_OK) { > + return false; > + } > + if (osi_TaskCreate(mg_task, (const signed char *) "MG", stack_size, > + (void *) mg_init, priority, NULL) != OSI_OK) { > + return false; > + } > + return true; > +} > + > +static void mg_task(void *arg) { > + struct mg_mgr mgr; > + mg_init_cb mg_init = (mg_init_cb) arg; > + mg_mgr_init(&mgr, NULL); > + mg_init(&mgr); > + while (1) { > + struct mg_q_msg msg; > + mg_mgr_poll(&mgr, 1); > + if (osi_MsgQRead(&s_mg_q, &msg, 1) != OSI_OK) continue; > + switch (msg.type) { > + case MG_Q_MSG_CB: { > + msg.cb(&mgr, msg.arg); > } > - > - // Both read and were successful, adjust counters > - conn->num_bytes_sent += num_written; > - len -= num_written; > } > } > } > > -static int parse_range_header(const char *header, int64_t *a, int64_t *b) { > - return sscanf(header, "bytes=%" INT64_FMT "-%" INT64_FMT, a, b); > +void mg_run_in_task(void (*cb)(struct mg_mgr *mgr, void *arg), void *cb_arg) { > + struct mg_q_msg msg = {MG_Q_MSG_CB, cb, cb_arg}; > + osi_MsgQWrite(&s_mg_q, &msg, OSI_NO_WAIT); > } > > -static void gmt_time_string(char *buf, size_t buf_len, time_t *t) { > - strftime(buf, buf_len, "%a, %d %b %Y %H:%M:%S GMT", gmtime(t)); > -} > +#endif /* MG_NET_IF == MG_NET_IF_SIMPLELINK && !defined(MG_SIMPLELINK_NO_OSI) \ > + */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/simplelink/sl_net_if.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_SIMPLELINK_SL_NET_IF_H_ > +#define CS_COMMON_PLATFORMS_SIMPLELINK_SL_NET_IF_H_ > + > +/* Amalgamated: #include "mongoose/src/net_if.h" */ > > -static void construct_etag(char *buf, size_t buf_len, > - const struct file *filep) { > - snprintf(buf, buf_len, "\"%lx.%" INT64_FMT "\"", > - (unsigned long) filep->modification_time, filep->size); > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +#ifndef MG_ENABLE_NET_IF_SIMPLELINK > +#define MG_ENABLE_NET_IF_SIMPLELINK MG_NET_IF == MG_NET_IF_SIMPLELINK > +#endif > + > +extern const struct mg_iface_vtable mg_simplelink_iface_vtable; > + > +#ifdef __cplusplus > } > +#endif /* __cplusplus */ > > -static void fclose_on_exec(struct file *filep) { > - if (filep != NULL && filep->fp != NULL) { > -#ifndef _WIN32 > - fcntl(fileno(filep->fp), F_SETFD, FD_CLOEXEC); > +#endif /* CS_COMMON_PLATFORMS_SIMPLELINK_SL_NET_IF_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/simplelink/sl_net_if.c" > #endif > - } > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +/* Amalgamated: #include "common/platforms/simplelink/sl_net_if.h" */ > + > +#if MG_ENABLE_NET_IF_SIMPLELINK > + > +/* Amalgamated: #include "mongoose/src/internal.h" */ > +/* Amalgamated: #include "mongoose/src/util.h" */ > + > +#define MG_TCP_RECV_BUFFER_SIZE 1024 > +#define MG_UDP_RECV_BUFFER_SIZE 1500 > + > +static sock_t mg_open_listening_socket(struct mg_connection *nc, > + union socket_address *sa, int type, > + int proto); > + > +void mg_set_non_blocking_mode(sock_t sock) { > + SlSockNonblocking_t opt; > +#if SL_MAJOR_VERSION_NUM < 2 > + opt.NonblockingEnabled = 1; > +#else > + opt.NonBlockingEnabled = 1; > +#endif > + sl_SetSockOpt(sock, SL_SOL_SOCKET, SL_SO_NONBLOCKING, &opt, sizeof(opt)); > } > > -static void handle_file_request(struct mg_connection *conn, const char *path, > - struct file *filep) { > - char date[64], lm[64], etag[64], range[64]; > - const char *msg = "OK", *hdr; > - time_t curtime = time(NULL); > - int64_t cl, r1, r2; > - struct vec mime_vec; > - int n; > +static int mg_is_error(int n) { > + return (n < 0 && n != SL_ERROR_BSD_EALREADY && n != SL_ERROR_BSD_EAGAIN); > +} > > - get_mime_type(conn->ctx, path, &mime_vec); > - cl = filep->size; > - conn->status_code = 200; > - range[0] = '\0'; > +void mg_sl_if_connect_tcp(struct mg_connection *nc, > + const union socket_address *sa) { > + int proto = 0; > + if (nc->flags & MG_F_SSL) proto = SL_SEC_SOCKET; > + sock_t sock = sl_Socket(AF_INET, SOCK_STREAM, proto); > + if (sock < 0) { > + nc->err = sock; > + goto out; > + } > + mg_sock_set(nc, sock); > +#if MG_ENABLE_SSL > + nc->err = sl_set_ssl_opts(sock, nc); > + if (nc->err != 0) goto out; > +#endif > + nc->err = sl_Connect(sock, &sa->sa, sizeof(sa->sin)); > +out: > + DBG(("%p to %s:%d sock %d %d err %d", nc, inet_ntoa(sa->sin.sin_addr), > + ntohs(sa->sin.sin_port), nc->sock, proto, nc->err)); > +} > > - if (!mg_fopen(conn, path, "rb", filep)) { > - send_http_error(conn, 500, http_500_error, > - "fopen(%s): %s", path, strerror(ERRNO)); > +void mg_sl_if_connect_udp(struct mg_connection *nc) { > + sock_t sock = sl_Socket(AF_INET, SOCK_DGRAM, 0); > + if (sock < 0) { > + nc->err = sock; > return; > } > - fclose_on_exec(filep); > - > - // If Range: header specified, act accordingly > - r1 = r2 = 0; > - hdr = mg_get_header(conn, "Range"); > - if (hdr != NULL && (n = parse_range_header(hdr, &r1, &r2)) > 0 && > - r1 >= 0 && r2 >= 0) { > - conn->status_code = 206; > - cl = n == 2 ? (r2 > cl ? cl : r2) - r1 + 1: cl - r1; > - mg_snprintf(conn, range, sizeof(range), > - "Content-Range: bytes " > - "%" INT64_FMT "-%" > - INT64_FMT "/%" INT64_FMT "\r\n", > - r1, r1 + cl - 1, filep->size); > - msg = "Partial Content"; > - } > - > - // Prepare Etag, Date, Last-Modified headers. Must be in UTC, according to > - // http://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html#sec3.3 > - gmt_time_string(date, sizeof(date), &curtime); > - gmt_time_string(lm, sizeof(lm), &filep->modification_time); > - construct_etag(etag, sizeof(etag), filep); > - > - (void) mg_printf(conn, > - "HTTP/1.1 %d %s\r\n" > - "Date: %s\r\n" > - "Last-Modified: %s\r\n" > - "Etag: %s\r\n" > - "Content-Type: %.*s\r\n" > - "Content-Length: %" INT64_FMT "\r\n" > - "Connection: %s\r\n" > - "Accept-Ranges: bytes\r\n" > - "%s\r\n", > - conn->status_code, msg, date, lm, etag, (int) mime_vec.len, > - mime_vec.ptr, cl, suggest_connection_header(conn), range); > - > - if (strcmp(conn->request_info.request_method, "HEAD") != 0) { > - send_file_data(conn, filep, r1, cl); > - } > - mg_fclose(filep); > -} > - > -void mg_send_file(struct mg_connection *conn, const char *path) { > - struct file file = STRUCT_FILE_INITIALIZER; > - if (mg_stat(conn, path, &file)) { > - handle_file_request(conn, path, &file); > - } else { > - send_http_error(conn, 404, "Not Found", "%s", "File not found"); > - } > + mg_sock_set(nc, sock); > + nc->err = 0; > } > > +int mg_sl_if_listen_tcp(struct mg_connection *nc, union socket_address *sa) { > + int proto = 0; > + if (nc->flags & MG_F_SSL) proto = SL_SEC_SOCKET; > + sock_t sock = mg_open_listening_socket(nc, sa, SOCK_STREAM, proto); > + if (sock < 0) return sock; > + mg_sock_set(nc, sock); > + return 0; > +} > > -// Parse HTTP headers from the given buffer, advance buffer to the point > -// where parsing stopped. > -static void parse_http_headers(char **buf, struct mg_request_info *ri) { > - int i; > +int mg_sl_if_listen_udp(struct mg_connection *nc, union socket_address *sa) { > + sock_t sock = mg_open_listening_socket(nc, sa, SOCK_DGRAM, 0); > + if (sock == INVALID_SOCKET) return (errno ? errno : 1); > + mg_sock_set(nc, sock); > + return 0; > +} > > - for (i = 0; i < (int) ARRAY_SIZE(ri->http_headers); i++) { > - ri->http_headers[i].name = skip_quoted(buf, ":", " ", 0); > - ri->http_headers[i].value = skip(buf, "\r\n"); > - if (ri->http_headers[i].name[0] == '\0') > - break; > - ri->num_headers = i + 1; > - } > +void mg_sl_if_tcp_send(struct mg_connection *nc, const void *buf, size_t len) { > + mbuf_append(&nc->send_mbuf, buf, len); > } > > -static int is_valid_http_method(const char *method) { > - return !strcmp(method, "GET") || !strcmp(method, "POST") || > - !strcmp(method, "HEAD") || !strcmp(method, "CONNECT") || > - !strcmp(method, "PUT") || !strcmp(method, "DELETE") || > - !strcmp(method, "OPTIONS") || !strcmp(method, "PROPFIND"); > +void mg_sl_if_udp_send(struct mg_connection *nc, const void *buf, size_t len) { > + mbuf_append(&nc->send_mbuf, buf, len); > } > > -// Parse HTTP request, fill in mg_request_info structure. > -// This function modifies the buffer by NUL-terminating > -// HTTP request components, header names and header values. > -static int parse_http_message(char *buf, int len, struct mg_request_info *ri) { > - int is_request, request_length = get_request_len(buf, len); > - if (request_length > 0) { > - // Reset attributes. DO NOT TOUCH is_ssl, remote_ip, remote_port > - ri->remote_user = ri->request_method = ri->uri = ri->http_version = NULL; > - ri->num_headers = 0; > +void mg_sl_if_recved(struct mg_connection *nc, size_t len) { > + (void) nc; > + (void) len; > +} > > - buf[request_length - 1] = '\0'; > +int mg_sl_if_create_conn(struct mg_connection *nc) { > + (void) nc; > + return 1; > +} > > - // RFC says that all initial whitespaces should be ingored > - while (*buf != '\0' && isspace(* (unsigned char *) buf)) { > - buf++; > - } > - ri->request_method = skip(&buf, " "); > - ri->uri = skip(&buf, " "); > - ri->http_version = skip(&buf, "\r\n"); > - if (((is_request = is_valid_http_method(ri->request_method)) && > - memcmp(ri->http_version, "HTTP/", 5) != 0) || > - (!is_request && memcmp(ri->request_method, "HTTP/", 5)) != 0) { > - request_length = -1; > - } else { > - if (is_request) { > - ri->http_version += 5; > - } > - parse_http_headers(&buf, ri); > - } > +void mg_sl_if_destroy_conn(struct mg_connection *nc) { > + if (nc->sock == INVALID_SOCKET) return; > + /* For UDP, only close outgoing sockets or listeners. */ > + if (!(nc->flags & MG_F_UDP) || nc->listener == NULL) { > + sl_Close(nc->sock); > } > - return request_length; > + nc->sock = INVALID_SOCKET; > } > > -// Keep reading the input (either opened file descriptor fd, or socket sock, > -// or SSL descriptor ssl) into buffer buf, until \r\n\r\n appears in the > -// buffer (which marks the end of HTTP request). Buffer buf may already > -// have some data. The length of the data is stored in nread. > -// Upon every read operation, increase nread by the number of bytes read. > -static int read_request(FILE *fp, struct mg_connection *conn, > - char *buf, int bufsiz, int *nread) { > - int request_len, n = 0; > - > - request_len = get_request_len(buf, *nread); > - while (*nread < bufsiz && request_len == 0 && > - (n = pull(fp, conn, buf + *nread, bufsiz - *nread)) > 0) { > - *nread += n; > - assert(*nread <= bufsiz); > - request_len = get_request_len(buf, *nread); > +static int mg_accept_conn(struct mg_connection *lc) { > + struct mg_connection *nc; > + union socket_address sa; > + socklen_t sa_len = sizeof(sa); > + sock_t sock = sl_Accept(lc->sock, &sa.sa, &sa_len); > + if (sock < 0) { > + DBG(("%p: failed to accept: %d", lc, sock)); > + return 0; > } > - > - return request_len <= 0 && n <= 0 ? -1 : request_len; > + nc = mg_if_accept_new_conn(lc); > + if (nc == NULL) { > + sl_Close(sock); > + return 0; > + } > + DBG(("%p conn from %s:%d", nc, inet_ntoa(sa.sin.sin_addr), > + ntohs(sa.sin.sin_port))); > + mg_sock_set(nc, sock); > + if (nc->flags & MG_F_SSL) nc->flags |= MG_F_SSL_HANDSHAKE_DONE; > + mg_if_accept_tcp_cb(nc, &sa, sa_len); > + return 1; > } > > -// For given directory path, substitute it to valid index file. > -// Return 0 if index file has been found, -1 if not found. > -// If the file is found, it's stats is returned in stp. > -static int substitute_index_file(struct mg_connection *conn, char *path, > - size_t path_len, struct file *filep) { > - const char *list = conn->ctx->config[INDEX_FILES]; > - struct file file = STRUCT_FILE_INITIALIZER; > - struct vec filename_vec; > - size_t n = strlen(path); > - int found = 0; > - > - // The 'path' given to us points to the directory. Remove all trailing > - // directory separator characters from the end of the path, and > - // then append single directory separator character. > - while (n > 0 && path[n - 1] == '/') { > - n--; > +/* 'sa' must be an initialized address to bind to */ > +static sock_t mg_open_listening_socket(struct mg_connection *nc, > + union socket_address *sa, int type, > + int proto) { > + int r; > + socklen_t sa_len = > + (sa->sa.sa_family == AF_INET) ? sizeof(sa->sin) : sizeof(sa->sin6); > + sock_t sock = sl_Socket(sa->sa.sa_family, type, proto); > + if (sock < 0) return sock; > + if ((r = sl_Bind(sock, &sa->sa, sa_len)) < 0) goto clean; > + if (type != SOCK_DGRAM) { > +#if MG_ENABLE_SSL > + if ((r = sl_set_ssl_opts(sock, nc)) < 0) goto clean; > +#endif > + if ((r = sl_Listen(sock, SOMAXCONN)) < 0) goto clean; > } > - path[n] = '/'; > - > - // Traverse index files list. For each entry, append it to the given > - // path and see if the file exists. If it exists, break the loop > - while ((list = next_option(list, &filename_vec, NULL)) != NULL) { > - > - // Ignore too long entries that may overflow path buffer > - if (filename_vec.len > path_len - (n + 2)) > - continue; > + mg_set_non_blocking_mode(sock); > +clean: > + if (r < 0) { > + sl_Close(sock); > + sock = r; > + } > + return sock; > +} > > - // Prepare full path to the index file > - mg_strlcpy(path + n + 1, filename_vec.ptr, filename_vec.len + 1); > +static void mg_write_to_socket(struct mg_connection *nc) { > + struct mbuf *io = &nc->send_mbuf; > + int n = 0; > > - // Does it exist? > - if (mg_stat(conn, path, &file)) { > - // Yes it does, break the loop > - *filep = file; > - found = 1; > - break; > - } > + if (nc->flags & MG_F_UDP) { > + n = sl_SendTo(nc->sock, io->buf, io->len, 0, &nc->sa.sa, > + sizeof(nc->sa.sin)); > + DBG(("%p %d %d %d %s:%hu", nc, nc->sock, n, errno, > + inet_ntoa(nc->sa.sin.sin_addr), ntohs(nc->sa.sin.sin_port))); > + } else { > + n = (int) sl_Send(nc->sock, io->buf, io->len, 0); > + DBG(("%p %d bytes -> %d", nc, n, nc->sock)); > } > > - // If no index file exists, restore directory path > - if (!found) { > - path[n] = '\0'; > + if (n > 0) { > + mg_if_sent_cb(nc, n); > + } else if (n < 0 && mg_is_error(n)) { > + /* Something went wrong, drop the connection. */ > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > } > - > - return found; > } > > -// Return True if we should reply 304 Not Modified. > -static int is_not_modified(const struct mg_connection *conn, > - const struct file *filep) { > - char etag[64]; > - const char *ims = mg_get_header(conn, "If-Modified-Since"); > - const char *inm = mg_get_header(conn, "If-None-Match"); > - construct_etag(etag, sizeof(etag), filep); > - return (inm != NULL && !mg_strcasecmp(etag, inm)) || > - (ims != NULL && filep->modification_time <= parse_date_string(ims)); > +MG_INTERNAL size_t recv_avail_size(struct mg_connection *conn, size_t max) { > + size_t avail; > + if (conn->recv_mbuf_limit < conn->recv_mbuf.len) return 0; > + avail = conn->recv_mbuf_limit - conn->recv_mbuf.len; > + return avail > max ? max : avail; > } > > -static int forward_body_data(struct mg_connection *conn, FILE *fp, > - SOCKET sock, SSL *ssl) { > - const char *expect, *body; > - char buf[MG_BUF_LEN]; > - int to_read, nread, buffered_len, success = 0; > +static void mg_handle_tcp_read(struct mg_connection *conn) { > + int n = 0; > + char *buf = (char *) MG_MALLOC(MG_TCP_RECV_BUFFER_SIZE); > > - expect = mg_get_header(conn, "Expect"); > - assert(fp != NULL); > + if (buf == NULL) { > + DBG(("OOM")); > + return; > + } > > - if (conn->content_len == -1) { > - send_http_error(conn, 411, "Length Required", "%s", ""); > - } else if (expect != NULL && mg_strcasecmp(expect, "100-continue")) { > - send_http_error(conn, 417, "Expectation Failed", "%s", ""); > + n = (int) sl_Recv(conn->sock, buf, > + recv_avail_size(conn, MG_TCP_RECV_BUFFER_SIZE), 0); > + DBG(("%p %d bytes <- %d", conn, n, conn->sock)); > + if (n > 0) { > + mg_if_recv_tcp_cb(conn, buf, n, 1 /* own */); > } else { > - if (expect != NULL) { > - (void) mg_printf(conn, "%s", "HTTP/1.1 100 Continue\r\n\r\n"); > - } > + MG_FREE(buf); > + } > + if (n == 0) { > + /* Orderly shutdown of the socket, try flushing output. */ > + conn->flags |= MG_F_SEND_AND_CLOSE; > + } else if (mg_is_error(n)) { > + conn->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > +} > + > +static void mg_handle_udp_read(struct mg_connection *nc) { > + char *buf = (char *) MG_MALLOC(MG_UDP_RECV_BUFFER_SIZE); > + if (buf == NULL) return; > + union socket_address sa; > + socklen_t sa_len = sizeof(sa); > + int n = sl_RecvFrom(nc->sock, buf, MG_UDP_RECV_BUFFER_SIZE, 0, > + (SlSockAddr_t *) &sa, &sa_len); > + DBG(("%p %d bytes from %s:%d", nc, n, inet_ntoa(nc->sa.sin.sin_addr), > + ntohs(nc->sa.sin.sin_port))); > + if (n > 0) { > + mg_if_recv_udp_cb(nc, buf, n, &sa, sa_len); > + } else { > + MG_FREE(buf); > + } > +} > + > +#define _MG_F_FD_CAN_READ 1 > +#define _MG_F_FD_CAN_WRITE 1 << 1 > +#define _MG_F_FD_ERROR 1 << 2 > > - body = conn->buf + conn->request_len + conn->consumed_content; > - buffered_len = &conn->buf[conn->data_len] - body; > - assert(buffered_len >= 0); > - assert(conn->consumed_content == 0); > +void mg_mgr_handle_conn(struct mg_connection *nc, int fd_flags, double now) { > + DBG(("%p fd=%d fd_flags=%d nc_flags=%lu rmbl=%d smbl=%d", nc, nc->sock, > + fd_flags, nc->flags, (int) nc->recv_mbuf.len, (int) nc->send_mbuf.len)); > > - if (buffered_len > 0) { > - if ((int64_t) buffered_len > conn->content_len) { > - buffered_len = (int) conn->content_len; > + if (nc->flags & MG_F_CONNECTING) { > + if (nc->flags & MG_F_UDP || nc->err != SL_ERROR_BSD_EALREADY) { > + mg_if_connect_cb(nc, nc->err); > + } else { > + /* In SimpleLink, to get status of non-blocking connect() we need to wait > + * until socket is writable and repeat the call to sl_Connect again, > + * which will now return the real status. */ > + if (fd_flags & _MG_F_FD_CAN_WRITE) { > + nc->err = sl_Connect(nc->sock, &nc->sa.sa, sizeof(nc->sa.sin)); > + DBG(("%p conn res=%d", nc, nc->err)); > + if (nc->err == SL_ERROR_BSD_ESECSNOVERIFY || > + /* TODO(rojer): Provide API to set the date for verification. */ > + nc->err == SL_ERROR_BSD_ESECDATEERROR > +#if SL_MAJOR_VERSION_NUM >= 2 > + /* Per SWRU455, this error does not mean verification failed, > + * it only means that the cert used is not present in the trusted > + * root CA catalog. Which is perfectly fine. */ > + || > + nc->err == SL_ERROR_BSD_ESECUNKNOWNROOTCA > +#endif > + ) { > + nc->err = 0; > + } > + if (nc->flags & MG_F_SSL && nc->err == 0) { > + nc->flags |= MG_F_SSL_HANDSHAKE_DONE; > + } > + mg_if_connect_cb(nc, nc->err); > } > - push(fp, sock, ssl, body, (int64_t) buffered_len); > - conn->consumed_content += buffered_len; > } > + /* Ignore read/write in further processing, we've handled it. */ > + fd_flags &= ~(_MG_F_FD_CAN_READ | _MG_F_FD_CAN_WRITE); > + } > > - nread = 0; > - while (conn->consumed_content < conn->content_len) { > - to_read = sizeof(buf); > - if ((int64_t) to_read > conn->content_len - conn->consumed_content) { > - to_read = (int) (conn->content_len - conn->consumed_content); > - } > - nread = pull(NULL, conn, buf, to_read); > - if (nread <= 0 || push(fp, sock, ssl, buf, nread) != nread) { > - break; > + if (fd_flags & _MG_F_FD_CAN_READ) { > + if (nc->flags & MG_F_UDP) { > + mg_handle_udp_read(nc); > + } else { > + if (nc->flags & MG_F_LISTENING) { > + mg_accept_conn(nc); > + } else { > + mg_handle_tcp_read(nc); > } > - conn->consumed_content += nread; > } > + } > > - if (conn->consumed_content == conn->content_len) { > - success = nread >= 0; > + if (!(nc->flags & MG_F_CLOSE_IMMEDIATELY)) { > + if ((fd_flags & _MG_F_FD_CAN_WRITE) && nc->send_mbuf.len > 0) { > + mg_write_to_socket(nc); > } > > - // Each error code path in this function must send an error > - if (!success) { > - send_http_error(conn, 577, http_500_error, "%s", ""); > + if (!(fd_flags & (_MG_F_FD_CAN_READ | _MG_F_FD_CAN_WRITE))) { > + mg_if_poll(nc, now); > } > + mg_if_timer(nc, now); > } > > - return success; > + DBG(("%p after fd=%d nc_flags=%lu rmbl=%d smbl=%d", nc, nc->sock, nc->flags, > + (int) nc->recv_mbuf.len, (int) nc->send_mbuf.len)); > } > > -#if !defined(NO_CGI) > -// This structure helps to create an environment for the spawned CGI program. > -// Environment is an array of "VARIABLE=VALUE\0" ASCIIZ strings, > -// last element must be NULL. > -// However, on Windows there is a requirement that all these VARIABLE=VALUE\0 > -// strings must reside in a contiguous buffer. The end of the buffer is > -// marked by two '\0' characters. > -// We satisfy both worlds: we create an envp array (which is vars), all > -// entries are actually pointers inside buf. > -struct cgi_env_block { > - struct mg_connection *conn; > - char buf[CGI_ENVIRONMENT_SIZE]; // Environment buffer > - int len; // Space taken > - char *vars[MAX_CGI_ENVIR_VARS]; // char **envp > - int nvars; // Number of variables > -}; > - > -static char *addenv(struct cgi_env_block *block, > - PRINTF_FORMAT_STRING(const char *fmt), ...) > - PRINTF_ARGS(2, 3); > - > -// Append VARIABLE=VALUE\0 string to the buffer, and add a respective > -// pointer into the vars array. > -static char *addenv(struct cgi_env_block *block, const char *fmt, ...) { > - int n, space; > - char *added; > - va_list ap; > - > - // Calculate how much space is left in the buffer > - space = sizeof(block->buf) - block->len - 2; > - assert(space >= 0); > - > - // Make a pointer to the free space int the buffer > - added = block->buf + block->len; > - > - // Copy VARIABLE=VALUE\0 string into the free space > - va_start(ap, fmt); > - n = mg_vsnprintf(block->conn, added, (size_t) space, fmt, ap); > - va_end(ap); > - > - // Make sure we do not overflow buffer and the envp array > - if (n > 0 && n + 1 < space && > - block->nvars < (int) ARRAY_SIZE(block->vars) - 2) { > - // Append a pointer to the added string into the envp array > - block->vars[block->nvars++] = added; > - // Bump up used length counter. Include \0 terminator > - block->len += n + 1; > - } else { > - cry(block->conn, "%s: CGI env buffer truncated for [%s]", __func__, fmt); > - } > - > - return added; > +/* Associate a socket to a connection. */ > +void mg_sl_if_sock_set(struct mg_connection *nc, sock_t sock) { > + mg_set_non_blocking_mode(sock); > + nc->sock = sock; > + DBG(("%p %d", nc, sock)); > } > > -static void prepare_cgi_environment(struct mg_connection *conn, > - const char *prog, > - struct cgi_env_block *blk) { > - const char *s, *slash; > - struct vec var_vec; > - char *p, src_addr[20]; > - int i; > - > - blk->len = blk->nvars = 0; > - blk->conn = conn; > - sockaddr_to_string(src_addr, sizeof(src_addr), &conn->client.rsa); > - > - addenv(blk, "SERVER_NAME=%s", conn->ctx->config[AUTHENTICATION_DOMAIN]); > - addenv(blk, "SERVER_ROOT=%s", conn->ctx->config[DOCUMENT_ROOT]); > - addenv(blk, "DOCUMENT_ROOT=%s", conn->ctx->config[DOCUMENT_ROOT]); > +void mg_sl_if_init(struct mg_iface *iface) { > + (void) iface; > + DBG(("%p using sl_Select()", iface->mgr)); > +} > > - // Prepare the environment block > - addenv(blk, "%s", "GATEWAY_INTERFACE=CGI/1.1"); > - addenv(blk, "%s", "SERVER_PROTOCOL=HTTP/1.1"); > - addenv(blk, "%s", "REDIRECT_STATUS=200"); // For PHP > +void mg_sl_if_free(struct mg_iface *iface) { > + (void) iface; > +} > > - // TODO(lsm): fix this for IPv6 case > - addenv(blk, "SERVER_PORT=%d", ntohs(conn->client.lsa.sin.sin_port)); > +void mg_sl_if_add_conn(struct mg_connection *nc) { > + (void) nc; > +} > > - addenv(blk, "REQUEST_METHOD=%s", conn->request_info.request_method); > - addenv(blk, "REMOTE_ADDR=%s", src_addr); > - addenv(blk, "REMOTE_PORT=%d", conn->request_info.remote_port); > - addenv(blk, "REQUEST_URI=%s", conn->request_info.uri); > +void mg_sl_if_remove_conn(struct mg_connection *nc) { > + (void) nc; > +} > > - // SCRIPT_NAME > - assert(conn->request_info.uri[0] == '/'); > - slash = strrchr(conn->request_info.uri, '/'); > - if ((s = strrchr(prog, '/')) == NULL) > - s = prog; > - addenv(blk, "SCRIPT_NAME=%.*s%s", (int) (slash - conn->request_info.uri), > - conn->request_info.uri, s); > +time_t mg_sl_if_poll(struct mg_iface *iface, int timeout_ms) { > + struct mg_mgr *mgr = iface->mgr; > + double now = mg_time(); > + double min_timer; > + struct mg_connection *nc, *tmp; > + struct SlTimeval_t tv; > + SlFdSet_t read_set, write_set, err_set; > + sock_t max_fd = INVALID_SOCKET; > + int num_fds, num_ev = 0, num_timers = 0; > > - addenv(blk, "SCRIPT_FILENAME=%s", prog); > - addenv(blk, "PATH_TRANSLATED=%s", prog); > - addenv(blk, "HTTPS=%s", conn->ssl == NULL ? "off" : "on"); > + SL_SOCKET_FD_ZERO(&read_set); > + SL_SOCKET_FD_ZERO(&write_set); > + SL_SOCKET_FD_ZERO(&err_set); > > - if ((s = mg_get_header(conn, "Content-Type")) != NULL) > - addenv(blk, "CONTENT_TYPE=%s", s); > + /* > + * Note: it is ok to have connections with sock == INVALID_SOCKET in the list, > + * e.g. timer-only "connections". > + */ > + min_timer = 0; > + for (nc = mgr->active_connections, num_fds = 0; nc != NULL; nc = tmp) { > + tmp = nc->next; > > - if (conn->request_info.query_string != NULL) > - addenv(blk, "QUERY_STRING=%s", conn->request_info.query_string); > + if (nc->sock != INVALID_SOCKET) { > + num_fds++; > > - if ((s = mg_get_header(conn, "Content-Length")) != NULL) > - addenv(blk, "CONTENT_LENGTH=%s", s); > + if (!(nc->flags & MG_F_WANT_WRITE) && > + nc->recv_mbuf.len < nc->recv_mbuf_limit && > + (!(nc->flags & MG_F_UDP) || nc->listener == NULL)) { > + SL_SOCKET_FD_SET(nc->sock, &read_set); > + if (max_fd == INVALID_SOCKET || nc->sock > max_fd) max_fd = nc->sock; > + } > > - if ((s = getenv("PATH")) != NULL) > - addenv(blk, "PATH=%s", s); > + if (((nc->flags & MG_F_CONNECTING) && !(nc->flags & MG_F_WANT_READ)) || > + (nc->send_mbuf.len > 0 && !(nc->flags & MG_F_CONNECTING))) { > + SL_SOCKET_FD_SET(nc->sock, &write_set); > + SL_SOCKET_FD_SET(nc->sock, &err_set); > + if (max_fd == INVALID_SOCKET || nc->sock > max_fd) max_fd = nc->sock; > + } > + } > > - if (conn->path_info != NULL) { > - addenv(blk, "PATH_INFO=%s", conn->path_info); > + if (nc->ev_timer_time > 0) { > + if (num_timers == 0 || nc->ev_timer_time < min_timer) { > + min_timer = nc->ev_timer_time; > + } > + num_timers++; > + } > } > > -#if defined(_WIN32) > - if ((s = getenv("COMSPEC")) != NULL) { > - addenv(blk, "COMSPEC=%s", s); > - } > - if ((s = getenv("SYSTEMROOT")) != NULL) { > - addenv(blk, "SYSTEMROOT=%s", s); > - } > - if ((s = getenv("SystemDrive")) != NULL) { > - addenv(blk, "SystemDrive=%s", s); > + /* > + * If there is a timer to be fired earlier than the requested timeout, > + * adjust the timeout. > + */ > + if (num_timers > 0) { > + double timer_timeout_ms = (min_timer - mg_time()) * 1000 + 1 /* rounding */; > + if (timer_timeout_ms < timeout_ms) { > + timeout_ms = timer_timeout_ms; > + } > } > -#else > - if ((s = getenv("LD_LIBRARY_PATH")) != NULL) > - addenv(blk, "LD_LIBRARY_PATH=%s", s); > -#endif // _WIN32 > + if (timeout_ms < 0) timeout_ms = 0; > > - if ((s = getenv("PERLLIB")) != NULL) > - addenv(blk, "PERLLIB=%s", s); > + tv.tv_sec = timeout_ms / 1000; > + tv.tv_usec = (timeout_ms % 1000) * 1000; > > - if (conn->request_info.remote_user != NULL) { > - addenv(blk, "REMOTE_USER=%s", conn->request_info.remote_user); > - addenv(blk, "%s", "AUTH_TYPE=Digest"); > + if (num_fds > 0) { > + num_ev = sl_Select((int) max_fd + 1, &read_set, &write_set, &err_set, &tv); > } > > - // Add all headers as HTTP_* variables > - for (i = 0; i < conn->request_info.num_headers; i++) { > - p = addenv(blk, "HTTP_%s=%s", > - conn->request_info.http_headers[i].name, > - conn->request_info.http_headers[i].value); > + now = mg_time(); > + DBG(("sl_Select @ %ld num_ev=%d of %d, timeout=%d", (long) now, num_ev, > + num_fds, timeout_ms)); > > - // Convert variable name into uppercase, and change - to _ > - for (; *p != '=' && *p != '\0'; p++) { > - if (*p == '-') > - *p = '_'; > - *p = (char) toupper(* (unsigned char *) p); > + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { > + int fd_flags = 0; > + if (nc->sock != INVALID_SOCKET) { > + if (num_ev > 0) { > + fd_flags = > + (SL_SOCKET_FD_ISSET(nc->sock, &read_set) && > + (!(nc->flags & MG_F_UDP) || nc->listener == NULL) > + ? _MG_F_FD_CAN_READ > + : 0) | > + (SL_SOCKET_FD_ISSET(nc->sock, &write_set) ? _MG_F_FD_CAN_WRITE > + : 0) | > + (SL_SOCKET_FD_ISSET(nc->sock, &err_set) ? _MG_F_FD_ERROR : 0); > + } > + /* SimpleLink does not report UDP sockets as writable. */ > + if (nc->flags & MG_F_UDP && nc->send_mbuf.len > 0) { > + fd_flags |= _MG_F_FD_CAN_WRITE; > + } > } > + tmp = nc->next; > + mg_mgr_handle_conn(nc, fd_flags, now); > } > > - // Add user-specified variables > - s = conn->ctx->config[CGI_ENVIRONMENT]; > - while ((s = next_option(s, &var_vec, NULL)) != NULL) { > - addenv(blk, "%.*s", (int) var_vec.len, var_vec.ptr); > + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { > + tmp = nc->next; > + if ((nc->flags & MG_F_CLOSE_IMMEDIATELY) || > + (nc->send_mbuf.len == 0 && (nc->flags & MG_F_SEND_AND_CLOSE))) { > + mg_close_conn(nc); > + } > } > > - blk->vars[blk->nvars++] = NULL; > - blk->buf[blk->len++] = '\0'; > + return now; > +} > + > +void mg_sl_if_get_conn_addr(struct mg_connection *nc, int remote, > + union socket_address *sa) { > + /* SimpleLink does not provide a way to get socket's peer address after > + * accept or connect. Address should have been preserved in the connection, > + * so we do our best here by using it. */ > + if (remote) memcpy(sa, &nc->sa, sizeof(*sa)); > +} > + > +void sl_restart_cb(struct mg_mgr *mgr) { > + /* > + * SimpleLink has been restarted, meaning all sockets have been invalidated. > + * We try our best - we'll restart the listeners, but for outgoing > + * connections we have no option but to terminate. > + */ > + struct mg_connection *nc; > + for (nc = mg_next(mgr, NULL); nc != NULL; nc = mg_next(mgr, nc)) { > + if (nc->sock == INVALID_SOCKET) continue; /* Could be a timer */ > + if (nc->flags & MG_F_LISTENING) { > + DBG(("restarting %p %s:%d", nc, inet_ntoa(nc->sa.sin.sin_addr), > + ntohs(nc->sa.sin.sin_port))); > + int res = (nc->flags & MG_F_UDP ? mg_sl_if_listen_udp(nc, &nc->sa) > + : mg_sl_if_listen_tcp(nc, &nc->sa)); > + if (res == 0) continue; > + /* Well, we tried and failed. Fall through to closing. */ > + } > + nc->sock = INVALID_SOCKET; > + DBG(("terminating %p %s:%d", nc, inet_ntoa(nc->sa.sin.sin_addr), > + ntohs(nc->sa.sin.sin_port))); > + /* TODO(rojer): Outgoing UDP? */ > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + } > +} > + > +/* clang-format off */ > +#define MG_SL_IFACE_VTABLE \ > + { \ > + mg_sl_if_init, \ > + mg_sl_if_free, \ > + mg_sl_if_add_conn, \ > + mg_sl_if_remove_conn, \ > + mg_sl_if_poll, \ > + mg_sl_if_listen_tcp, \ > + mg_sl_if_listen_udp, \ > + mg_sl_if_connect_tcp, \ > + mg_sl_if_connect_udp, \ > + mg_sl_if_tcp_send, \ > + mg_sl_if_udp_send, \ > + mg_sl_if_recved, \ > + mg_sl_if_create_conn, \ > + mg_sl_if_destroy_conn, \ > + mg_sl_if_sock_set, \ > + mg_sl_if_get_conn_addr, \ > + } > +/* clang-format on */ > + > +const struct mg_iface_vtable mg_simplelink_iface_vtable = MG_SL_IFACE_VTABLE; > +#if MG_NET_IF == MG_NET_IF_SIMPLELINK > +const struct mg_iface_vtable mg_default_iface_vtable = MG_SL_IFACE_VTABLE; > +#endif > > - assert(blk->nvars < (int) ARRAY_SIZE(blk->vars)); > - assert(blk->len > 0); > - assert(blk->len < (int) sizeof(blk->buf)); > -} > - > -static void handle_cgi_request(struct mg_connection *conn, const char *prog) { > - int headers_len, data_len, i, fd_stdin[2], fd_stdout[2]; > - const char *status, *status_text; > - char buf[16384], *pbuf, dir[PATH_MAX], *p; > - struct mg_request_info ri; > - struct cgi_env_block blk; > - FILE *in, *out; > - struct file fout = STRUCT_FILE_INITIALIZER; > - pid_t pid; > - > - prepare_cgi_environment(conn, prog, &blk); > - > - // CGI must be executed in its own directory. 'dir' must point to the > - // directory containing executable program, 'p' must point to the > - // executable program name relative to 'dir'. > - (void) mg_snprintf(conn, dir, sizeof(dir), "%s", prog); > - if ((p = strrchr(dir, '/')) != NULL) { > - *p++ = '\0'; > - } else { > - dir[0] = '.', dir[1] = '\0'; > - p = (char *) prog; > - } > - > - pid = (pid_t) -1; > - fd_stdin[0] = fd_stdin[1] = fd_stdout[0] = fd_stdout[1] = -1; > - in = out = NULL; > - > - if (pipe(fd_stdin) != 0 || pipe(fd_stdout) != 0) { > - send_http_error(conn, 500, http_500_error, > - "Cannot create CGI pipe: %s", strerror(ERRNO)); > - goto done; > - } > - > - pid = spawn_process(conn, p, blk.buf, blk.vars, fd_stdin[0], fd_stdout[1], > - dir); > - // spawn_process() must close those! > - // If we don't mark them as closed, close() attempt before > - // return from this function throws an exception on Windows. > - // Windows does not like when closed descriptor is closed again. > - fd_stdin[0] = fd_stdout[1] = -1; > - > - if (pid == (pid_t) -1) { > - send_http_error(conn, 500, http_500_error, > - "Cannot spawn CGI process [%s]: %s", prog, strerror(ERRNO)); > - goto done; > - } > - > - if ((in = fdopen(fd_stdin[1], "wb")) == NULL || > - (out = fdopen(fd_stdout[0], "rb")) == NULL) { > - send_http_error(conn, 500, http_500_error, > - "fopen: %s", strerror(ERRNO)); > - goto done; > - } > - > - setbuf(in, NULL); > - setbuf(out, NULL); > - fout.fp = out; > - > - // Send POST data to the CGI process if needed > - if (!strcmp(conn->request_info.request_method, "POST") && > - !forward_body_data(conn, in, INVALID_SOCKET, NULL)) { > - goto done; > - } > - > - // Close so child gets an EOF. > - fclose(in); > - in = NULL; > - fd_stdin[1] = -1; > - > - // Now read CGI reply into a buffer. We need to set correct > - // status code, thus we need to see all HTTP headers first. > - // Do not send anything back to client, until we buffer in all > - // HTTP headers. > - data_len = 0; > - headers_len = read_request(out, conn, buf, sizeof(buf), &data_len); > - if (headers_len <= 0) { > - send_http_error(conn, 500, http_500_error, > - "CGI program sent malformed or too big (>%u bytes) " > - "HTTP headers: [%.*s]", > - (unsigned) sizeof(buf), data_len, buf); > - goto done; > - } > - pbuf = buf; > - buf[headers_len - 1] = '\0'; > - parse_http_headers(&pbuf, &ri); > - > - // Make up and send the status line > - status_text = "OK"; > - if ((status = get_header(&ri, "Status")) != NULL) { > - conn->status_code = atoi(status); > - status_text = status; > - while (isdigit(* (unsigned char *) status_text) || *status_text == ' ') { > - status_text++; > - } > - } else if (get_header(&ri, "Location") != NULL) { > - conn->status_code = 302; > - } else { > - conn->status_code = 200; > - } > - if (get_header(&ri, "Connection") != NULL && > - !mg_strcasecmp(get_header(&ri, "Connection"), "keep-alive")) { > - conn->must_close = 1; > - } > - (void) mg_printf(conn, "HTTP/1.1 %d %s\r\n", conn->status_code, > - status_text); > +#endif /* MG_ENABLE_NET_IF_SIMPLELINK */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/simplelink/sl_ssl_if.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > - // Send headers > - for (i = 0; i < ri.num_headers; i++) { > - mg_printf(conn, "%s: %s\r\n", > - ri.http_headers[i].name, ri.http_headers[i].value); > - } > - mg_write(conn, "\r\n", 2); > +#if MG_ENABLE_SSL && MG_SSL_IF == MG_SSL_IF_SIMPLELINK > > - // Send chunk of data that may have been read after the headers > - conn->num_bytes_sent += mg_write(conn, buf + headers_len, > - (size_t)(data_len - headers_len)); > +/* Amalgamated: #include "common/mg_mem.h" */ > > - // Read the rest of CGI output and send to the client > - send_file_data(conn, &fout, 0, INT64_MAX); > +#ifndef MG_SSL_IF_SIMPLELINK_SLFS_PREFIX > +#define MG_SSL_IF_SIMPLELINK_SLFS_PREFIX "SL:" > +#endif > > -done: > - if (pid != (pid_t) -1) { > - kill(pid, SIGKILL); > - } > - if (fd_stdin[0] != -1) { > - close(fd_stdin[0]); > - } > - if (fd_stdout[1] != -1) { > - close(fd_stdout[1]); > - } > +#define MG_SSL_IF_SIMPLELINK_SLFS_PREFIX_LEN \ > + (sizeof(MG_SSL_IF_SIMPLELINK_SLFS_PREFIX) - 1) > > - if (in != NULL) { > - fclose(in); > - } else if (fd_stdin[1] != -1) { > - close(fd_stdin[1]); > - } > +struct mg_ssl_if_ctx { > + char *ssl_cert; > + char *ssl_key; > + char *ssl_ca_cert; > + char *ssl_server_name; > +}; > > - if (out != NULL) { > - fclose(out); > - } else if (fd_stdout[0] != -1) { > - close(fd_stdout[0]); > - } > +void mg_ssl_if_init() { > } > -#endif // !NO_CGI > - > -// For a given PUT path, create all intermediate subdirectories > -// for given path. Return 0 if the path itself is a directory, > -// or -1 on error, 1 if OK. > -static int put_dir(struct mg_connection *conn, const char *path) { > - char buf[PATH_MAX]; > - const char *s, *p; > - struct file file = STRUCT_FILE_INITIALIZER; > - int len, res = 1; > - > - for (s = p = path + 2; (p = strchr(s, '/')) != NULL; s = ++p) { > - len = p - path; > - if (len >= (int) sizeof(buf)) { > - res = -1; > - break; > - } > - memcpy(buf, path, len); > - buf[len] = '\0'; > - > - // Try to create intermediate directory > - DEBUG_TRACE(("mkdir(%s)", buf)); > - if (!mg_stat(conn, buf, &file) && mg_mkdir(buf, 0755) != 0) { > - res = -1; > - break; > - } > > - // Is path itself a directory? > - if (p[1] == '\0') { > - res = 0; > - } > +enum mg_ssl_if_result mg_ssl_if_conn_init( > + struct mg_connection *nc, const struct mg_ssl_if_conn_params *params, > + const char **err_msg) { > + struct mg_ssl_if_ctx *ctx = > + (struct mg_ssl_if_ctx *) MG_CALLOC(1, sizeof(*ctx)); > + if (ctx == NULL) { > + MG_SET_PTRPTR(err_msg, "Out of memory"); > + return MG_SSL_ERROR; > } > + nc->ssl_if_data = ctx; > > - return res; > -} > - > -static void put_file(struct mg_connection *conn, const char *path) { > - struct file file = STRUCT_FILE_INITIALIZER; > - const char *range; > - int64_t r1, r2; > - int rc; > - > - conn->status_code = mg_stat(conn, path, &file) ? 200 : 201; > - > - if ((rc = put_dir(conn, path)) == 0) { > - mg_printf(conn, "HTTP/1.1 %d OK\r\n\r\n", conn->status_code); > - } else if (rc == -1) { > - send_http_error(conn, 500, http_500_error, > - "put_dir(%s): %s", path, strerror(ERRNO)); > - } else if (!mg_fopen(conn, path, "wb+", &file) || file.fp == NULL) { > - mg_fclose(&file); > - send_http_error(conn, 500, http_500_error, > - "fopen(%s): %s", path, strerror(ERRNO)); > - } else { > - fclose_on_exec(&file); > - range = mg_get_header(conn, "Content-Range"); > - r1 = r2 = 0; > - if (range != NULL && parse_range_header(range, &r1, &r2) > 0) { > - conn->status_code = 206; > - fseeko(file.fp, r1, SEEK_SET); > - } > - if (forward_body_data(conn, file.fp, INVALID_SOCKET, NULL)) { > - mg_printf(conn, "HTTP/1.1 %d OK\r\n\r\n", conn->status_code); > + if (params->cert != NULL || params->key != NULL) { > + if (params->cert != NULL && params->key != NULL) { > + ctx->ssl_cert = strdup(params->cert); > + ctx->ssl_key = strdup(params->key); > + } else { > + MG_SET_PTRPTR(err_msg, "Both cert and key are required."); > + return MG_SSL_ERROR; > } > - mg_fclose(&file); > } > -} > - > -static void send_ssi_file(struct mg_connection *, const char *, > - struct file *, int); > - > -static void do_ssi_include(struct mg_connection *conn, const char *ssi, > - char *tag, int include_level) { > - char file_name[MG_BUF_LEN], path[PATH_MAX], *p; > - struct file file = STRUCT_FILE_INITIALIZER; > - > - // sscanf() is safe here, since send_ssi_file() also uses buffer > - // of size MG_BUF_LEN to get the tag. So strlen(tag) is always < MG_BUF_LEN. > - if (sscanf(tag, " virtual=\"%[^\"]\"", file_name) == 1) { > - // File name is relative to the webserver root > - (void) mg_snprintf(conn, path, sizeof(path), "%s%c%s", > - conn->ctx->config[DOCUMENT_ROOT], '/', file_name); > - } else if (sscanf(tag, " file=\"%[^\"]\"", file_name) == 1) { > - // File name is relative to the webserver working directory > - // or it is absolute system path > - (void) mg_snprintf(conn, path, sizeof(path), "%s", file_name); > - } else if (sscanf(tag, " \"%[^\"]\"", file_name) == 1) { > - // File name is relative to the currect document > - (void) mg_snprintf(conn, path, sizeof(path), "%s", ssi); > - if ((p = strrchr(path, '/')) != NULL) { > - p[1] = '\0'; > + if (params->ca_cert != NULL && strcmp(params->ca_cert, "*") != 0) { > + ctx->ssl_ca_cert = strdup(params->ca_cert); > + } > + /* TODO(rojer): cipher_suites. */ > + if (params->server_name != NULL) { > + ctx->ssl_server_name = strdup(params->server_name); > + } > + return MG_SSL_OK; > +} > + > +void mg_ssl_if_conn_close_notify(struct mg_connection *nc) { > + /* Nothing to do */ > + (void) nc; > +} > + > +void mg_ssl_if_conn_free(struct mg_connection *nc) { > + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; > + if (ctx == NULL) return; > + nc->ssl_if_data = NULL; > + MG_FREE(ctx->ssl_cert); > + MG_FREE(ctx->ssl_key); > + MG_FREE(ctx->ssl_ca_cert); > + MG_FREE(ctx->ssl_server_name); > + memset(ctx, 0, sizeof(*ctx)); > + MG_FREE(ctx); > +} > + > +bool pem_to_der(const char *pem_file, const char *der_file) { > + bool ret = false; > + FILE *pf = NULL, *df = NULL; > + bool writing = false; > + pf = fopen(pem_file, "r"); > + if (pf == NULL) goto clean; > + remove(der_file); > + fs_slfs_set_new_file_size(der_file + MG_SSL_IF_SIMPLELINK_SLFS_PREFIX_LEN, > + 2048); > + df = fopen(der_file, "w"); > + if (df == NULL) goto clean; > + while (1) { > + char pem_buf[70]; > + char der_buf[48]; > + if (!fgets(pem_buf, sizeof(pem_buf), pf)) break; > + if (writing) { > + if (strstr(pem_buf, "-----END ") != NULL) { > + ret = true; > + break; > + } > + int l = 0; > + while (!isspace((unsigned int) pem_buf[l])) l++; > + int der_len = 0; > + cs_base64_decode((const unsigned char *) pem_buf, sizeof(pem_buf), > + der_buf, &der_len); > + if (der_len <= 0) break; > + if (fwrite(der_buf, 1, der_len, df) != der_len) break; > + } else if (strstr(pem_buf, "-----BEGIN ") != NULL) { > + writing = true; > } > - (void) mg_snprintf(conn, path + strlen(path), > - sizeof(path) - strlen(path), "%s", file_name); > - } else { > - cry(conn, "Bad SSI #include: [%s]", tag); > - return; > } > > - if (!mg_fopen(conn, path, "rb", &file)) { > - cry(conn, "Cannot open SSI #include: [%s]: fopen(%s): %s", > - tag, path, strerror(ERRNO)); > - } else { > - fclose_on_exec(&file); > - if (match_prefix(conn->ctx->config[SSI_EXTENSIONS], > - strlen(conn->ctx->config[SSI_EXTENSIONS]), path) > 0) { > - send_ssi_file(conn, path, &file, include_level + 1); > - } else { > - send_file_data(conn, &file, 0, INT64_MAX); > - } > - mg_fclose(&file); > +clean: > + if (pf != NULL) fclose(pf); > + if (df != NULL) { > + fclose(df); > + if (!ret) remove(der_file); > } > + return ret; > } > > -#if !defined(NO_POPEN) > -static void do_ssi_exec(struct mg_connection *conn, char *tag) { > - char cmd[MG_BUF_LEN]; > - struct file file = STRUCT_FILE_INITIALIZER; > - > - if (sscanf(tag, " \"%[^\"]\"", cmd) != 1) { > - cry(conn, "Bad SSI #exec: [%s]", tag); > - } else if ((file.fp = popen(cmd, "r")) == NULL) { > - cry(conn, "Cannot SSI #exec: [%s]: %s", cmd, strerror(ERRNO)); > +#if MG_ENABLE_FILESYSTEM && defined(MG_FS_SLFS) > +/* If the file's extension is .pem, convert it to DER format and put on SLFS. */ > +static char *sl_pem2der(const char *pem_file) { > + const char *pem_ext = strstr(pem_file, ".pem"); > + if (pem_ext == NULL || *(pem_ext + 4) != '\0') { > + return strdup(pem_file); > + } > + char *der_file = NULL; > + /* DER file must be located on SLFS, add prefix. */ > + int l = mg_asprintf(&der_file, 0, MG_SSL_IF_SIMPLELINK_SLFS_PREFIX "%.*s.der", > + (int) (pem_ext - pem_file), pem_file); > + if (der_file == NULL) return NULL; > + bool result = false; > + cs_stat_t st; > + if (mg_stat(der_file, &st) != 0) { > + result = pem_to_der(pem_file, der_file); > + LOG(LL_DEBUG, ("%s -> %s = %d", pem_file, der_file, result)); > } else { > - send_file_data(conn, &file, 0, INT64_MAX); > - pclose(file.fp); > + /* File exists, assume it's already been converted. */ > + result = true; > } > -} > -#endif // !NO_POPEN > - > -static int mg_fgetc(struct file *filep, int offset) { > - if (filep->membuf != NULL && offset >=0 && offset < filep->size) { > - return ((unsigned char *) filep->membuf)[offset]; > - } else if (filep->fp != NULL) { > - return fgetc(filep->fp); > + if (result) { > + /* Strip the SL: prefix we added since NWP does not expect it. */ > + memmove(der_file, der_file + MG_SSL_IF_SIMPLELINK_SLFS_PREFIX_LEN, > + l - 2 /* including \0 */); > } else { > - return EOF; > + MG_FREE(der_file); > + der_file = NULL; > } > + return der_file; > } > +#else > +static char *sl_pem2der(const char *pem_file) { > + return strdup(pem_file); > +} > +#endif > > -static void send_ssi_file(struct mg_connection *conn, const char *path, > - struct file *filep, int include_level) { > - char buf[MG_BUF_LEN]; > - int ch, offset, len, in_ssi_tag; > - > - if (include_level > 10) { > - cry(conn, "SSI #include level is too deep (%s)", path); > - return; > - } > - > - in_ssi_tag = len = offset = 0; > - while ((ch = mg_fgetc(filep, offset)) != EOF) { > - if (in_ssi_tag && ch == '>') { > - in_ssi_tag = 0; > - buf[len++] = (char) ch; > - buf[len] = '\0'; > - assert(len <= (int) sizeof(buf)); > - if (len < 6 || memcmp(buf, "<!--#", 5) != 0) { > - // Not an SSI tag, pass it > - (void) mg_write(conn, buf, (size_t) len); > +int sl_set_ssl_opts(int sock, struct mg_connection *nc) { > + int err; > + const struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; > + DBG(("%p ssl ctx: %p", nc, ctx)); > + > + if (ctx != NULL) { > + DBG(("%p %s,%s,%s,%s", nc, (ctx->ssl_cert ? ctx->ssl_cert : "-"), > + (ctx->ssl_key ? ctx->ssl_cert : "-"), > + (ctx->ssl_ca_cert ? ctx->ssl_ca_cert : "-"), > + (ctx->ssl_server_name ? ctx->ssl_server_name : "-"))); > + if (ctx->ssl_cert != NULL && ctx->ssl_key != NULL) { > + char *ssl_cert = sl_pem2der(ctx->ssl_cert); > + char *ssl_key = sl_pem2der(ctx->ssl_key); > + if (ssl_cert != NULL && ssl_key != NULL) { > + err = sl_SetSockOpt(sock, SL_SOL_SOCKET, > + SL_SO_SECURE_FILES_CERTIFICATE_FILE_NAME, ssl_cert, > + strlen(ssl_cert)); > + LOG(LL_INFO, ("CERTIFICATE_FILE_NAME %s -> %d", ssl_cert, err)); > + err = sl_SetSockOpt(sock, SL_SOL_SOCKET, > + SL_SO_SECURE_FILES_PRIVATE_KEY_FILE_NAME, ssl_key, > + strlen(ssl_key)); > + LOG(LL_INFO, ("PRIVATE_KEY_FILE_NAME %s -> %d", ssl_key, err)); > } else { > - if (!memcmp(buf + 5, "include", 7)) { > - do_ssi_include(conn, path, buf + 12, include_level); > -#if !defined(NO_POPEN) > - } else if (!memcmp(buf + 5, "exec", 4)) { > - do_ssi_exec(conn, buf + 9); > -#endif // !NO_POPEN > + err = -1; > + } > + MG_FREE(ssl_cert); > + MG_FREE(ssl_key); > + if (err != 0) return err; > + } > + if (ctx->ssl_ca_cert != NULL) { > + if (ctx->ssl_ca_cert[0] != '\0') { > + char *ssl_ca_cert = sl_pem2der(ctx->ssl_ca_cert); > + if (ssl_ca_cert != NULL) { > + err = sl_SetSockOpt(sock, SL_SOL_SOCKET, > + SL_SO_SECURE_FILES_CA_FILE_NAME, ssl_ca_cert, > + strlen(ssl_ca_cert)); > + LOG(LL_INFO, ("CA_FILE_NAME %s -> %d", ssl_ca_cert, err)); > } else { > - cry(conn, "%s: unknown SSI " "command: \"%s\"", path, buf); > + err = -1; > } > - } > - len = 0; > - } else if (in_ssi_tag) { > - if (len == 5 && memcmp(buf, "<!--#", 5) != 0) { > - // Not an SSI tag > - in_ssi_tag = 0; > - } else if (len == (int) sizeof(buf) - 2) { > - cry(conn, "%s: SSI tag is too large", path); > - len = 0; > - } > - buf[len++] = ch & 0xff; > - } else if (ch == '<') { > - in_ssi_tag = 1; > - if (len > 0) { > - mg_write(conn, buf, (size_t) len); > - } > - len = 0; > - buf[len++] = ch & 0xff; > - } else { > - buf[len++] = ch & 0xff; > - if (len == (int) sizeof(buf)) { > - mg_write(conn, buf, (size_t) len); > - len = 0; > + MG_FREE(ssl_ca_cert); > + if (err != 0) return err; > } > } > + if (ctx->ssl_server_name != NULL) { > + err = sl_SetSockOpt(sock, SL_SOL_SOCKET, > + SL_SO_SECURE_DOMAIN_NAME_VERIFICATION, > + ctx->ssl_server_name, strlen(ctx->ssl_server_name)); > + DBG(("DOMAIN_NAME_VERIFICATION %s -> %d", ctx->ssl_server_name, err)); > + /* Domain name verificationw as added in a NWP service pack, older > + * versions return SL_ERROR_BSD_ENOPROTOOPT. There isn't much we can do > + * about it, > + * so we ignore the error. */ > + if (err != 0 && err != SL_ERROR_BSD_ENOPROTOOPT) return err; > + } > } > - > - // Send the rest of buffered data > - if (len > 0) { > - mg_write(conn, buf, (size_t) len); > - } > + return 0; > } > > -static void handle_ssi_file_request(struct mg_connection *conn, > - const char *path) { > - struct file file = STRUCT_FILE_INITIALIZER; > +#endif /* MG_ENABLE_SSL && MG_SSL_IF == MG_SSL_IF_SIMPLELINK */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/lwip/mg_lwip_net_if.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_LWIP_MG_NET_IF_LWIP_H_ > +#define CS_COMMON_PLATFORMS_LWIP_MG_NET_IF_LWIP_H_ > + > +#ifndef MG_ENABLE_NET_IF_LWIP_LOW_LEVEL > +#define MG_ENABLE_NET_IF_LWIP_LOW_LEVEL MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL > +#endif > + > +#if MG_ENABLE_NET_IF_LWIP_LOW_LEVEL > > - if (!mg_fopen(conn, path, "rb", &file)) { > - send_http_error(conn, 500, http_500_error, "fopen(%s): %s", path, > - strerror(ERRNO)); > - } else { > - conn->must_close = 1; > - fclose_on_exec(&file); > - mg_printf(conn, "HTTP/1.1 200 OK\r\n" > - "Content-Type: text/html\r\nConnection: %s\r\n\r\n", > - suggest_connection_header(conn)); > - send_ssi_file(conn, path, &file, 0); > - mg_fclose(&file); > - } > -} > +#include <stdint.h> > > -static void send_options(struct mg_connection *conn) { > - conn->status_code = 200; > +extern const struct mg_iface_vtable mg_lwip_iface_vtable; > + > +struct mg_lwip_conn_state { > + struct mg_connection *nc; > + struct mg_connection *lc; > + union { > + struct tcp_pcb *tcp; > + struct udp_pcb *udp; > + } pcb; > + err_t err; > + size_t num_sent; /* Number of acknowledged bytes to be reported to the core */ > + struct pbuf *rx_chain; /* Chain of incoming data segments. */ > + size_t rx_offset; /* Offset within the first pbuf (if partially consumed) */ > + /* Last SSL write size, for retries. */ > + int last_ssl_write_size; > + /* Whether MG_SIG_RECV is already pending for this connection */ > + int recv_pending; > +}; > > - mg_printf(conn, "%s", "HTTP/1.1 200 OK\r\n" > - "Allow: GET, POST, HEAD, CONNECT, PUT, DELETE, OPTIONS\r\n" > - "DAV: 1\r\n\r\n"); > -} > +enum mg_sig_type { > + MG_SIG_CONNECT_RESULT = 1, > + MG_SIG_RECV = 2, > + MG_SIG_CLOSE_CONN = 3, > + MG_SIG_TOMBSTONE = 4, > + MG_SIG_ACCEPT = 5, > +}; > > -// Writes PROPFIND properties for a collection element > -static void print_props(struct mg_connection *conn, const char* uri, > - struct file *filep) { > - char mtime[64]; > - gmt_time_string(mtime, sizeof(mtime), &filep->modification_time); > - conn->num_bytes_sent += mg_printf(conn, > - "<d:response>" > - "<d:href>%s</d:href>" > - "<d:propstat>" > - "<d:prop>" > - "<d:resourcetype>%s</d:resourcetype>" > - "<d:getcontentlength>%" INT64_FMT "</d:getcontentlength>" > - "<d:getlastmodified>%s</d:getlastmodified>" > - "</d:prop>" > - "<d:status>HTTP/1.1 200 OK</d:status>" > - "</d:propstat>" > - "</d:response>\n", > - uri, > - filep->is_directory ? "<d:collection/>" : "", > - filep->size, > - mtime); > -} > - > -static void print_dav_dir_entry(struct de *de, void *data) { > - char href[PATH_MAX]; > - struct mg_connection *conn = (struct mg_connection *) data; > - mg_snprintf(conn, href, sizeof(href), "%s%s", > - conn->request_info.uri, de->file_name); > - print_props(conn, href, &de->file); > -} > - > -static void handle_propfind(struct mg_connection *conn, const char *path, > - struct file *filep) { > - const char *depth = mg_get_header(conn, "Depth"); > - > - conn->must_close = 1; > - conn->status_code = 207; > - mg_printf(conn, "HTTP/1.1 207 Multi-Status\r\n" > - "Connection: close\r\n" > - "Content-Type: text/xml; charset=utf-8\r\n\r\n"); > - > - conn->num_bytes_sent += mg_printf(conn, > - "<?xml version=\"1.0\" encoding=\"utf-8\"?>" > - "<d:multistatus xmlns:d='DAV:'>\n"); > +void mg_lwip_post_signal(enum mg_sig_type sig, struct mg_connection *nc); > > - // Print properties for the requested resource itself > - print_props(conn, conn->request_info.uri, filep); > +/* To be implemented by the platform. */ > +void mg_lwip_mgr_schedule_poll(struct mg_mgr *mgr); > > - // If it is a directory, print directory entries too if Depth is not 0 > - if (filep->is_directory && > - !mg_strcasecmp(conn->ctx->config[ENABLE_DIRECTORY_LISTING], "yes") && > - (depth == NULL || strcmp(depth, "0") != 0)) { > - scan_directory(conn, path, conn, &print_dav_dir_entry); > - } > +#endif /* MG_ENABLE_NET_IF_LWIP_LOW_LEVEL */ > > - conn->num_bytes_sent += mg_printf(conn, "%s\n", "</d:multistatus>"); > -} > +#endif /* CS_COMMON_PLATFORMS_LWIP_MG_NET_IF_LWIP_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/lwip/mg_lwip_net_if.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > -#if defined(USE_WEBSOCKET) > +#if MG_ENABLE_NET_IF_LWIP_LOW_LEVEL > > -// START OF SHA-1 code > -// Copyright(c) By Steve Reid <steve@edmweb.com> > -#define SHA1HANDSOFF > -#if defined(__sun) > -#include "solarisfixes.h" > -#endif > +/* Amalgamated: #include "common/mg_mem.h" */ > > -union char64long16 { unsigned char c[64]; uint32_t l[16]; }; > +#include <lwip/init.h> > +#include <lwip/pbuf.h> > +#include <lwip/tcp.h> > +#include <lwip/tcpip.h> > +#if LWIP_VERSION >= 0x01050000 > +#include <lwip/priv/tcp_priv.h> /* For tcp_seg */ > +#else > +#include <lwip/tcp_impl.h> > +#endif > +#include <lwip/udp.h> > > -#define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) > +/* Amalgamated: #include "common/cs_dbg.h" */ > > -static uint32_t blk0(union char64long16 *block, int i) { > - // Forrest: SHA expect BIG_ENDIAN, swap if LITTLE_ENDIAN > - if (!is_big_endian()) { > - block->l[i] = (rol(block->l[i], 24) & 0xFF00FF00) | > - (rol(block->l[i], 8) & 0x00FF00FF); > - } > - return block->l[i]; > -} > +/* > + * Newest versions of LWIP have ip_2_ip4, older have ipX_2_ip, > + * even older have nothing. > + */ > +#ifndef ip_2_ip4 > +#ifdef ipX_2_ip > +#define ip_2_ip4(addr) ipX_2_ip(addr) > +#else > +#define ip_2_ip4(addr) (addr) > +#endif > +#endif > > -#define blk(i) (block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \ > - ^block->l[(i+2)&15]^block->l[i&15],1)) > -#define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(block, i)+0x5A827999+rol(v,5);w=rol(w,30); > -#define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x5A827999+rol(v,5);w=rol(w,30); > -#define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); > -#define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30); > -#define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1D6+rol(v,5);w=rol(w,30); > +/* > + * Depending on whether Mongoose is compiled with ipv6 support, use right > + * lwip functions > + */ > +#if MG_ENABLE_IPV6 > +#define TCP_NEW tcp_new_ip6 > +#define TCP_BIND tcp_bind_ip6 > +#define UDP_BIND udp_bind_ip6 > +#define IPADDR_NTOA(x) ip6addr_ntoa((const ip6_addr_t *)(x)) > +#define SET_ADDR(dst, src) \ > + memcpy((dst)->sin6.sin6_addr.s6_addr, (src)->ip6.addr, \ > + sizeof((dst)->sin6.sin6_addr.s6_addr)) > +#else > +#define TCP_NEW tcp_new > +#define TCP_BIND tcp_bind > +#define UDP_BIND udp_bind > +#define IPADDR_NTOA ipaddr_ntoa > +#define SET_ADDR(dst, src) (dst)->sin.sin_addr.s_addr = ip_2_ip4(src)->addr > +#endif > > -typedef struct { > - uint32_t state[5]; > - uint32_t count[2]; > - unsigned char buffer[64]; > -} SHA1_CTX; > +#if NO_SYS > +#define tcpip_callback(fn, arg) (fn)(arg) > +typedef void (*tcpip_callback_fn)(void *arg); > +#endif > > -static void SHA1Transform(uint32_t state[5], const unsigned char buffer[64]) { > - uint32_t a, b, c, d, e; > - union char64long16 block[1]; > +void mg_lwip_ssl_do_hs(struct mg_connection *nc); > +void mg_lwip_ssl_send(struct mg_connection *nc); > +void mg_lwip_ssl_recv(struct mg_connection *nc); > > - memcpy(block, buffer, 64); > - a = state[0]; > - b = state[1]; > - c = state[2]; > - d = state[3]; > - e = state[4]; > - R0(a,b,c,d,e, 0); R0(e,a,b,c,d, 1); R0(d,e,a,b,c, 2); R0(c,d,e,a,b, 3); > - R0(b,c,d,e,a, 4); R0(a,b,c,d,e, 5); R0(e,a,b,c,d, 6); R0(d,e,a,b,c, 7); > - R0(c,d,e,a,b, 8); R0(b,c,d,e,a, 9); R0(a,b,c,d,e,10); R0(e,a,b,c,d,11); > - R0(d,e,a,b,c,12); R0(c,d,e,a,b,13); R0(b,c,d,e,a,14); R0(a,b,c,d,e,15); > - R1(e,a,b,c,d,16); R1(d,e,a,b,c,17); R1(c,d,e,a,b,18); R1(b,c,d,e,a,19); > - R2(a,b,c,d,e,20); R2(e,a,b,c,d,21); R2(d,e,a,b,c,22); R2(c,d,e,a,b,23); > - R2(b,c,d,e,a,24); R2(a,b,c,d,e,25); R2(e,a,b,c,d,26); R2(d,e,a,b,c,27); > - R2(c,d,e,a,b,28); R2(b,c,d,e,a,29); R2(a,b,c,d,e,30); R2(e,a,b,c,d,31); > - R2(d,e,a,b,c,32); R2(c,d,e,a,b,33); R2(b,c,d,e,a,34); R2(a,b,c,d,e,35); > - R2(e,a,b,c,d,36); R2(d,e,a,b,c,37); R2(c,d,e,a,b,38); R2(b,c,d,e,a,39); > - R3(a,b,c,d,e,40); R3(e,a,b,c,d,41); R3(d,e,a,b,c,42); R3(c,d,e,a,b,43); > - R3(b,c,d,e,a,44); R3(a,b,c,d,e,45); R3(e,a,b,c,d,46); R3(d,e,a,b,c,47); > - R3(c,d,e,a,b,48); R3(b,c,d,e,a,49); R3(a,b,c,d,e,50); R3(e,a,b,c,d,51); > - R3(d,e,a,b,c,52); R3(c,d,e,a,b,53); R3(b,c,d,e,a,54); R3(a,b,c,d,e,55); > - R3(e,a,b,c,d,56); R3(d,e,a,b,c,57); R3(c,d,e,a,b,58); R3(b,c,d,e,a,59); > - R4(a,b,c,d,e,60); R4(e,a,b,c,d,61); R4(d,e,a,b,c,62); R4(c,d,e,a,b,63); > - R4(b,c,d,e,a,64); R4(a,b,c,d,e,65); R4(e,a,b,c,d,66); R4(d,e,a,b,c,67); > - R4(c,d,e,a,b,68); R4(b,c,d,e,a,69); R4(a,b,c,d,e,70); R4(e,a,b,c,d,71); > - R4(d,e,a,b,c,72); R4(c,d,e,a,b,73); R4(b,c,d,e,a,74); R4(a,b,c,d,e,75); > - R4(e,a,b,c,d,76); R4(d,e,a,b,c,77); R4(c,d,e,a,b,78); R4(b,c,d,e,a,79); > - state[0] += a; > - state[1] += b; > - state[2] += c; > - state[3] += d; > - state[4] += e; > - a = b = c = d = e = 0; > - memset(block, '\0', sizeof(block)); > -} > +void mg_lwip_if_init(struct mg_iface *iface); > +void mg_lwip_if_free(struct mg_iface *iface); > +void mg_lwip_if_add_conn(struct mg_connection *nc); > +void mg_lwip_if_remove_conn(struct mg_connection *nc); > +time_t mg_lwip_if_poll(struct mg_iface *iface, int timeout_ms); > > -static void SHA1Init(SHA1_CTX* context) { > - context->state[0] = 0x67452301; > - context->state[1] = 0xEFCDAB89; > - context->state[2] = 0x98BADCFE; > - context->state[3] = 0x10325476; > - context->state[4] = 0xC3D2E1F0; > - context->count[0] = context->count[1] = 0; > -} > +#if defined(RTOS_SDK) || defined(ESP_PLATFORM) > +extern void mgos_lock(); > +extern void mgos_unlock(); > +#else > +#define mgos_lock() > +#define mgos_unlock() > +#endif > > -static void SHA1Update(SHA1_CTX* context, const unsigned char* data, > - uint32_t len) { > - uint32_t i, j; > +static void mg_lwip_recv_common(struct mg_connection *nc, struct pbuf *p); > > - j = context->count[0]; > - if ((context->count[0] += len << 3) < j) > - context->count[1]++; > - context->count[1] += (len>>29); > - j = (j >> 3) & 63; > - if ((j + len) > 63) { > - memcpy(&context->buffer[j], data, (i = 64-j)); > - SHA1Transform(context->state, context->buffer); > - for ( ; i + 63 < len; i += 64) { > - SHA1Transform(context->state, &data[i]); > - } > - j = 0; > +#if LWIP_TCP_KEEPALIVE > +void mg_lwip_set_keepalive_params(struct mg_connection *nc, int idle, > + int interval, int count) { > + if (nc->sock == INVALID_SOCKET || nc->flags & MG_F_UDP) { > + return; > + } > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + struct tcp_pcb *tpcb = cs->pcb.tcp; > + if (idle > 0 && interval > 0 && count > 0) { > + tpcb->keep_idle = idle * 1000; > + tpcb->keep_intvl = interval * 1000; > + tpcb->keep_cnt = count; > + tpcb->so_options |= SOF_KEEPALIVE; > + } else { > + tpcb->so_options &= ~SOF_KEEPALIVE; > } > - else i = 0; > - memcpy(&context->buffer[j], &data[i], len - i); > } > +#elif !defined(MG_NO_LWIP_TCP_KEEPALIVE) > +#warning LWIP TCP keepalive is disabled. Please consider enabling it. > +#endif /* LWIP_TCP_KEEPALIVE */ > > -static void SHA1Final(unsigned char digest[20], SHA1_CTX* context) { > - unsigned i; > - unsigned char finalcount[8], c; > - > - for (i = 0; i < 8; i++) { > - finalcount[i] = (unsigned char)((context->count[(i >= 4 ? 0 : 1)] > - >> ((3-(i & 3)) * 8) ) & 255); > - } > - c = 0200; > - SHA1Update(context, &c, 1); > - while ((context->count[0] & 504) != 448) { > - c = 0000; > - SHA1Update(context, &c, 1); > +static err_t mg_lwip_tcp_conn_cb(void *arg, struct tcp_pcb *tpcb, err_t err) { > + struct mg_connection *nc = (struct mg_connection *) arg; > + DBG(("%p connect to %s:%u = %d", nc, IPADDR_NTOA(ipX_2_ip(&tpcb->remote_ip)), > + tpcb->remote_port, err)); > + if (nc == NULL) { > + tcp_abort(tpcb); > + return ERR_ARG; > } > - SHA1Update(context, finalcount, 8); > - for (i = 0; i < 20; i++) { > - digest[i] = (unsigned char) > - ((context->state[i>>2] >> ((3-(i & 3)) * 8) ) & 255); > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + cs->err = err; > +#if LWIP_TCP_KEEPALIVE > + if (err == 0) mg_lwip_set_keepalive_params(nc, 60, 10, 6); > +#endif > + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); > + return ERR_OK; > +} > + > +static void mg_lwip_tcp_error_cb(void *arg, err_t err) { > + struct mg_connection *nc = (struct mg_connection *) arg; > + DBG(("%p conn error %d", nc, err)); > + if (nc == NULL) return; > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + cs->pcb.tcp = NULL; /* Has already been deallocated */ > + if (nc->flags & MG_F_CONNECTING) { > + cs->err = err; > + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); > + } else { > + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); > } > - memset(context, '\0', sizeof(*context)); > - memset(&finalcount, '\0', sizeof(finalcount)); > } > -// END OF SHA1 CODE > - > -static void base64_encode(const unsigned char *src, int src_len, char *dst) { > - static const char *b64 = > - "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; > - int i, j, a, b, c; > > - for (i = j = 0; i < src_len; i += 3) { > - a = src[i]; > - b = i + 1 >= src_len ? 0 : src[i + 1]; > - c = i + 2 >= src_len ? 0 : src[i + 2]; > - > - dst[j++] = b64[a >> 2]; > - dst[j++] = b64[((a & 3) << 4) | (b >> 4)]; > - if (i + 1 < src_len) { > - dst[j++] = b64[(b & 15) << 2 | (c >> 6)]; > +static err_t mg_lwip_tcp_recv_cb(void *arg, struct tcp_pcb *tpcb, > + struct pbuf *p, err_t err) { > + struct mg_connection *nc = (struct mg_connection *) arg; > + DBG(("%p %p %u %d", nc, tpcb, (p != NULL ? p->tot_len : 0), err)); > + if (p == NULL) { > + if (nc != NULL && !(nc->flags & MG_F_CLOSE_IMMEDIATELY)) { > + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); > + } else { > + /* Tombstoned connection, do nothing. */ > } > - if (i + 2 < src_len) { > - dst[j++] = b64[c & 63]; > + return ERR_OK; > + } else if (nc == NULL) { > + tcp_abort(tpcb); > + return ERR_ARG; > + } > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + /* > + * If we get a chain of more than one segment at once, we need to bump > + * refcount on the subsequent bufs to make them independent. > + */ > + if (p->next != NULL) { > + struct pbuf *q = p->next; > + for (; q != NULL; q = q->next) pbuf_ref(q); > + } > + mgos_lock(); > + if (cs->rx_chain == NULL) { > + cs->rx_offset = 0; > + } else if (pbuf_clen(cs->rx_chain) >= 4) { > + /* ESP SDK has a limited pool of 5 pbufs. We must not hog them all or RX > + * will be completely blocked. We already have at least 4 in the chain, > + * this one is, so we have to make a copy and release this one. */ > + struct pbuf *np = pbuf_alloc(PBUF_RAW, p->tot_len, PBUF_RAM); > + if (np != NULL) { > + pbuf_copy(np, p); > + pbuf_free(p); > + p = np; > } > } > - while (j % 4 != 0) { > - dst[j++] = '='; > - } > - dst[j++] = '\0'; > -} > - > -static void send_websocket_handshake(struct mg_connection *conn) { > - static const char *magic = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; > - char buf[100], sha[20], b64_sha[sizeof(sha) * 2]; > - SHA1_CTX sha_ctx; > - > - mg_snprintf(conn, buf, sizeof(buf), "%s%s", > - mg_get_header(conn, "Sec-WebSocket-Key"), magic); > - SHA1Init(&sha_ctx); > - SHA1Update(&sha_ctx, (unsigned char *) buf, strlen(buf)); > - SHA1Final((unsigned char *) sha, &sha_ctx); > - base64_encode((unsigned char *) sha, sizeof(sha), b64_sha); > - mg_printf(conn, "%s%s%s", > - "HTTP/1.1 101 Switching Protocols\r\n" > - "Upgrade: websocket\r\n" > - "Connection: Upgrade\r\n" > - "Sec-WebSocket-Accept: ", b64_sha, "\r\n\r\n"); > + mgos_unlock(); > + mg_lwip_recv_common(nc, p); > + return ERR_OK; > } > > -static void read_websocket(struct mg_connection *conn) { > - unsigned char *buf = (unsigned char *) conn->buf + conn->request_len; > - int n; > - size_t i, len, mask_len, data_len, header_len, body_len; > - char mem[4 * 1024], *data; > - > - assert(conn->content_len == 0); > - for (;;) { > - header_len = 0; > - if ((body_len = conn->data_len - conn->request_len) >= 2) { > - len = buf[1] & 127; > - mask_len = buf[1] & 128 ? 4 : 0; > - if (len < 126 && body_len >= mask_len) { > - data_len = len; > - header_len = 2 + mask_len; > - } else if (len == 126 && body_len >= 4 + mask_len) { > - header_len = 4 + mask_len; > - data_len = ((((int) buf[2]) << 8) + buf[3]); > - } else if (body_len >= 10 + mask_len) { > - header_len = 10 + mask_len; > - data_len = (((uint64_t) htonl(* (uint32_t *) &buf[2])) << 32) + > - htonl(* (uint32_t *) &buf[6]); > - } > - } > - > - if (header_len > 0) { > - // Allocate space to hold websocket payload > - data = mem; > - if (data_len > sizeof(mem) && (data = malloc(data_len)) == NULL) { > - // Allocation failed, exit the loop and then close the connection > - // TODO: notify user about the failure > - break; > - } > - > - // Read frame payload into the allocated buffer. > - assert(body_len >= header_len); > - if (data_len + header_len > body_len) { > - len = body_len - header_len; > - memcpy(data, buf + header_len, len); > - // TODO: handle pull error > - pull(NULL, conn, data + len, data_len - len); > - conn->data_len = 0; > - } else { > - len = data_len + header_len; > - memcpy(data, buf + header_len, data_len); > - memmove(buf, buf + len, body_len - len); > - conn->data_len -= len; > - } > - > - // Apply mask if necessary > - if (mask_len > 0) { > - for (i = 0; i < data_len; i++) { > - data[i] ^= buf[header_len - mask_len + (i % 4)]; > - } > - } > - > - // Exit the loop if callback signalled to exit, > - // or "connection close" opcode received. > - if ((conn->ctx->callbacks.websocket_data != NULL && > - !conn->ctx->callbacks.websocket_data(conn, buf[0], data, data_len)) || > - (buf[0] & 0xf) == 8) { // Opcode == 8, connection close > - break; > - } > +static void mg_lwip_handle_recv_tcp(struct mg_connection *nc) { > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > > - if (data != mem) { > - free(data); > - } > - // Not breaking the loop, process next websocket frame. > +#if MG_ENABLE_SSL > + if (nc->flags & MG_F_SSL) { > + if (nc->flags & MG_F_SSL_HANDSHAKE_DONE) { > + mg_lwip_ssl_recv(nc); > } else { > - // Buffering websocket request > - if ((n = pull(NULL, conn, conn->buf + conn->data_len, > - conn->buf_size - conn->data_len)) <= 0) { > - break; > - } > - conn->data_len += n; > + mg_lwip_ssl_do_hs(nc); > } > + return; > } > -} > +#endif > > -static void handle_websocket_request(struct mg_connection *conn) { > - if (strcmp(mg_get_header(conn, "Sec-WebSocket-Version"), "13") != 0) { > - send_http_error(conn, 426, "Upgrade Required", "%s", "Upgrade Required"); > - } else if (conn->ctx->callbacks.websocket_connect != NULL && > - conn->ctx->callbacks.websocket_connect(conn) != 0) { > - // Callback has returned non-zero, do not proceed with handshake > - } else { > - send_websocket_handshake(conn); > - if (conn->ctx->callbacks.websocket_ready != NULL) { > - conn->ctx->callbacks.websocket_ready(conn); > + mgos_lock(); > + while (cs->rx_chain != NULL) { > + struct pbuf *seg = cs->rx_chain; > + size_t len = (seg->len - cs->rx_offset); > + char *data = (char *) MG_MALLOC(len); > + if (data == NULL) { > + mgos_unlock(); > + DBG(("OOM")); > + return; > + } > + pbuf_copy_partial(seg, data, len, cs->rx_offset); > + cs->rx_offset += len; > + if (cs->rx_offset == cs->rx_chain->len) { > + cs->rx_chain = pbuf_dechain(cs->rx_chain); > + pbuf_free(seg); > + cs->rx_offset = 0; > } > - read_websocket(conn); > + mgos_unlock(); > + mg_if_recv_tcp_cb(nc, data, len, 1 /* own */); > + mgos_lock(); > } > -} > - > -static int is_websocket_request(const struct mg_connection *conn) { > - const char *host, *upgrade, *connection, *version, *key; > + mgos_unlock(); > > - host = mg_get_header(conn, "Host"); > - upgrade = mg_get_header(conn, "Upgrade"); > - connection = mg_get_header(conn, "Connection"); > - key = mg_get_header(conn, "Sec-WebSocket-Key"); > - version = mg_get_header(conn, "Sec-WebSocket-Version"); > - > - return host != NULL && upgrade != NULL && connection != NULL && > - key != NULL && version != NULL && > - mg_strcasestr(upgrade, "websocket") != NULL && > - mg_strcasestr(connection, "Upgrade") != NULL; > + if (nc->send_mbuf.len > 0) { > + mg_lwip_mgr_schedule_poll(nc->mgr); > + } > } > -#endif // !USE_WEBSOCKET > > -static int isbyte(int n) { > - return n >= 0 && n <= 255; > +static err_t mg_lwip_tcp_sent_cb(void *arg, struct tcp_pcb *tpcb, > + u16_t num_sent) { > + struct mg_connection *nc = (struct mg_connection *) arg; > + DBG(("%p %p %u %p %p", nc, tpcb, num_sent, tpcb->unsent, tpcb->unacked)); > + if (nc == NULL) return ERR_OK; > + if ((nc->flags & MG_F_SEND_AND_CLOSE) && !(nc->flags & MG_F_WANT_WRITE) && > + nc->send_mbuf.len == 0 && tpcb->unsent == NULL && tpcb->unacked == NULL) { > + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); > + } > + return ERR_OK; > } > > -static int parse_net(const char *spec, uint32_t *net, uint32_t *mask) { > - int n, a, b, c, d, slash = 32, len = 0; > +struct mg_lwip_if_connect_tcp_ctx { > + struct mg_connection *nc; > + const union socket_address *sa; > +}; > > - if ((sscanf(spec, "%d.%d.%d.%d/%d%n", &a, &b, &c, &d, &slash, &n) == 5 || > - sscanf(spec, "%d.%d.%d.%d%n", &a, &b, &c, &d, &n) == 4) && > - isbyte(a) && isbyte(b) && isbyte(c) && isbyte(d) && > - slash >= 0 && slash < 33) { > - len = n; > - *net = ((uint32_t)a << 24) | ((uint32_t)b << 16) | ((uint32_t)c << 8) | d; > - *mask = slash ? 0xffffffffU << (32 - slash) : 0; > +static void mg_lwip_if_connect_tcp_tcpip(void *arg) { > + struct mg_lwip_if_connect_tcp_ctx *ctx = > + (struct mg_lwip_if_connect_tcp_ctx *) arg; > + struct mg_connection *nc = ctx->nc; > + const union socket_address *sa = ctx->sa; > + > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + struct tcp_pcb *tpcb = TCP_NEW(); > + cs->pcb.tcp = tpcb; > + ip_addr_t *ip = (ip_addr_t *) &sa->sin.sin_addr.s_addr; > + u16_t port = ntohs(sa->sin.sin_port); > + tcp_arg(tpcb, nc); > + tcp_err(tpcb, mg_lwip_tcp_error_cb); > + tcp_sent(tpcb, mg_lwip_tcp_sent_cb); > + tcp_recv(tpcb, mg_lwip_tcp_recv_cb); > + cs->err = TCP_BIND(tpcb, IP_ADDR_ANY, 0 /* any port */); > + DBG(("%p tcp_bind = %d", nc, cs->err)); > + if (cs->err != ERR_OK) { > + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); > + return; > + } > + cs->err = tcp_connect(tpcb, ip, port, mg_lwip_tcp_conn_cb); > + DBG(("%p tcp_connect %p = %d", nc, tpcb, cs->err)); > + if (cs->err != ERR_OK) { > + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); > + return; > } > - > - return len; > } > > -static int set_throttle(const char *spec, uint32_t remote_ip, const char *uri) { > - int throttle = 0; > - struct vec vec, val; > - uint32_t net, mask; > - char mult; > - double v; > +void mg_lwip_if_connect_tcp(struct mg_connection *nc, > + const union socket_address *sa) { > + struct mg_lwip_if_connect_tcp_ctx ctx = {.nc = nc, .sa = sa}; > + tcpip_callback(mg_lwip_if_connect_tcp_tcpip, &ctx); > +} > > - while ((spec = next_option(spec, &vec, &val)) != NULL) { > - mult = ','; > - if (sscanf(val.ptr, "%lf%c", &v, &mult) < 1 || v < 0 || > - (lowercase(&mult) != 'k' && lowercase(&mult) != 'm' && mult != ',')) { > - continue; > - } > - v *= lowercase(&mult) == 'k' ? 1024 : lowercase(&mult) == 'm' ? 1048576 : 1; > - if (vec.len == 1 && vec.ptr[0] == '*') { > - throttle = (int) v; > - } else if (parse_net(vec.ptr, &net, &mask) > 0) { > - if ((remote_ip & mask) == net) { > - throttle = (int) v; > - } > - } else if (match_prefix(vec.ptr, vec.len, uri) > 0) { > - throttle = (int) v; > +/* > + * Lwip included in the SDKs for nRF5x chips has different type for the > + * callback of `udp_recv()` > + */ > +#if LWIP_VERSION >= 0x01050000 > +static void mg_lwip_udp_recv_cb(void *arg, struct udp_pcb *pcb, struct pbuf *p, > + const ip_addr_t *addr, u16_t port) > +#else > +static void mg_lwip_udp_recv_cb(void *arg, struct udp_pcb *pcb, struct pbuf *p, > + ip_addr_t *addr, u16_t port) > +#endif > +{ > + struct mg_connection *nc = (struct mg_connection *) arg; > + DBG(("%p %s:%u %p %u %u", nc, IPADDR_NTOA(addr), port, p, p->ref, p->len)); > + /* Put address in a separate pbuf and tack it onto the packet. */ > + struct pbuf *sap = > + pbuf_alloc(PBUF_RAW, sizeof(union socket_address), PBUF_RAM); > + if (sap == NULL) { > + pbuf_free(p); > + return; > + } > + union socket_address *sa = (union socket_address *) sap->payload; > +#if LWIP_VERSION >= 0x01050000 > + sa->sin.sin_addr.s_addr = ip_2_ip4(addr)->addr; > +#else > + sa->sin.sin_addr.s_addr = addr->addr; > +#endif > + sa->sin.sin_port = htons(port); > + /* Logic in the recv handler requires that there be exactly one data pbuf. */ > + p = pbuf_coalesce(p, PBUF_RAW); > + pbuf_chain(sap, p); > + mg_lwip_recv_common(nc, sap); > + (void) pcb; > +} > + > +static void mg_lwip_recv_common(struct mg_connection *nc, struct pbuf *p) { > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + mgos_lock(); > + if (cs->rx_chain == NULL) { > + cs->rx_chain = p; > + } else { > + pbuf_chain(cs->rx_chain, p); > + } > + if (!cs->recv_pending) { > + cs->recv_pending = 1; > + mg_lwip_post_signal(MG_SIG_RECV, nc); > + } > + mgos_unlock(); > +} > + > +static void mg_lwip_handle_recv_udp(struct mg_connection *nc) { > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + /* > + * For UDP, RX chain consists of interleaved address and packet bufs: > + * Address pbuf followed by exactly one data pbuf (recv_cb took care of that). > + */ > + while (cs->rx_chain != NULL) { > + struct pbuf *sap = cs->rx_chain; > + struct pbuf *p = sap->next; > + cs->rx_chain = pbuf_dechain(p); > + size_t data_len = p->len; > + char *data = (char *) MG_MALLOC(data_len); > + if (data != NULL) { > + pbuf_copy_partial(p, data, data_len, 0); > + pbuf_free(p); > + mg_if_recv_udp_cb(nc, data, data_len, > + (union socket_address *) sap->payload, sap->len); > + pbuf_free(sap); > + } else { > + pbuf_free(p); > + pbuf_free(sap); > } > } > +} > > - return throttle; > +static void mg_lwip_if_connect_udp_tcpip(void *arg) { > + struct mg_connection *nc = (struct mg_connection *) arg; > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + struct udp_pcb *upcb = udp_new(); > + cs->err = UDP_BIND(upcb, IP_ADDR_ANY, 0 /* any port */); > + DBG(("%p udp_bind %p = %d", nc, upcb, cs->err)); > + if (cs->err == ERR_OK) { > + udp_recv(upcb, mg_lwip_udp_recv_cb, nc); > + cs->pcb.udp = upcb; > + } else { > + udp_remove(upcb); > + } > + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); > } > > -static uint32_t get_remote_ip(const struct mg_connection *conn) { > - return ntohl(* (uint32_t *) &conn->client.rsa.sin.sin_addr); > +void mg_lwip_if_connect_udp(struct mg_connection *nc) { > + tcpip_callback(mg_lwip_if_connect_udp_tcpip, nc); > } > > -#ifdef USE_LUA > +void mg_lwip_accept_conn(struct mg_connection *nc, struct tcp_pcb *tpcb) { > + union socket_address sa; > + SET_ADDR(&sa, &tpcb->remote_ip); > + sa.sin.sin_port = htons(tpcb->remote_port); > + mg_if_accept_tcp_cb(nc, &sa, sizeof(sa.sin)); > +} > > -#ifdef _WIN32 > -static void *mmap(void *addr, int64_t len, int prot, int flags, int fd, > - int offset) { > - HANDLE fh = (HANDLE) _get_osfhandle(fd); > - HANDLE mh = CreateFileMapping(fh, 0, PAGE_READONLY, 0, 0, 0); > - void *p = MapViewOfFile(mh, FILE_MAP_READ, 0, 0, (size_t) len); > - CloseHandle(mh); > - return p; > -} > -#define munmap(x, y) UnmapViewOfFile(x) > -#define MAP_FAILED NULL > -#define MAP_PRIVATE 0 > -#define PROT_READ 0 > -#else > -#include <sys/mman.h> > -#endif > +static void tcp_close_tcpip(void *arg) { > + tcp_close((struct tcp_pcb *) arg); > +} > > -static void handle_request(struct mg_connection *); > +void mg_lwip_handle_accept(struct mg_connection *nc) { > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + if (cs->pcb.tcp == NULL) return; > +#if MG_ENABLE_SSL > + if (cs->lc->flags & MG_F_SSL) { > + if (mg_ssl_if_conn_accept(nc, cs->lc) != MG_SSL_OK) { > + LOG(LL_ERROR, ("SSL error")); > + tcpip_callback(tcp_close_tcpip, cs->pcb.tcp); > + } > + } else > +#endif > + { > + mg_lwip_accept_conn(nc, cs->pcb.tcp); > + } > +} > + > +static err_t mg_lwip_accept_cb(void *arg, struct tcp_pcb *newtpcb, err_t err) { > + struct mg_connection *lc = (struct mg_connection *) arg, *nc; > + struct mg_lwip_conn_state *lcs, *cs; > + struct tcp_pcb_listen *lpcb; > + LOG(LL_DEBUG, > + ("%p conn %p from %s:%u", lc, newtpcb, > + IPADDR_NTOA(ipX_2_ip(&newtpcb->remote_ip)), newtpcb->remote_port)); > + if (lc == NULL) { > + tcp_abort(newtpcb); > + return ERR_ABRT; > + } > + lcs = (struct mg_lwip_conn_state *) lc->sock; > + lpcb = (struct tcp_pcb_listen *) lcs->pcb.tcp; > +#if TCP_LISTEN_BACKLOG > + tcp_accepted(lpcb); > +#endif > + nc = mg_if_accept_new_conn(lc); > + if (nc == NULL) { > + tcp_abort(newtpcb); > + return ERR_ABRT; > + } > + cs = (struct mg_lwip_conn_state *) nc->sock; > + cs->lc = lc; > + cs->pcb.tcp = newtpcb; > + /* We need to set up callbacks before returning because data may start > + * arriving immediately. */ > + tcp_arg(newtpcb, nc); > + tcp_err(newtpcb, mg_lwip_tcp_error_cb); > + tcp_sent(newtpcb, mg_lwip_tcp_sent_cb); > + tcp_recv(newtpcb, mg_lwip_tcp_recv_cb); > +#if LWIP_TCP_KEEPALIVE > + mg_lwip_set_keepalive_params(nc, 60, 10, 6); > +#endif > + mg_lwip_post_signal(MG_SIG_ACCEPT, nc); > + (void) err; > + (void) lpcb; > + return ERR_OK; > +} > > -static int handle_lsp_request(struct mg_connection *, const char *, > - struct file *, struct lua_State *); > +struct mg_lwip_if_listen_ctx { > + struct mg_connection *nc; > + union socket_address *sa; > + int ret; > +}; > > -static int lsp_mg_error(lua_State *L) { > - struct mg_connection *conn = lua_touserdata(L, lua_upvalueindex(1)); > - int top = lua_gettop(L); > - if (top < 1) lua_pushstring(L, "unknown error"); > - // Get mg.onerror. > - lua_getglobal(L, "mg"); > - lua_getfield(L, -1, "onerror"); > - // If mg.onerror is nil, silently stop processing chunks. > - if (lua_isnil(L, -1)) { > - lua_pushinteger(L, 1); > - return 1; > +static void mg_lwip_if_listen_tcp_tcpip(void *arg) { > + struct mg_lwip_if_listen_ctx *ctx = (struct mg_lwip_if_listen_ctx *) arg; > + struct mg_connection *nc = ctx->nc; > + union socket_address *sa = ctx->sa; > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + struct tcp_pcb *tpcb = TCP_NEW(); > + ip_addr_t *ip = (ip_addr_t *) &sa->sin.sin_addr.s_addr; > + u16_t port = ntohs(sa->sin.sin_port); > + cs->err = TCP_BIND(tpcb, ip, port); > + DBG(("%p tcp_bind(%s:%u) = %d", nc, IPADDR_NTOA(ip), port, cs->err)); > + if (cs->err != ERR_OK) { > + tcp_close(tpcb); > + ctx->ret = -1; > + return; > } > - // Call mg.onerror. > - lua_pushvalue(L, top); > - lua_remove(L, top); > - if (lua_pcall(L, 1, 1, 0)) { > - // If mg.onerror fails, cry the error message and stop processing chunks. > - cry(conn, "mg.onerror failed: %s", lua_tostring(L, -1)); > - lua_pushinteger(L, 1); > - return 1; > + tcp_arg(tpcb, nc); > + tpcb = tcp_listen(tpcb); > + cs->pcb.tcp = tpcb; > + tcp_accept(tpcb, mg_lwip_accept_cb); > + ctx->ret = 0; > +} > + > +int mg_lwip_if_listen_tcp(struct mg_connection *nc, union socket_address *sa) { > + struct mg_lwip_if_listen_ctx ctx = {.nc = nc, .sa = sa}; > + tcpip_callback(mg_lwip_if_listen_tcp_tcpip, &ctx); > + return ctx.ret; > +} > + > +static void mg_lwip_if_listen_udp_tcpip(void *arg) { > + struct mg_lwip_if_listen_ctx *ctx = (struct mg_lwip_if_listen_ctx *) arg; > + struct mg_connection *nc = ctx->nc; > + union socket_address *sa = ctx->sa; > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + struct udp_pcb *upcb = udp_new(); > + ip_addr_t *ip = (ip_addr_t *) &sa->sin.sin_addr.s_addr; > + u16_t port = ntohs(sa->sin.sin_port); > + cs->err = UDP_BIND(upcb, ip, port); > + DBG(("%p udb_bind(%s:%u) = %d", nc, IPADDR_NTOA(ip), port, cs->err)); > + if (cs->err != ERR_OK) { > + udp_remove(upcb); > + ctx->ret = -1; > + } else { > + udp_recv(upcb, mg_lwip_udp_recv_cb, nc); > + cs->pcb.udp = upcb; > + ctx->ret = 0; > } > - // Return the return value from mg.onerror. Non-0 = stop processing chunks. > - return 1; > } > > -// Silently stop processing chunks. > -static void lsp_abort(lua_State *L) { > - int top = lua_gettop(L); > - lua_getglobal(L, "mg"); > - lua_pushnil(L); > - lua_setfield(L, -2, "onerror"); > - lua_settop(L, top); > - lua_pushstring(L, "aborting"); > - lua_error(L); > +int mg_lwip_if_listen_udp(struct mg_connection *nc, union socket_address *sa) { > + struct mg_lwip_if_listen_ctx ctx = {.nc = nc, .sa = sa}; > + tcpip_callback(mg_lwip_if_listen_udp_tcpip, &ctx); > + return ctx.ret; > } > > -static int lsp(struct mg_connection *conn, const char *path, > - const char *p, int64_t len, lua_State *L) { > - int i, j, result, pos = 0, lines = 1, lualines = 0; > - char chunkname [MG_BUF_LEN]; > +struct mg_lwip_tcp_write_ctx { > + struct mg_connection *nc; > + const void *data; > + uint16_t len; > + int ret; > +}; > > - for (i = 0; i < len; i++) { > - if (p[i] == '\n') ++lines; > - if (p[i] == '<' && p[i + 1] == '?') { > - for (j = i + 1; j < len ; j++) { > - if (p[j] == '\n') ++lualines; > - if (p[j] == '?' && p[j + 1] == '>') { > - mg_write(conn, p + pos, i - pos); > - lua_pushlightuserdata(L, conn); > - lua_pushcclosure(L, lsp_mg_error, 1); > - snprintf (chunkname, sizeof(chunkname), "@%s+%i", path, lines); > - if (luaL_loadbuffer(L, p + (i + 2), j - (i + 2), chunkname)) { > - lua_pcall(L, 1, 1, 0); > - result = lua_tointeger(L, -1); > - if (result) return result; > - } else { > - lua_pcall(L, 0, 0, 1); > - result = lua_tointeger(L, -1); > - if (result) return result; > - } > - pos = j + 2; > - i = pos - 1; > - break; > - } > - } > - if (lualines > 0) { > - lines += lualines; > - lualines = 0; > - } > - } > +static void tcp_output_tcpip(void *arg) { > + tcp_output((struct tcp_pcb *) arg); > +} > + > +static void mg_lwip_tcp_write_tcpip(void *arg) { > + struct mg_lwip_tcp_write_ctx *ctx = (struct mg_lwip_tcp_write_ctx *) arg; > + struct mg_connection *nc = ctx->nc; > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + struct tcp_pcb *tpcb = cs->pcb.tcp; > + size_t len = MIN(tpcb->mss, MIN(ctx->len, tpcb->snd_buf)); > + size_t unsent, unacked; > + if (len == 0) { > + DBG(("%p no buf avail %u %u %u %p %p", tpcb, tpcb->acked, tpcb->snd_buf, > + tpcb->snd_queuelen, tpcb->unsent, tpcb->unacked)); > + tcpip_callback(tcp_output_tcpip, tpcb); > + ctx->ret = 0; > + return; > } > - > - if (i > pos) { > - mg_write(conn, p + pos, i - pos); > + unsent = (tpcb->unsent != NULL ? tpcb->unsent->len : 0); > + unacked = (tpcb->unacked != NULL ? tpcb->unacked->len : 0); > +/* > + * On ESP8266 we only allow one TCP segment in flight at any given time. > + * This may increase latency and reduce efficiency of tcp windowing, > + * but memory is scarce and precious on that platform so we do this to > + * reduce footprint. > + */ > +#if CS_PLATFORM == CS_P_ESP8266 > + if (unacked > 0) { > + ctx->ret = 0; > + return; > } > - > - return 0; > + len = MIN(len, (TCP_MSS - unsent)); > +#endif > + cs->err = tcp_write(tpcb, ctx->data, len, TCP_WRITE_FLAG_COPY); > + unsent = (tpcb->unsent != NULL ? tpcb->unsent->len : 0); > + unacked = (tpcb->unacked != NULL ? tpcb->unacked->len : 0); > + DBG(("%p tcp_write %u = %d, %u %u", tpcb, len, cs->err, unsent, unacked)); > + if (cs->err != ERR_OK) { > + /* > + * We ignore ERR_MEM because memory will be freed up when the data is sent > + * and we'll retry. > + */ > + ctx->ret = (cs->err == ERR_MEM ? 0 : -1); > + return; > + } > + ctx->ret = len; > } > > -static int lsp_mg_print(lua_State *L) { > - int i, num_args; > - const char *str; > - size_t size; > - struct mg_connection *conn = lua_touserdata(L, lua_upvalueindex(1)); > - > - num_args = lua_gettop(L); > - for (i = 1; i <= num_args; i++) { > - if (lua_isstring(L, i)) { > - str = lua_tolstring(L, i, &size); > - mg_write(conn, str, size); > - } > +static int mg_lwip_tcp_write(struct mg_connection *nc, const void *data, > + uint16_t len) { > + struct mg_lwip_tcp_write_ctx ctx = {.nc = nc, .data = data, .len = len}; > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + struct tcp_pcb *tpcb = cs->pcb.tcp; > + if (tpcb == NULL) { > + return -1; > } > - > - return 0; > + tcpip_callback(mg_lwip_tcp_write_tcpip, &ctx); > + return ctx.ret; > } > > -static int lsp_mg_read(lua_State *L) { > - struct mg_connection *conn = lua_touserdata(L, lua_upvalueindex(1)); > - char buf[1024]; > - int len = mg_read(conn, buf, sizeof(buf)); > - > - lua_settop(L, 0); > - lua_pushlstring(L, buf, len); > +struct udp_sendto_ctx { > + struct udp_pcb *upcb; > + struct pbuf *p; > + ip_addr_t *ip; > + uint16_t port; > + int ret; > +}; > > - return 1; > +static void udp_sendto_tcpip(void *arg) { > + struct udp_sendto_ctx *ctx = (struct udp_sendto_ctx *) arg; > + ctx->ret = udp_sendto(ctx->upcb, ctx->p, ctx->ip, ctx->port); > +} > + > +static int mg_lwip_udp_send(struct mg_connection *nc, const void *data, > + uint16_t len) { > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + if (cs->pcb.udp == NULL) { > + /* > + * In case of UDP, this usually means, what > + * async DNS resolve is still in progress and connection > + * is not ready yet > + */ > + DBG(("%p socket is not connected", nc)); > + return -1; > + } > + struct udp_pcb *upcb = cs->pcb.udp; > + struct pbuf *p = pbuf_alloc(PBUF_TRANSPORT, len, PBUF_RAM); > +#if defined(LWIP_IPV4) && LWIP_IPV4 && defined(LWIP_IPV6) && LWIP_IPV6 > + ip_addr_t ip = {.u_addr.ip4.addr = nc->sa.sin.sin_addr.s_addr, .type = 0}; > +#else > + ip_addr_t ip = {.addr = nc->sa.sin.sin_addr.s_addr}; > +#endif > + u16_t port = ntohs(nc->sa.sin.sin_port); > + if (p == NULL) { > + DBG(("OOM")); > + return 0; > + } > + memcpy(p->payload, data, len); > + struct udp_sendto_ctx ctx = {.upcb = upcb, .p = p, .ip = &ip, .port = port}; > + tcpip_callback(udp_sendto_tcpip, &ctx); > + cs->err = ctx.ret; > + pbuf_free(p); > + return (cs->err == ERR_OK ? len : -1); > } > > -// mg.include: Include another .lp file > -static int lsp_mod_include(lua_State *L) { > - struct mg_connection *conn = lua_touserdata(L, lua_upvalueindex(1)); > - struct file file = STRUCT_FILE_INITIALIZER; > - if (handle_lsp_request(conn, lua_tostring(L, -1), &file, L)) { > - // handle_lsp_request returned an error code, meaning an error occurred in > - // the included page and mg.onerror returned non-zero. Stop processing. > - lsp_abort(L); > +static void mg_lwip_send_more(struct mg_connection *nc) { > + int num_sent = 0; > + if (nc->sock == INVALID_SOCKET) return; > + if (nc->flags & MG_F_UDP) { > + num_sent = mg_lwip_udp_send(nc, nc->send_mbuf.buf, nc->send_mbuf.len); > + DBG(("%p mg_lwip_udp_send %u = %d", nc, nc->send_mbuf.len, num_sent)); > + } else { > + num_sent = mg_lwip_tcp_write(nc, nc->send_mbuf.buf, nc->send_mbuf.len); > + DBG(("%p mg_lwip_tcp_write %u = %d", nc, nc->send_mbuf.len, num_sent)); > + } > + if (num_sent == 0) return; > + if (num_sent > 0) { > + mg_if_sent_cb(nc, num_sent); > + } else { > + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); > } > - return 0; > } > > -// mg.cry: Log an error. Default value for mg.onerror. > -static int lsp_mod_cry(lua_State *L){ > - struct mg_connection *conn = lua_touserdata(L, lua_upvalueindex(1)); > - cry(conn, "%s", lua_tostring(L, -1)); > - return 0; > +void mg_lwip_if_tcp_send(struct mg_connection *nc, const void *buf, > + size_t len) { > + mbuf_append(&nc->send_mbuf, buf, len); > + mg_lwip_mgr_schedule_poll(nc->mgr); > } > > -// mg.redirect: Redirect the request (internally). > -static int lsp_mod_redirect(lua_State *L) { > - struct mg_connection *conn = lua_touserdata(L, lua_upvalueindex(1)); > - conn->request_info.uri = lua_tostring(L, -1); > - handle_request(conn); > - lsp_abort(L); > - return 0; > +void mg_lwip_if_udp_send(struct mg_connection *nc, const void *buf, > + size_t len) { > + mbuf_append(&nc->send_mbuf, buf, len); > + mg_lwip_mgr_schedule_poll(nc->mgr); > } > > -static void reg_string(struct lua_State *L, const char *name, const char *val) { > - lua_pushstring(L, name); > - lua_pushstring(L, val); > - lua_rawset(L, -3); > -} > +struct tcp_recved_ctx { > + struct tcp_pcb *tpcb; > + size_t len; > +}; > > -static void reg_int(struct lua_State *L, const char *name, int val) { > - lua_pushstring(L, name); > - lua_pushinteger(L, val); > - lua_rawset(L, -3); > +void tcp_recved_tcpip(void *arg) { > + struct tcp_recved_ctx *ctx = (struct tcp_recved_ctx *) arg; > + tcp_recved(ctx->tpcb, ctx->len); > } > > -static void reg_function(struct lua_State *L, const char *name, > - lua_CFunction func, struct mg_connection *conn) { > - lua_pushstring(L, name); > - lua_pushlightuserdata(L, conn); > - lua_pushcclosure(L, func, 1); > - lua_rawset(L, -3); > +void mg_lwip_if_recved(struct mg_connection *nc, size_t len) { > + if (nc->flags & MG_F_UDP) return; > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + if (nc->sock == INVALID_SOCKET || cs->pcb.tcp == NULL) { > + DBG(("%p invalid socket", nc)); > + return; > + } > + DBG(("%p %p %u %u", nc, cs->pcb.tcp, len, > + (cs->rx_chain ? cs->rx_chain->tot_len : 0))); > + struct tcp_recved_ctx ctx = {.tpcb = cs->pcb.tcp, .len = len}; > +#if MG_ENABLE_SSL > + if (!(nc->flags & MG_F_SSL)) { > + tcpip_callback(tcp_recved_tcpip, &ctx); > + } else { > + /* Currently SSL acknowledges data immediately. > + * TODO(rojer): Find a way to propagate mg_lwip_if_recved. */ > + } > +#else > + tcpip_callback(tcp_recved_tcpip, &ctx); > +#endif > + mbuf_trim(&nc->recv_mbuf); > } > > -static void prepare_lua_environment(struct mg_connection *conn, lua_State *L) { > - const struct mg_request_info *ri = mg_get_request_info(conn); > - extern void luaL_openlibs(lua_State *); > - int i; > - > - luaL_openlibs(L); > -#ifdef USE_LUA_SQLITE3 > - { extern int luaopen_lsqlite3(lua_State *); luaopen_lsqlite3(L); } > -#endif > - > - // Register "print" function which calls mg_write() > - lua_pushlightuserdata(L, conn); > - lua_pushcclosure(L, lsp_mg_print, 1); > - lua_setglobal(L, "print"); > - > - // Register mg_read() > - lua_pushlightuserdata(L, conn); > - lua_pushcclosure(L, lsp_mg_read, 1); > - lua_setglobal(L, "read"); > - > - // Register mg module > - lua_newtable(L); > - reg_function(L, "cry", lsp_mod_cry, conn); > - reg_function(L, "include", lsp_mod_include, conn); > - reg_function(L, "onerror", lsp_mod_cry, conn); > - reg_function(L, "redirect", lsp_mod_redirect, conn); > - reg_string(L, "version", MONGOOSE_VERSION); > - lua_setglobal(L, "mg"); > - > - // Export request_info > - lua_newtable(L); > - reg_string(L, "request_method", ri->request_method); > - reg_string(L, "uri", ri->uri); > - reg_string(L, "http_version", ri->http_version); > - reg_string(L, "query_string", ri->query_string); > - reg_int(L, "remote_ip", ri->remote_ip); > - reg_int(L, "remote_port", ri->remote_port); > - reg_int(L, "num_headers", ri->num_headers); > - lua_pushstring(L, "http_headers"); > - lua_newtable(L); > - for (i = 0; i < ri->num_headers; i++) { > - reg_string(L, ri->http_headers[i].name, ri->http_headers[i].value); > - } > - lua_rawset(L, -3); > - lua_setglobal(L, "request_info"); > -} > - > -// Throw a lua error. Called from handle_lsp_request via mg.include > -static void send_lua_error(struct lua_State *L, > - PRINTF_FORMAT_STRING(const char *fmt), ...) > - PRINTF_ARGS(2, 3); > - > -static void send_lua_error(struct lua_State *L, const char *fmt, ...) { > - char buf[MG_BUF_LEN]; > - va_list ap; > - int len = 0; > - > - va_start(ap, fmt); > - len += vsnprintf(buf + len, sizeof(buf) - len, fmt, ap); > - va_end(ap); > - > - lua_pushstring(L, buf); > - lua_error(L); > +int mg_lwip_if_create_conn(struct mg_connection *nc) { > + struct mg_lwip_conn_state *cs = > + (struct mg_lwip_conn_state *) MG_CALLOC(1, sizeof(*cs)); > + if (cs == NULL) return 0; > + cs->nc = nc; > + nc->sock = (intptr_t) cs; > + return 1; > } > > -static int handle_lsp_request(struct mg_connection *conn, const char *path, > - struct file *filep, struct lua_State *ls) { > - void *p = NULL; > - lua_State *L = NULL; > - int error = 1; > +static void udp_remove_tcpip(void *arg) { > + udp_remove((struct udp_pcb *) arg); > +} > > - if (!mg_stat(conn, path, filep) || !mg_fopen(conn, path, "r", filep)) { > - if (ls == NULL) { > - send_http_error(conn, 404, "Not Found", "%s", "File not found"); > - } else { > - send_lua_error(ls, "File not found: %s", path); > - } > - } else if (filep->membuf == NULL && > - (p = mmap(NULL, (size_t) filep->size, PROT_READ, MAP_PRIVATE, > - fileno(filep->fp), 0)) == MAP_FAILED) { > - if (ls == NULL) { > - send_http_error(conn, 500, http_500_error, "mmap(%s, %zu, %d): %s", path, > - (size_t) filep->size, fileno(filep->fp), strerror(errno)); > - } else { > - send_lua_error(ls, "mmap(%s, %zu, %d): %s", path, > - (size_t) filep->size, fileno(filep->fp), strerror(errno)); > +void mg_lwip_if_destroy_conn(struct mg_connection *nc) { > + if (nc->sock == INVALID_SOCKET) return; > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + if (!(nc->flags & MG_F_UDP)) { > + struct tcp_pcb *tpcb = cs->pcb.tcp; > + if (tpcb != NULL) { > + tcp_arg(tpcb, NULL); > + DBG(("%p tcp_close %p", nc, tpcb)); > + tcp_arg(tpcb, NULL); > + tcpip_callback(tcp_close_tcpip, tpcb); > + } > + while (cs->rx_chain != NULL) { > + struct pbuf *seg = cs->rx_chain; > + cs->rx_chain = pbuf_dechain(cs->rx_chain); > + pbuf_free(seg); > + } > + memset(cs, 0, sizeof(*cs)); > + MG_FREE(cs); > + } else if (nc->listener == NULL) { > + /* Only close outgoing UDP pcb or listeners. */ > + struct udp_pcb *upcb = cs->pcb.udp; > + if (upcb != NULL) { > + DBG(("%p udp_remove %p", nc, upcb)); > + tcpip_callback(udp_remove_tcpip, upcb); > + } > + memset(cs, 0, sizeof(*cs)); > + MG_FREE(cs); > + } > + nc->sock = INVALID_SOCKET; > +} > + > +void mg_lwip_if_get_conn_addr(struct mg_connection *nc, int remote, > + union socket_address *sa) { > + memset(sa, 0, sizeof(*sa)); > + if (nc == NULL || nc->sock == INVALID_SOCKET) return; > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + if (nc->flags & MG_F_UDP) { > + struct udp_pcb *upcb = cs->pcb.udp; > + if (remote) { > + memcpy(sa, &nc->sa, sizeof(*sa)); > + } else if (upcb != NULL) { > + sa->sin.sin_port = htons(upcb->local_port); > + SET_ADDR(sa, &upcb->local_ip); > } > - } else if ((L = ls != NULL ? ls : luaL_newstate()) == NULL) { > - send_http_error(conn, 500, http_500_error, "%s", "luaL_newstate failed"); > } else { > - // We're not sending HTTP headers here, Lua page must do it. > - if (ls == NULL) { > - prepare_lua_environment(conn, L); > - if (conn->ctx->callbacks.init_lua != NULL) { > - conn->ctx->callbacks.init_lua(conn, L); > - } > + struct tcp_pcb *tpcb = cs->pcb.tcp; > + if (remote) { > + memcpy(sa, &nc->sa, sizeof(*sa)); > + } else if (tpcb != NULL) { > + sa->sin.sin_port = htons(tpcb->local_port); > + SET_ADDR(sa, &tpcb->local_ip); > } > - error = lsp(conn, path, filep->membuf == NULL ? p : filep->membuf, > - filep->size, L); > } > - > - if (L && ls == NULL) lua_close(L); > - if (p) munmap(p, filep->size); > - mg_fclose(filep); > - return error; > } > -#endif // USE_LUA > > -int mg_upload(struct mg_connection *conn, const char *destination_dir) { > - const char *content_type_header, *boundary_start; > - char buf[MG_BUF_LEN], path[PATH_MAX], fname[1024], boundary[100], *s; > - FILE *fp; > - int bl, n, i, j, headers_len, boundary_len, len = 0, num_uploaded_files = 0; > - > - // Request looks like this: > - // > - // POST /upload HTTP/1.1 > - // Host: 127.0.0.1:8080 > - // Content-Length: 244894 > - // Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryRVr > - // > - // ------WebKitFormBoundaryRVr > - // Content-Disposition: form-data; name="file"; filename="accum.png" > - // Content-Type: image/png > - // > - // <89>PNG > - // <PNG DATA> > - // ------WebKitFormBoundaryRVr > - > - // Extract boundary string from the Content-Type header > - if ((content_type_header = mg_get_header(conn, "Content-Type")) == NULL || > - (boundary_start = mg_strcasestr(content_type_header, > - "boundary=")) == NULL || > - (sscanf(boundary_start, "boundary=\"%99[^\"]\"", boundary) == 0 && > - sscanf(boundary_start, "boundary=%99s", boundary) == 0) || > - boundary[0] == '\0') { > - return num_uploaded_files; > - } > - > - boundary_len = strlen(boundary); > - bl = boundary_len + 4; // \r\n--<boundary> > - for (;;) { > - // Pull in headers > - assert(len >= 0 && len <= (int) sizeof(buf)); > - while ((n = mg_read(conn, buf + len, sizeof(buf) - len)) > 0) { > - len += n; > - } > - if ((headers_len = get_request_len(buf, len)) <= 0) { > - break; > - } > +void mg_lwip_if_sock_set(struct mg_connection *nc, sock_t sock) { > + nc->sock = sock; > +} > + > +/* clang-format off */ > +#define MG_LWIP_IFACE_VTABLE \ > + { \ > + mg_lwip_if_init, \ > + mg_lwip_if_free, \ > + mg_lwip_if_add_conn, \ > + mg_lwip_if_remove_conn, \ > + mg_lwip_if_poll, \ > + mg_lwip_if_listen_tcp, \ > + mg_lwip_if_listen_udp, \ > + mg_lwip_if_connect_tcp, \ > + mg_lwip_if_connect_udp, \ > + mg_lwip_if_tcp_send, \ > + mg_lwip_if_udp_send, \ > + mg_lwip_if_recved, \ > + mg_lwip_if_create_conn, \ > + mg_lwip_if_destroy_conn, \ > + mg_lwip_if_sock_set, \ > + mg_lwip_if_get_conn_addr, \ > + } > +/* clang-format on */ > + > +const struct mg_iface_vtable mg_lwip_iface_vtable = MG_LWIP_IFACE_VTABLE; > +#if MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL > +const struct mg_iface_vtable mg_default_iface_vtable = MG_LWIP_IFACE_VTABLE; > +#endif > > - // Fetch file name. > - fname[0] = '\0'; > - for (i = j = 0; i < headers_len; i++) { > - if (buf[i] == '\r' && buf[i + 1] == '\n') { > - buf[i] = buf[i + 1] = '\0'; > - // TODO(lsm): don't expect filename to be the 3rd field, > - // parse the header properly instead. > - sscanf(&buf[j], "Content-Disposition: %*s %*s filename=\"%1023[^\"]", > - fname); > - j = i + 2; > - } > - } > +#endif /* MG_ENABLE_NET_IF_LWIP_LOW_LEVEL */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/lwip/mg_lwip_ev_mgr.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > - // Give up if the headers are not what we expect > - if (fname[0] == '\0') { > - break; > - } > +#if MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL > > - // Move data to the beginning of the buffer > - assert(len >= headers_len); > - memmove(buf, &buf[headers_len], len - headers_len); > - len -= headers_len; > +#ifndef MG_SIG_QUEUE_LEN > +#define MG_SIG_QUEUE_LEN 32 > +#endif > > - // We open the file with exclusive lock held. This guarantee us > - // there is no other thread can save into the same file simultaneously. > - fp = NULL; > - // Construct destination file name. Do not allow paths to have slashes. > - if ((s = strrchr(fname, '/')) == NULL) { > - s = fname; > - } > - // Open file in binary mode. TODO: set an exclusive lock. > - snprintf(path, sizeof(path), "%s/%s", destination_dir, s); > - if ((fp = fopen(path, "wb")) == NULL) { > - break; > - } > +struct mg_ev_mgr_lwip_signal { > + int sig; > + struct mg_connection *nc; > +}; > > - // Read POST data, write into file until boundary is found. > - n = 0; > - do { > - len += n; > - for (i = 0; i < len - bl; i++) { > - if (!memcmp(&buf[i], "\r\n--", 4) && > - !memcmp(&buf[i + 4], boundary, boundary_len)) { > - // Found boundary, that's the end of file data. > - fwrite(buf, 1, i, fp); > - fflush(fp); > - num_uploaded_files++; > - if (conn->ctx->callbacks.upload != NULL) { > - conn->ctx->callbacks.upload(conn, path); > - } > - memmove(buf, &buf[i + bl], len - (i + bl)); > - len -= i + bl; > - break; > +struct mg_ev_mgr_lwip_data { > + struct mg_ev_mgr_lwip_signal sig_queue[MG_SIG_QUEUE_LEN]; > + int sig_queue_len; > + int start_index; > +}; > + > +void mg_lwip_post_signal(enum mg_sig_type sig, struct mg_connection *nc) { > + struct mg_ev_mgr_lwip_data *md = > + (struct mg_ev_mgr_lwip_data *) nc->iface->data; > + mgos_lock(); > + if (md->sig_queue_len >= MG_SIG_QUEUE_LEN) { > + mgos_unlock(); > + return; > + } > + int end_index = (md->start_index + md->sig_queue_len) % MG_SIG_QUEUE_LEN; > + md->sig_queue[end_index].sig = sig; > + md->sig_queue[end_index].nc = nc; > + md->sig_queue_len++; > + mg_lwip_mgr_schedule_poll(nc->mgr); > + mgos_unlock(); > +} > + > +void mg_ev_mgr_lwip_process_signals(struct mg_mgr *mgr) { > + struct mg_ev_mgr_lwip_data *md = > + (struct mg_ev_mgr_lwip_data *) mgr->ifaces[MG_MAIN_IFACE]->data; > + while (md->sig_queue_len > 0) { > + mgos_lock(); > + int sig = md->sig_queue[md->start_index].sig; > + struct mg_connection *nc = md->sig_queue[md->start_index].nc; > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + md->start_index = (md->start_index + 1) % MG_SIG_QUEUE_LEN; > + md->sig_queue_len--; > + mgos_unlock(); > + if (nc->iface == NULL || nc->mgr == NULL) continue; > + switch (sig) { > + case MG_SIG_CONNECT_RESULT: { > +#if MG_ENABLE_SSL > + if (cs->err == 0 && (nc->flags & MG_F_SSL) && > + !(nc->flags & MG_F_SSL_HANDSHAKE_DONE)) { > + mg_lwip_ssl_do_hs(nc); > + } else > +#endif > + { > + mg_if_connect_cb(nc, cs->err); > + } > + break; > + } > + case MG_SIG_CLOSE_CONN: { > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + mg_close_conn(nc); > + break; > + } > + case MG_SIG_RECV: { > + cs->recv_pending = 0; > + if (nc->flags & MG_F_UDP) { > + mg_lwip_handle_recv_udp(nc); > + } else { > + mg_lwip_handle_recv_tcp(nc); > } > + break; > } > - if (len > bl) { > - fwrite(buf, 1, len - bl, fp); > - memmove(buf, &buf[len - bl], bl); > - len = bl; > + case MG_SIG_TOMBSTONE: { > + break; > } > - } while ((n = mg_read(conn, buf + len, sizeof(buf) - len)) > 0); > - fclose(fp); > - } > - > - return num_uploaded_files; > -} > - > -static int is_put_or_delete_request(const struct mg_connection *conn) { > - const char *s = conn->request_info.request_method; > - return s != NULL && (!strcmp(s, "PUT") || !strcmp(s, "DELETE")); > -} > - > -static int get_first_ssl_listener_index(const struct mg_context *ctx) { > - int i, index = -1; > - for (i = 0; index == -1 && i < ctx->num_listening_sockets; i++) { > - index = ctx->listening_sockets[i].is_ssl ? i : -1; > - } > - return index; > -} > - > -static void redirect_to_https_port(struct mg_connection *conn, int ssl_index) { > - char host[1025]; > - const char *host_header; > - > - if ((host_header = mg_get_header(conn, "Host")) == NULL || > - sscanf(host_header, "%1024[^:]", host) == 0) { > - // Cannot get host from the Host: header. Fallback to our IP address. > - sockaddr_to_string(host, sizeof(host), &conn->client.lsa); > - } > - > - mg_printf(conn, "HTTP/1.1 302 Found\r\nLocation: https://%s:%d%s\r\n\r\n", > - host, (int) ntohs(conn->ctx->listening_sockets[ssl_index]. > - lsa.sin.sin_port), conn->request_info.uri); > -} > - > -// This is the heart of the Mongoose's logic. > -// This function is called when the request is read, parsed and validated, > -// and Mongoose must decide what action to take: serve a file, or > -// a directory, or call embedded function, etcetera. > -static void handle_request(struct mg_connection *conn) { > - struct mg_request_info *ri = &conn->request_info; > - char path[PATH_MAX]; > - int uri_len, ssl_index; > - struct file file = STRUCT_FILE_INITIALIZER; > - > - if ((conn->request_info.query_string = strchr(ri->uri, '?')) != NULL) { > - * ((char *) conn->request_info.query_string++) = '\0'; > - } > - uri_len = (int) strlen(ri->uri); > - url_decode(ri->uri, uri_len, (char *) ri->uri, uri_len + 1, 0); > - remove_double_dots_and_double_slashes((char *) ri->uri); > - convert_uri_to_file_name(conn, path, sizeof(path), &file); > - conn->throttle = set_throttle(conn->ctx->config[THROTTLE], > - get_remote_ip(conn), ri->uri); > - > - DEBUG_TRACE(("%s", ri->uri)); > - // Perform redirect and auth checks before calling begin_request() handler. > - // Otherwise, begin_request() would need to perform auth checks and redirects. > - if (!conn->client.is_ssl && conn->client.ssl_redir && > - (ssl_index = get_first_ssl_listener_index(conn->ctx)) > -1) { > - redirect_to_https_port(conn, ssl_index); > - } else if (!is_put_or_delete_request(conn) && > - !check_authorization(conn, path)) { > - send_authorization_request(conn); > - } else if (conn->ctx->callbacks.begin_request != NULL && > - conn->ctx->callbacks.begin_request(conn)) { > - // Do nothing, callback has served the request > -#if defined(USE_WEBSOCKET) > - } else if (is_websocket_request(conn)) { > - handle_websocket_request(conn); > -#endif > - } else if (!strcmp(ri->request_method, "OPTIONS")) { > - send_options(conn); > - } else if (conn->ctx->config[DOCUMENT_ROOT] == NULL) { > - send_http_error(conn, 404, "Not Found", "Not Found"); > - } else if (is_put_or_delete_request(conn) && > - (conn->ctx->config[PUT_DELETE_PASSWORDS_FILE] == NULL || > - is_authorized_for_put(conn) != 1)) { > - send_authorization_request(conn); > - } else if (!strcmp(ri->request_method, "PUT")) { > - put_file(conn, path); > - } else if (!strcmp(ri->request_method, "DELETE")) { > - if (mg_remove(path) == 0) { > - send_http_error(conn, 200, "OK", "%s", ""); > - } else { > - send_http_error(conn, 500, http_500_error, "remove(%s): %s", path, > - strerror(ERRNO)); > - } > - } else if ((file.membuf == NULL && file.modification_time == (time_t) 0) || > - must_hide_file(conn, path)) { > - send_http_error(conn, 404, "Not Found", "%s", "File not found"); > - } else if (file.is_directory && ri->uri[uri_len - 1] != '/') { > - mg_printf(conn, "HTTP/1.1 301 Moved Permanently\r\n" > - "Location: %s/\r\n\r\n", ri->uri); > - } else if (!strcmp(ri->request_method, "PROPFIND")) { > - handle_propfind(conn, path, &file); > - } else if (file.is_directory && > - !substitute_index_file(conn, path, sizeof(path), &file)) { > - if (!mg_strcasecmp(conn->ctx->config[ENABLE_DIRECTORY_LISTING], "yes")) { > - handle_directory_request(conn, path); > - } else { > - send_http_error(conn, 403, "Directory Listing Denied", > - "Directory listing denied"); > - } > -#ifdef USE_LUA > - } else if (match_prefix("**.lp$", 6, path) > 0) { > - handle_lsp_request(conn, path, &file, NULL); > -#endif > -#if !defined(NO_CGI) > - } else if (match_prefix(conn->ctx->config[CGI_EXTENSIONS], > - strlen(conn->ctx->config[CGI_EXTENSIONS]), > - path) > 0) { > - if (strcmp(ri->request_method, "POST") && > - strcmp(ri->request_method, "HEAD") && > - strcmp(ri->request_method, "GET")) { > - send_http_error(conn, 501, "Not Implemented", > - "Method %s is not implemented", ri->request_method); > - } else { > - handle_cgi_request(conn, path); > - } > -#endif // !NO_CGI > - } else if (match_prefix(conn->ctx->config[SSI_EXTENSIONS], > - strlen(conn->ctx->config[SSI_EXTENSIONS]), > - path) > 0) { > - handle_ssi_file_request(conn, path); > - } else if (is_not_modified(conn, &file)) { > - send_http_error(conn, 304, "Not Modified", "%s", ""); > - } else { > - handle_file_request(conn, path, &file); > + case MG_SIG_ACCEPT: { > + mg_lwip_handle_accept(nc); > + break; > + } > + } > } > } > > -static void close_all_listening_sockets(struct mg_context *ctx) { > - int i; > - for (i = 0; i < ctx->num_listening_sockets; i++) { > - closesocket(ctx->listening_sockets[i].sock); > - } > - free(ctx->listening_sockets); > -} > - > -// Valid listening port specification is: [ip_address:]port[s] > -// Examples: 80, 443s, 127.0.0.1:3128, 1.2.3.4:8080s > -// TODO(lsm): add parsing of the IPv6 address > -static int parse_port_string(const struct vec *vec, struct socket *so) { > - int a, b, c, d, port, len; > - > - // MacOS needs that. If we do not zero it, subsequent bind() will fail. > - // Also, all-zeroes in the socket address means binding to all addresses > - // for both IPv4 and IPv6 (INADDR_ANY and IN6ADDR_ANY_INIT). > - memset(so, 0, sizeof(*so)); > - > - if (sscanf(vec->ptr, "%d.%d.%d.%d:%d%n", &a, &b, &c, &d, &port, &len) == 5) { > - // Bind to a specific IPv4 address > - so->lsa.sin.sin_addr.s_addr = htonl((a << 24) | (b << 16) | (c << 8) | d); > - } else if (sscanf(vec->ptr, "%d%n", &port, &len) != 1 || > - len <= 0 || > - len > (int) vec->len || > - (vec->ptr[len] && vec->ptr[len] != 's' && > - vec->ptr[len] != 'r' && vec->ptr[len] != ',')) { > - return 0; > - } > +void mg_lwip_if_init(struct mg_iface *iface) { > + LOG(LL_INFO, ("%p Mongoose init", iface)); > + iface->data = MG_CALLOC(1, sizeof(struct mg_ev_mgr_lwip_data)); > +} > > - so->is_ssl = vec->ptr[len] == 's'; > - so->ssl_redir = vec->ptr[len] == 'r'; > -#if defined(USE_IPV6) > - so->lsa.sin6.sin6_family = AF_INET6; > - so->lsa.sin6.sin6_port = htons((uint16_t) port); > -#else > - so->lsa.sin.sin_family = AF_INET; > - so->lsa.sin.sin_port = htons((uint16_t) port); > -#endif > +void mg_lwip_if_free(struct mg_iface *iface) { > + MG_FREE(iface->data); > + iface->data = NULL; > +} > > - return 1; > +void mg_lwip_if_add_conn(struct mg_connection *nc) { > + (void) nc; > } > > -static int set_ports_option(struct mg_context *ctx) { > - const char *list = ctx->config[LISTENING_PORTS]; > - int on = 1, success = 1; > -#if defined(USE_IPV6) > - int off = 0; > -#endif > - struct vec vec; > - struct socket so; > - > - while (success && (list = next_option(list, &vec, NULL)) != NULL) { > - if (!parse_port_string(&vec, &so)) { > - cry(fc(ctx), "%s: %.*s: invalid port spec. Expecting list of: %s", > - __func__, (int) vec.len, vec.ptr, "[IP_ADDRESS:]PORT[s|p]"); > - success = 0; > - } else if (so.is_ssl && ctx->ssl_ctx == NULL) { > - cry(fc(ctx), "Cannot add SSL socket, is -ssl_certificate option set?"); > - success = 0; > - } else if ((so.sock = socket(so.lsa.sa.sa_family, SOCK_STREAM, 6)) == > - INVALID_SOCKET || > - // On Windows, SO_REUSEADDR is recommended only for > - // broadcast UDP sockets > - setsockopt(so.sock, SOL_SOCKET, SO_REUSEADDR, > - (void *) &on, sizeof(on)) != 0 || > -#if defined(USE_IPV6) > - setsockopt(so.sock, IPPROTO_IPV6, IPV6_V6ONLY, (void *) &off, > - sizeof(off)) != 0 || > -#endif > - bind(so.sock, &so.lsa.sa, sizeof(so.lsa)) != 0 || > - listen(so.sock, SOMAXCONN) != 0) { > - cry(fc(ctx), "%s: cannot bind to %.*s: %s", __func__, > - (int) vec.len, vec.ptr, strerror(ERRNO)); > - closesocket(so.sock); > - success = 0; > - } else { > - set_close_on_exec(so.sock); > - // TODO: handle realloc failure > - ctx->listening_sockets = realloc(ctx->listening_sockets, > - (ctx->num_listening_sockets + 1) * > - sizeof(ctx->listening_sockets[0])); > - ctx->listening_sockets[ctx->num_listening_sockets] = so; > - ctx->num_listening_sockets++; > +void mg_lwip_if_remove_conn(struct mg_connection *nc) { > + struct mg_ev_mgr_lwip_data *md = > + (struct mg_ev_mgr_lwip_data *) nc->iface->data; > + /* Walk the queue and null-out further signals for this conn. */ > + for (int i = 0; i < MG_SIG_QUEUE_LEN; i++) { > + if (md->sig_queue[i].nc == nc) { > + md->sig_queue[i].sig = MG_SIG_TOMBSTONE; > } > } > - > - if (!success) { > - close_all_listening_sockets(ctx); > - } > - > - return success; > } > > -static void log_header(const struct mg_connection *conn, const char *header, > - FILE *fp) { > - const char *header_value; > - > - if ((header_value = mg_get_header(conn, header)) == NULL) { > - (void) fprintf(fp, "%s", " -"); > - } else { > - (void) fprintf(fp, " \"%s\"", header_value); > +time_t mg_lwip_if_poll(struct mg_iface *iface, int timeout_ms) { > + struct mg_mgr *mgr = iface->mgr; > + int n = 0; > + double now = mg_time(); > + struct mg_connection *nc, *tmp; > + double min_timer = 0; > + int num_timers = 0; > +#if 0 > + DBG(("begin poll @%u", (unsigned int) (now * 1000))); > +#endif > + mg_ev_mgr_lwip_process_signals(mgr); > + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + tmp = nc->next; > + n++; > + if ((nc->flags & MG_F_CLOSE_IMMEDIATELY) || > + ((nc->flags & MG_F_SEND_AND_CLOSE) && (nc->flags & MG_F_UDP) && > + (nc->send_mbuf.len == 0))) { > + mg_close_conn(nc); > + continue; > + } > + mg_if_poll(nc, now); > + mg_if_timer(nc, now); > +#if MG_ENABLE_SSL > + if ((nc->flags & MG_F_SSL) && cs != NULL && cs->pcb.tcp != NULL && > + cs->pcb.tcp->state == ESTABLISHED) { > + if (((nc->flags & MG_F_WANT_WRITE) || > + ((nc->send_mbuf.len > 0) && > + (nc->flags & MG_F_SSL_HANDSHAKE_DONE))) && > + cs->pcb.tcp->snd_buf > 0) { > + /* Can write more. */ > + if (nc->flags & MG_F_SSL_HANDSHAKE_DONE) { > + if (!(nc->flags & MG_F_CONNECTING)) mg_lwip_ssl_send(nc); > + } else { > + mg_lwip_ssl_do_hs(nc); > + } > + } > + if (cs->rx_chain != NULL || (nc->flags & MG_F_WANT_READ)) { > + if (nc->flags & MG_F_SSL_HANDSHAKE_DONE) { > + if (!(nc->flags & MG_F_CONNECTING)) mg_lwip_ssl_recv(nc); > + } else { > + mg_lwip_ssl_do_hs(nc); > + } > + } > + } else > +#endif /* MG_ENABLE_SSL */ > + { > + if (nc->send_mbuf.len > 0 && !(nc->flags & MG_F_CONNECTING)) { > + mg_lwip_send_more(nc); > + } > + } > + if (nc->sock != INVALID_SOCKET && > + !(nc->flags & (MG_F_UDP | MG_F_LISTENING)) && cs->pcb.tcp != NULL && > + cs->pcb.tcp->unsent != NULL) { > + tcpip_callback(tcp_output_tcpip, cs->pcb.tcp); > + } > + if (nc->ev_timer_time > 0) { > + if (num_timers == 0 || nc->ev_timer_time < min_timer) { > + min_timer = nc->ev_timer_time; > + } > + num_timers++; > + } > + } > +#if 0 > + DBG(("end poll @%u, %d conns, %d timers (min %u), next in %d ms", > + (unsigned int) (now * 1000), n, num_timers, > + (unsigned int) (min_timer * 1000), timeout_ms)); > +#endif > + (void) timeout_ms; > + return now; > +} > + > +uint32_t mg_lwip_get_poll_delay_ms(struct mg_mgr *mgr) { > + struct mg_connection *nc; > + double now; > + double min_timer = 0; > + int num_timers = 0; > + mg_ev_mgr_lwip_process_signals(mgr); > + for (nc = mg_next(mgr, NULL); nc != NULL; nc = mg_next(mgr, nc)) { > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + if (nc->ev_timer_time > 0) { > + if (num_timers == 0 || nc->ev_timer_time < min_timer) { > + min_timer = nc->ev_timer_time; > + } > + num_timers++; > + } > + if (nc->send_mbuf.len > 0 > +#if MG_ENABLE_SSL > + || (nc->flags & MG_F_WANT_WRITE) > +#endif > + ) { > + int can_send = 0; > + /* We have stuff to send, but can we? */ > + if (nc->flags & MG_F_UDP) { > + /* UDP is always ready for sending. */ > + can_send = (cs->pcb.udp != NULL); > + } else { > + can_send = (cs->pcb.tcp != NULL && cs->pcb.tcp->snd_buf > 0); > + } > + /* We want and can send, request a poll immediately. */ > + if (can_send) return 0; > + } > + } > + uint32_t timeout_ms = ~0; > + now = mg_time(); > + if (num_timers > 0) { > + /* If we have a timer that is past due, do a poll ASAP. */ > + if (min_timer < now) return 0; > + double timer_timeout_ms = (min_timer - now) * 1000 + 1 /* rounding */; > + if (timer_timeout_ms < timeout_ms) { > + timeout_ms = timer_timeout_ms; > + } > } > + return timeout_ms; > } > > -static void log_access(const struct mg_connection *conn) { > - const struct mg_request_info *ri; > - FILE *fp; > - char date[64], src_addr[20]; > - > - fp = conn->ctx->config[ACCESS_LOG_FILE] == NULL ? NULL : > - fopen(conn->ctx->config[ACCESS_LOG_FILE], "a+"); > - > - if (fp == NULL) > - return; > +#endif /* MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/lwip/mg_lwip_ssl_if.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > - strftime(date, sizeof(date), "%d/%b/%Y:%H:%M:%S %z", > - localtime(&conn->birth_time)); > +#if MG_ENABLE_SSL && MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL > > - ri = &conn->request_info; > - flockfile(fp); > +/* Amalgamated: #include "common/mg_mem.h" */ > +/* Amalgamated: #include "common/cs_dbg.h" */ > > - sockaddr_to_string(src_addr, sizeof(src_addr), &conn->client.rsa); > - fprintf(fp, "%s - %s [%s] \"%s %s HTTP/%s\" %d %" INT64_FMT, > - src_addr, ri->remote_user == NULL ? "-" : ri->remote_user, date, > - ri->request_method ? ri->request_method : "-", > - ri->uri ? ri->uri : "-", ri->http_version, > - conn->status_code, conn->num_bytes_sent); > - log_header(conn, "Referer", fp); > - log_header(conn, "User-Agent", fp); > - fputc('\n', fp); > - fflush(fp); > +#include <lwip/pbuf.h> > +#include <lwip/tcp.h> > > - funlockfile(fp); > - fclose(fp); > -} > +#ifndef MG_LWIP_SSL_IO_SIZE > +#define MG_LWIP_SSL_IO_SIZE 1024 > +#endif > > -// Verify given socket address against the ACL. > -// Return -1 if ACL is malformed, 0 if address is disallowed, 1 if allowed. > -static int check_acl(struct mg_context *ctx, uint32_t remote_ip) { > - int allowed, flag; > - uint32_t net, mask; > - struct vec vec; > - const char *list = ctx->config[ACCESS_CONTROL_LIST]; > +/* > + * Stop processing incoming SSL traffic when recv_mbuf.size is this big. > + * It'a a uick solution for SSL recv pushback. > + */ > +#ifndef MG_LWIP_SSL_RECV_MBUF_LIMIT > +#define MG_LWIP_SSL_RECV_MBUF_LIMIT 3072 > +#endif > > - // If any ACL is set, deny by default > - allowed = list == NULL ? '+' : '-'; > +#ifndef MIN > +#define MIN(a, b) ((a) < (b) ? (a) : (b)) > +#endif > > - while ((list = next_option(list, &vec, NULL)) != NULL) { > - flag = vec.ptr[0]; > - if ((flag != '+' && flag != '-') || > - parse_net(&vec.ptr[1], &net, &mask) == 0) { > - cry(fc(ctx), "%s: subnet must be [+|-]x.x.x.x[/x]", __func__); > - return -1; > +void mg_lwip_ssl_do_hs(struct mg_connection *nc) { > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + int server_side = (nc->listener != NULL); > + enum mg_ssl_if_result res; > + if (nc->flags & MG_F_CLOSE_IMMEDIATELY) return; > + res = mg_ssl_if_handshake(nc); > + DBG(("%p %lu %d %d", nc, nc->flags, server_side, res)); > + if (res != MG_SSL_OK) { > + if (res == MG_SSL_WANT_WRITE) { > + nc->flags |= MG_F_WANT_WRITE; > + cs->err = 0; > + } else if (res == MG_SSL_WANT_READ) { > + /* > + * Nothing to do in particular, we are callback-driven. > + * What we definitely do not need anymore is SSL reading (nothing left). > + */ > + nc->flags &= ~MG_F_WANT_READ; > + cs->err = 0; > + } else { > + cs->err = res; > + if (server_side) { > + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); > + } else { > + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); > + } > } > - > - if (net == (remote_ip & mask)) { > - allowed = flag; > + } else { > + cs->err = 0; > + nc->flags &= ~MG_F_WANT_WRITE; > + /* > + * Handshake is done. Schedule a read immediately to consume app data > + * which may already be waiting. > + */ > + nc->flags |= (MG_F_SSL_HANDSHAKE_DONE | MG_F_WANT_READ); > + if (server_side) { > + mg_lwip_accept_conn(nc, cs->pcb.tcp); > + } else { > + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); > } > } > - > - return allowed == '+'; > } > > -#if !defined(_WIN32) > -static int set_uid_option(struct mg_context *ctx) { > - struct passwd *pw; > - const char *uid = ctx->config[RUN_AS_USER]; > - int success = 0; > - > - if (uid == NULL) { > - success = 1; > +void mg_lwip_ssl_send(struct mg_connection *nc) { > + if (nc->sock == INVALID_SOCKET) { > + DBG(("%p invalid socket", nc)); > + return; > + } > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + /* It's ok if the buffer is empty. Return value of 0 may also be valid. */ > + int len = cs->last_ssl_write_size; > + if (len == 0) { > + len = MIN(MG_LWIP_SSL_IO_SIZE, nc->send_mbuf.len); > + } > + int ret = mg_ssl_if_write(nc, nc->send_mbuf.buf, len); > + DBG(("%p SSL_write %u = %d", nc, len, ret)); > + if (ret > 0) { > + mg_if_sent_cb(nc, ret); > + cs->last_ssl_write_size = 0; > + } else if (ret < 0) { > + /* This is tricky. We must remember the exact data we were sending to retry > + * exactly the same send next time. */ > + cs->last_ssl_write_size = len; > + } > + if (ret == len) { > + nc->flags &= ~MG_F_WANT_WRITE; > + } else if (ret == MG_SSL_WANT_WRITE) { > + nc->flags |= MG_F_WANT_WRITE; > } else { > - if ((pw = getpwnam(uid)) == NULL) { > - cry(fc(ctx), "%s: unknown user [%s]", __func__, uid); > - } else if (setgid(pw->pw_gid) == -1) { > - cry(fc(ctx), "%s: setgid(%s): %s", __func__, uid, strerror(errno)); > - } else if (setuid(pw->pw_uid) == -1) { > - cry(fc(ctx), "%s: setuid(%s): %s", __func__, uid, strerror(errno)); > + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); > + } > +} > + > +void mg_lwip_ssl_recv(struct mg_connection *nc) { > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + /* Don't deliver data before connect callback */ > + if (nc->flags & MG_F_CONNECTING) return; > + while (nc->recv_mbuf.len < MG_LWIP_SSL_RECV_MBUF_LIMIT) { > + char *buf = (char *) MG_MALLOC(MG_LWIP_SSL_IO_SIZE); > + if (buf == NULL) return; > + int ret = mg_ssl_if_read(nc, buf, MG_LWIP_SSL_IO_SIZE); > + DBG(("%p %p SSL_read %u = %d", nc, cs->rx_chain, MG_LWIP_SSL_IO_SIZE, ret)); > + if (ret <= 0) { > + MG_FREE(buf); > + if (ret == MG_SSL_WANT_WRITE) { > + nc->flags |= MG_F_WANT_WRITE; > + return; > + } else if (ret == MG_SSL_WANT_READ) { > + /* > + * Nothing to do in particular, we are callback-driven. > + * What we definitely do not need anymore is SSL reading (nothing left). > + */ > + nc->flags &= ~MG_F_WANT_READ; > + cs->err = 0; > + return; > + } else { > + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); > + return; > + } > } else { > - success = 1; > + mg_if_recv_tcp_cb(nc, buf, ret, 1 /* own */); > } > } > - > - return success; > } > -#endif // !_WIN32 > > -#if !defined(NO_SSL) > -static pthread_mutex_t *ssl_mutexes; > +#ifdef KR_VERSION > > -static int sslize(struct mg_connection *conn, SSL_CTX *s, int (*func)(SSL *)) { > - return (conn->ssl = SSL_new(s)) != NULL && > - SSL_set_fd(conn->ssl, conn->client.sock) == 1 && > - func(conn->ssl) == 1; > +ssize_t kr_send(int fd, const void *buf, size_t len) { > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) fd; > + int ret = mg_lwip_tcp_write(cs->nc, buf, len); > + DBG(("%p mg_lwip_tcp_write %u = %d", cs->nc, len, ret)); > + if (ret == 0) ret = KR_IO_WOULDBLOCK; > + return ret; > } > > -// Return OpenSSL error message > -static const char *ssl_error(void) { > - unsigned long err; > - err = ERR_get_error(); > - return err == 0 ? "" : ERR_error_string(err, NULL); > +ssize_t kr_recv(int fd, void *buf, size_t len) { > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) fd; > + struct pbuf *seg = cs->rx_chain; > + if (seg == NULL) { > + DBG(("%u - nothing to read", len)); > + return KR_IO_WOULDBLOCK; > + } > + size_t seg_len = (seg->len - cs->rx_offset); > + DBG(("%u %u %u %u", len, cs->rx_chain->len, seg_len, cs->rx_chain->tot_len)); > + len = MIN(len, seg_len); > + pbuf_copy_partial(seg, buf, len, cs->rx_offset); > + cs->rx_offset += len; > + tcp_recved(cs->pcb.tcp, len); > + if (cs->rx_offset == cs->rx_chain->len) { > + cs->rx_chain = pbuf_dechain(cs->rx_chain); > + pbuf_free(seg); > + cs->rx_offset = 0; > + } > + return len; > } > > -static void ssl_locking_callback(int mode, int mutex_num, const char *file, > - int line) { > - (void) line; > - (void) file; > +#elif MG_SSL_IF == MG_SSL_IF_MBEDTLS > > - if (mode & 1) { // 1 is CRYPTO_LOCK > - (void) pthread_mutex_lock(&ssl_mutexes[mutex_num]); > - } else { > - (void) pthread_mutex_unlock(&ssl_mutexes[mutex_num]); > - } > +int ssl_socket_send(void *ctx, const unsigned char *buf, size_t len) { > + struct mg_connection *nc = (struct mg_connection *) ctx; > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + int ret = mg_lwip_tcp_write(cs->nc, buf, len); > + if (ret == 0) ret = MBEDTLS_ERR_SSL_WANT_WRITE; > + LOG(LL_DEBUG, ("%p %d -> %d", nc, len, ret)); > + return ret; > } > > -static unsigned long ssl_id_callback(void) { > - return (unsigned long) pthread_self(); > +int ssl_socket_recv(void *ctx, unsigned char *buf, size_t len) { > + struct mg_connection *nc = (struct mg_connection *) ctx; > + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; > + struct pbuf *seg = cs->rx_chain; > + if (seg == NULL) { > + DBG(("%u - nothing to read", len)); > + return MBEDTLS_ERR_SSL_WANT_READ; > + } > + size_t seg_len = (seg->len - cs->rx_offset); > + DBG(("%u %u %u %u", len, cs->rx_chain->len, seg_len, cs->rx_chain->tot_len)); > + mgos_lock(); > + len = MIN(len, seg_len); > + pbuf_copy_partial(seg, buf, len, cs->rx_offset); > + cs->rx_offset += len; > + /* TCP PCB may be NULL if connection has already been closed > + * but we still have data to deliver to SSL. */ > + if (cs->pcb.tcp != NULL) tcp_recved(cs->pcb.tcp, len); > + if (cs->rx_offset == cs->rx_chain->len) { > + cs->rx_chain = pbuf_dechain(cs->rx_chain); > + pbuf_free(seg); > + cs->rx_offset = 0; > + } > + mgos_unlock(); > + LOG(LL_DEBUG, ("%p <- %d", nc, (int) len)); > + return len; > } > > -#if !defined(NO_SSL_DL) > -static int load_dll(struct mg_context *ctx, const char *dll_name, > - struct ssl_func *sw) { > - union {void *p; void (*fp)(void);} u; > - void *dll_handle; > - struct ssl_func *fp; > +#endif > > - if ((dll_handle = dlopen(dll_name, RTLD_LAZY)) == NULL) { > - cry(fc(ctx), "%s: cannot load %s", __func__, dll_name); > - return 0; > - } > +#endif /* MG_ENABLE_SSL && MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/wince/wince_libc.c" > +#endif > +/* > + * Copyright (c) 2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifdef WINCE > + > +const char *strerror(int err) { > + /* > + * TODO(alashkin): there is no strerror on WinCE; > + * look for similar wce_xxxx function > + */ > + static char buf[10]; > + snprintf(buf, sizeof(buf), "%d", err); > + return buf; > +} > > - for (fp = sw; fp->name != NULL; fp++) { > -#ifdef _WIN32 > - // GetProcAddress() returns pointer to function > - u.fp = (void (*)(void)) dlsym(dll_handle, fp->name); > -#else > - // dlsym() on UNIX returns void *. ISO C forbids casts of data pointers to > - // function pointers. We need to use a union to make a cast. > - u.p = dlsym(dll_handle, fp->name); > -#endif // _WIN32 > - if (u.fp == NULL) { > - cry(fc(ctx), "%s: %s: cannot find %s", __func__, dll_name, fp->name); > - return 0; > - } else { > - fp->ptr = u.fp; > +int open(const char *filename, int oflag, int pmode) { > + /* > + * TODO(alashkin): mg_open function is not used in mongoose > + * but exists in documentation as utility function > + * Shall we delete it at all or implement for WinCE as well? > + */ > + DebugBreak(); > + return 0; /* for compiler */ > +} > + > +int _wstati64(const wchar_t *path, cs_stat_t *st) { > + DWORD fa = GetFileAttributesW(path); > + if (fa == INVALID_FILE_ATTRIBUTES) { > + return -1; > + } > + memset(st, 0, sizeof(*st)); > + if ((fa & FILE_ATTRIBUTE_DIRECTORY) == 0) { > + HANDLE h; > + FILETIME ftime; > + st->st_mode |= _S_IFREG; > + h = CreateFileW(path, GENERIC_READ, 0, NULL, OPEN_EXISTING, > + FILE_ATTRIBUTE_NORMAL, NULL); > + if (h == INVALID_HANDLE_VALUE) { > + return -1; > } > + st->st_size = GetFileSize(h, NULL); > + GetFileTime(h, NULL, NULL, &ftime); > + st->st_mtime = (uint32_t)((((uint64_t) ftime.dwLowDateTime + > + ((uint64_t) ftime.dwHighDateTime << 32)) / > + 10000000.0) - > + 11644473600); > + CloseHandle(h); > + } else { > + st->st_mode |= _S_IFDIR; > } > - > - return 1; > + return 0; > } > -#endif // NO_SSL_DL > > -// Dynamically load SSL library. Set up ctx->ssl_ctx pointer. > -static int set_ssl_option(struct mg_context *ctx) { > - int i, size; > - const char *pem; > - > - // If PEM file is not specified, skip SSL initialization. > - if ((pem = ctx->config[SSL_CERTIFICATE]) == NULL) { > - return 1; > +/* Windows CE doesn't have neither gmtime nor strftime */ > +static void mg_gmt_time_string(char *buf, size_t buf_len, time_t *t) { > + FILETIME ft; > + SYSTEMTIME systime; > + if (t != NULL) { > + uint64_t filetime = (*t + 11644473600) * 10000000; > + ft.dwLowDateTime = filetime & 0xFFFFFFFF; > + ft.dwHighDateTime = (filetime & 0xFFFFFFFF00000000) >> 32; > + FileTimeToSystemTime(&ft, &systime); > + } else { > + GetSystemTime(&systime); > } > + /* There is no PRIu16 in WinCE SDK */ > + snprintf(buf, buf_len, "%d.%d.%d %d:%d:%d GMT", (int) systime.wYear, > + (int) systime.wMonth, (int) systime.wDay, (int) systime.wHour, > + (int) systime.wMinute, (int) systime.wSecond); > +} > > -#if !defined(NO_SSL_DL) > - if (!load_dll(ctx, SSL_LIB, ssl_sw) || > - !load_dll(ctx, CRYPTO_LIB, crypto_sw)) { > - return 0; > - } > -#endif // NO_SSL_DL > +#endif > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/pic32/pic32_net_if.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > - // Initialize SSL library > - SSL_library_init(); > - SSL_load_error_strings(); > +#ifndef CS_COMMON_PLATFORMS_PIC32_NET_IF_H_ > +#define CS_COMMON_PLATFORMS_PIC32_NET_IF_H_ > > - if ((ctx->ssl_ctx = SSL_CTX_new(SSLv23_server_method())) == NULL) { > - cry(fc(ctx), "SSL_CTX_new (server) error: %s", ssl_error()); > - return 0; > - } > +/* Amalgamated: #include "mongoose/src/net_if.h" */ > > - // If user callback returned non-NULL, that means that user callback has > - // set up certificate itself. In this case, skip sertificate setting. > - if ((ctx->callbacks.init_ssl == NULL || > - !ctx->callbacks.init_ssl(ctx->ssl_ctx, ctx->user_data)) && > - (SSL_CTX_use_certificate_file(ctx->ssl_ctx, pem, 1) == 0 || > - SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, pem, 1) == 0)) { > - cry(fc(ctx), "%s: cannot open %s: %s", __func__, pem, ssl_error()); > - return 0; > - } > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > > - if (pem != NULL) { > - (void) SSL_CTX_use_certificate_chain_file(ctx->ssl_ctx, pem); > - } > +#ifndef MG_ENABLE_NET_IF_PIC32 > +#define MG_ENABLE_NET_IF_PIC32 MG_NET_IF == MG_NET_IF_PIC32 > +#endif > > - // Initialize locking callbacks, needed for thread safety. > - // http://www.openssl.org/support/faq.html#PROG1 > - size = sizeof(pthread_mutex_t) * CRYPTO_num_locks(); > - if ((ssl_mutexes = (pthread_mutex_t *) malloc((size_t)size)) == NULL) { > - cry(fc(ctx), "%s: cannot allocate mutexes: %s", __func__, ssl_error()); > - return 0; > - } > +extern const struct mg_iface_vtable mg_pic32_iface_vtable; > > - for (i = 0; i < CRYPTO_num_locks(); i++) { > - pthread_mutex_init(&ssl_mutexes[i], NULL); > - } > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* CS_COMMON_PLATFORMS_PIC32_NET_IF_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/pic32/pic32_net_if.c" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > > - CRYPTO_set_locking_callback(&ssl_locking_callback); > - CRYPTO_set_id_callback(&ssl_id_callback); > +#if MG_ENABLE_NET_IF_PIC32 > > +int mg_pic32_if_create_conn(struct mg_connection *nc) { > + (void) nc; > return 1; > } > > -static void uninitialize_ssl(struct mg_context *ctx) { > - int i; > - if (ctx->ssl_ctx != NULL) { > - CRYPTO_set_locking_callback(NULL); > - for (i = 0; i < CRYPTO_num_locks(); i++) { > - pthread_mutex_destroy(&ssl_mutexes[i]); > - } > - CRYPTO_set_locking_callback(NULL); > - CRYPTO_set_id_callback(NULL); > - } > +void mg_pic32_if_recved(struct mg_connection *nc, size_t len) { > + (void) nc; > + (void) len; > } > -#endif // !NO_SSL > > -static int set_gpass_option(struct mg_context *ctx) { > - struct file file = STRUCT_FILE_INITIALIZER; > - const char *path = ctx->config[GLOBAL_PASSWORDS_FILE]; > - if (path != NULL && !mg_stat(fc(ctx), path, &file)) { > - cry(fc(ctx), "Cannot open %s: %s", path, strerror(ERRNO)); > - return 0; > - } > - return 1; > +void mg_pic32_if_add_conn(struct mg_connection *nc) { > + (void) nc; > } > > -static int set_acl_option(struct mg_context *ctx) { > - return check_acl(ctx, (uint32_t) 0x7f000001UL) != -1; > +void mg_pic32_if_init(struct mg_iface *iface) { > + (void) iface; > + (void) mg_get_errno(); /* Shutup compiler */ > } > > -static void reset_per_request_attributes(struct mg_connection *conn) { > - conn->path_info = NULL; > - conn->num_bytes_sent = conn->consumed_content = 0; > - conn->status_code = -1; > - conn->must_close = conn->request_len = conn->throttle = 0; > +void mg_pic32_if_free(struct mg_iface *iface) { > + (void) iface; > } > > -static void close_socket_gracefully(struct mg_connection *conn) { > -#if defined(_WIN32) > - char buf[MG_BUF_LEN]; > - int n; > -#endif > - struct linger linger; > - > - // Set linger option to avoid socket hanging out after close. This prevent > - // ephemeral port exhaust problem under high QPS. > - linger.l_onoff = 1; > - linger.l_linger = 1; > - setsockopt(conn->client.sock, SOL_SOCKET, SO_LINGER, > - (char *) &linger, sizeof(linger)); > - > - // Send FIN to the client > - shutdown(conn->client.sock, SHUT_WR); > - set_non_blocking_mode(conn->client.sock); > - > -#if defined(_WIN32) > - // Read and discard pending incoming data. If we do not do that and close the > - // socket, the data in the send buffer may be discarded. This > - // behaviour is seen on Windows, when client keeps sending data > - // when server decides to close the connection; then when client > - // does recv() it gets no data back. > - do { > - n = pull(NULL, conn, buf, sizeof(buf)); > - } while (n > 0); > -#endif > - > - // Now we know that our FIN is ACK-ed, safe to close > - closesocket(conn->client.sock); > +void mg_pic32_if_remove_conn(struct mg_connection *nc) { > + (void) nc; > } > > -static void close_connection(struct mg_connection *conn) { > - conn->must_close = 1; > - if (conn->client.sock != INVALID_SOCKET) { > - close_socket_gracefully(conn); > - } > -#ifndef NO_SSL > - // Must be done AFTER socket is closed > - if (conn->ssl != NULL) { > - SSL_free(conn->ssl); > +void mg_pic32_if_destroy_conn(struct mg_connection *nc) { > + if (nc->sock == INVALID_SOCKET) return; > + /* For UDP, only close outgoing sockets or listeners. */ > + if (!(nc->flags & MG_F_UDP)) { > + /* Close TCP */ > + TCPIP_TCP_Close((TCP_SOCKET) nc->sock); > + } else if (nc->listener == NULL) { > + /* Only close outgoing UDP or listeners. */ > + TCPIP_UDP_Close((UDP_SOCKET) nc->sock); > } > -#endif > -} > > -void mg_close_connection(struct mg_connection *conn) { > -#ifndef NO_SSL > - if (conn->client_ssl_ctx != NULL) { > - SSL_CTX_free((SSL_CTX *) conn->client_ssl_ctx); > - } > -#endif > - close_connection(conn); > - free(conn); > + nc->sock = INVALID_SOCKET; > } > > -struct mg_connection *mg_connect(const char *host, int port, int use_ssl, > - char *ebuf, size_t ebuf_len) { > - static struct mg_context fake_ctx; > - struct mg_connection *conn = NULL; > - struct sockaddr_in sin; > - struct hostent *he; > - SOCKET sock; > - > - if (host == NULL) { > - snprintf(ebuf, ebuf_len, "%s", "NULL host"); > - } else if ((he = gethostbyname(host)) == NULL) { > - snprintf(ebuf, ebuf_len, "gethostbyname(%s): %s", host, strerror(ERRNO)); > - } else if ((sock = socket(PF_INET, SOCK_STREAM, 0)) == INVALID_SOCKET) { > - snprintf(ebuf, ebuf_len, "socket(): %s", strerror(ERRNO)); > - } else { > - sin.sin_family = AF_INET; > - sin.sin_port = htons((uint16_t) port); > - sin.sin_addr = * (struct in_addr *) he->h_addr_list[0]; > - if (connect(sock, (struct sockaddr *) &sin, sizeof(sin)) != 0) { > - snprintf(ebuf, ebuf_len, "connect(%s:%d): %s", > - host, port, strerror(ERRNO)); > - closesocket(sock); > - } else if ((conn = (struct mg_connection *) > - calloc(1, sizeof(*conn) + MAX_REQUEST_SIZE)) == NULL) { > - snprintf(ebuf, ebuf_len, "calloc(): %s", strerror(ERRNO)); > - closesocket(sock); > -#ifndef NO_SSL > - } else if (use_ssl && (conn->client_ssl_ctx = > - SSL_CTX_new(SSLv23_client_method())) == NULL) { > - snprintf(ebuf, ebuf_len, "SSL_CTX_new error"); > - closesocket(sock); > - free(conn); > - conn = NULL; > -#endif // NO_SSL > - } else { > - conn->buf_size = MAX_REQUEST_SIZE; > - conn->buf = (char *) (conn + 1); > - conn->ctx = &fake_ctx; > - conn->client.sock = sock; > - conn->client.rsa.sin = sin; > - conn->client.is_ssl = use_ssl; > -#ifndef NO_SSL > - if (use_ssl) { > - // SSL_CTX_set_verify call is needed to switch off server certificate > - // checking, which is off by default in OpenSSL and on in yaSSL. > - SSL_CTX_set_verify(conn->client_ssl_ctx, 0, 0); > - sslize(conn, conn->client_ssl_ctx, SSL_connect); > - } > -#endif > - } > +int mg_pic32_if_listen_udp(struct mg_connection *nc, union socket_address *sa) { > + nc->sock = TCPIP_UDP_ServerOpen( > + sa->sin.sin_family == AF_INET ? IP_ADDRESS_TYPE_IPV4 > + : IP_ADDRESS_TYPE_IPV6, > + ntohs(sa->sin.sin_port), > + sa->sin.sin_addr.s_addr == 0 ? 0 : (IP_MULTI_ADDRESS *) &sa->sin); > + if (nc->sock == INVALID_SOCKET) { > + return -1; > } > - > - return conn; > + return 0; > } > > -static int is_valid_uri(const char *uri) { > - // Conform to http://www.w3.org/Protocols/rfc2616/rfc2616-sec5.html#sec5.1.2 > - // URI can be an asterisk (*) or should start with slash. > - return uri[0] == '/' || (uri[0] == '*' && uri[1] == '\0'); > +void mg_pic32_if_udp_send(struct mg_connection *nc, const void *buf, > + size_t len) { > + mbuf_append(&nc->send_mbuf, buf, len); > } > > -static int getreq(struct mg_connection *conn, char *ebuf, size_t ebuf_len) { > - const char *cl; > - > - ebuf[0] = '\0'; > - reset_per_request_attributes(conn); > - conn->request_len = read_request(NULL, conn, conn->buf, conn->buf_size, > - &conn->data_len); > - assert(conn->request_len < 0 || conn->data_len >= conn->request_len); > - > - if (conn->request_len == 0 && conn->data_len == conn->buf_size) { > - snprintf(ebuf, ebuf_len, "%s", "Request Too Large"); > - } else if (conn->request_len <= 0) { > - snprintf(ebuf, ebuf_len, "%s", "Client closed connection"); > - } else if (parse_http_message(conn->buf, conn->buf_size, > - &conn->request_info) <= 0) { > - snprintf(ebuf, ebuf_len, "Bad request: [%.*s]", conn->data_len, conn->buf); > - } else { > - // Request is valid > - if ((cl = get_header(&conn->request_info, "Content-Length")) != NULL) { > - conn->content_len = strtoll(cl, NULL, 10); > - } else if (!mg_strcasecmp(conn->request_info.request_method, "POST") || > - !mg_strcasecmp(conn->request_info.request_method, "PUT")) { > - conn->content_len = -1; > - } else { > - conn->content_len = 0; > - } > - conn->birth_time = time(NULL); > - } > - return ebuf[0] == '\0'; > +void mg_pic32_if_tcp_send(struct mg_connection *nc, const void *buf, > + size_t len) { > + mbuf_append(&nc->send_mbuf, buf, len); > } > > -struct mg_connection *mg_download(const char *host, int port, int use_ssl, > - char *ebuf, size_t ebuf_len, > - const char *fmt, ...) { > - struct mg_connection *conn; > - va_list ap; > - > - va_start(ap, fmt); > - ebuf[0] = '\0'; > - if ((conn = mg_connect(host, port, use_ssl, ebuf, ebuf_len)) == NULL) { > - } else if (mg_vprintf(conn, fmt, ap) <= 0) { > - snprintf(ebuf, ebuf_len, "%s", "Error sending request"); > - } else { > - getreq(conn, ebuf, ebuf_len); > +int mg_pic32_if_listen_tcp(struct mg_connection *nc, union socket_address *sa) { > + nc->sock = TCPIP_TCP_ServerOpen( > + sa->sin.sin_family == AF_INET ? IP_ADDRESS_TYPE_IPV4 > + : IP_ADDRESS_TYPE_IPV6, > + ntohs(sa->sin.sin_port), > + sa->sin.sin_addr.s_addr == 0 ? 0 : (IP_MULTI_ADDRESS *) &sa->sin); > + memcpy(&nc->sa, sa, sizeof(*sa)); > + if (nc->sock == INVALID_SOCKET) { > + return -1; > } > - if (ebuf[0] != '\0' && conn != NULL) { > - mg_close_connection(conn); > - conn = NULL; > - } > - > - return conn; > + return 0; > } > > -static void process_new_connection(struct mg_connection *conn) { > - struct mg_request_info *ri = &conn->request_info; > - int keep_alive_enabled, keep_alive, discard_len; > - char ebuf[100]; > - > - keep_alive_enabled = !strcmp(conn->ctx->config[ENABLE_KEEP_ALIVE], "yes"); > - keep_alive = 0; > - > - // Important: on new connection, reset the receiving buffer. Credit goes > - // to crule42. > - conn->data_len = 0; > - do { > - if (!getreq(conn, ebuf, sizeof(ebuf))) { > - send_http_error(conn, 500, "Server Error", "%s", ebuf); > - conn->must_close = 1; > - } else if (!is_valid_uri(conn->request_info.uri)) { > - snprintf(ebuf, sizeof(ebuf), "Invalid URI: [%s]", ri->uri); > - send_http_error(conn, 400, "Bad Request", "%s", ebuf); > - } else if (strcmp(ri->http_version, "1.0") && > - strcmp(ri->http_version, "1.1")) { > - snprintf(ebuf, sizeof(ebuf), "Bad HTTP version: [%s]", ri->http_version); > - send_http_error(conn, 505, "Bad HTTP version", "%s", ebuf); > - } > - > - if (ebuf[0] == '\0') { > - handle_request(conn); > - if (conn->ctx->callbacks.end_request != NULL) { > - conn->ctx->callbacks.end_request(conn, conn->status_code); > - } > - log_access(conn); > - } > - if (ri->remote_user != NULL) { > - free((void *) ri->remote_user); > - ri->remote_user = NULL; // when having connections with and without auth would cause double free and then crash > - } > +static int mg_accept_conn(struct mg_connection *lc) { > + struct mg_connection *nc; > + TCP_SOCKET_INFO si; > + union socket_address sa; > > - // NOTE(lsm): order is important here. should_keep_alive() call > - // is using parsed request, which will be invalid after memmove's below. > - // Therefore, memorize should_keep_alive() result now for later use > - // in loop exit condition. > - keep_alive = conn->ctx->stop_flag == 0 && keep_alive_enabled && > - conn->content_len >= 0 && should_keep_alive(conn); > + nc = mg_if_accept_new_conn(lc); > > - // Discard all buffered data for this request > - discard_len = conn->content_len >= 0 && conn->request_len > 0 && > - conn->request_len + conn->content_len < (int64_t) conn->data_len ? > - (int) (conn->request_len + conn->content_len) : conn->data_len; > - assert(discard_len >= 0); > - memmove(conn->buf, conn->buf + discard_len, conn->data_len - discard_len); > - conn->data_len -= discard_len; > - assert(conn->data_len >= 0); > - assert(conn->data_len <= conn->buf_size); > - } while (keep_alive); > -} > + if (nc == NULL) { > + return 0; > + } > > -// Worker threads take accepted socket from the queue > -static int consume_socket(struct mg_context *ctx, struct socket *sp) { > - (void) pthread_mutex_lock(&ctx->mutex); > - DEBUG_TRACE(("going idle")); > + nc->sock = lc->sock; > + nc->flags &= ~MG_F_LISTENING; > > - // If the queue is empty, wait. We're idle at this point. > - while (ctx->sq_head == ctx->sq_tail && ctx->stop_flag == 0) { > - pthread_cond_wait(&ctx->sq_full, &ctx->mutex); > + if (!TCPIP_TCP_SocketInfoGet((TCP_SOCKET) nc->sock, &si)) { > + return 0; > } > > - // If we're stopping, sq_head may be equal to sq_tail. > - if (ctx->sq_head > ctx->sq_tail) { > - // Copy socket from the queue and increment tail > - *sp = ctx->queue[ctx->sq_tail % ARRAY_SIZE(ctx->queue)]; > - ctx->sq_tail++; > - DEBUG_TRACE(("grabbed socket %d, going busy", sp->sock)); > - > - // Wrap pointers if needed > - while (ctx->sq_tail > (int) ARRAY_SIZE(ctx->queue)) { > - ctx->sq_tail -= ARRAY_SIZE(ctx->queue); > - ctx->sq_head -= ARRAY_SIZE(ctx->queue); > - } > + if (si.addressType == IP_ADDRESS_TYPE_IPV4) { > + sa.sin.sin_family = AF_INET; > + sa.sin.sin_port = htons(si.remotePort); > + sa.sin.sin_addr.s_addr = si.remoteIPaddress.v4Add.Val; > + } else { > + /* TODO(alashkin): do something with _potential_ IPv6 */ > + memset(&sa, 0, sizeof(sa)); > } > > - (void) pthread_cond_signal(&ctx->sq_empty); > - (void) pthread_mutex_unlock(&ctx->mutex); > + mg_if_accept_tcp_cb(nc, (union socket_address *) &sa, sizeof(sa)); > > - return !ctx->stop_flag; > + return mg_pic32_if_listen_tcp(lc, &lc->sa) >= 0; > } > > -static void *worker_thread(void *thread_func_param) { > - struct mg_context *ctx = thread_func_param; > - struct mg_connection *conn; > +char *inet_ntoa(struct in_addr in) { > + static char addr[17]; > + snprintf(addr, sizeof(addr), "%d.%d.%d.%d", (int) in.S_un.S_un_b.s_b1, > + (int) in.S_un.S_un_b.s_b2, (int) in.S_un.S_un_b.s_b3, > + (int) in.S_un.S_un_b.s_b4); > + return addr; > +} > > - conn = (struct mg_connection *) calloc(1, sizeof(*conn) + MAX_REQUEST_SIZE); > - if (conn == NULL) { > - cry(fc(ctx), "%s", "Cannot create new connection struct, OOM"); > +static void mg_handle_send(struct mg_connection *nc) { > + uint16_t bytes_written = 0; > + if (nc->flags & MG_F_UDP) { > + if (!TCPIP_UDP_RemoteBind( > + (UDP_SOCKET) nc->sock, > + nc->sa.sin.sin_family == AF_INET ? IP_ADDRESS_TYPE_IPV4 > + : IP_ADDRESS_TYPE_IPV6, > + ntohs(nc->sa.sin.sin_port), (IP_MULTI_ADDRESS *) &nc->sa.sin)) { > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + return; > + } > + bytes_written = TCPIP_UDP_TxPutIsReady((UDP_SOCKET) nc->sock, 0); > + if (bytes_written >= nc->send_mbuf.len) { > + if (TCPIP_UDP_ArrayPut((UDP_SOCKET) nc->sock, > + (uint8_t *) nc->send_mbuf.buf, > + nc->send_mbuf.len) != nc->send_mbuf.len) { > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + bytes_written = 0; > + } > + } > } else { > - conn->buf_size = MAX_REQUEST_SIZE; > - conn->buf = (char *) (conn + 1); > - conn->ctx = ctx; > - conn->request_info.user_data = ctx->user_data; > - > - // Call consume_socket() even when ctx->stop_flag > 0, to let it signal > - // sq_empty condvar to wake up the master waiting in produce_socket() > - while (consume_socket(ctx, &conn->client)) { > - conn->birth_time = time(NULL); > - > - // Fill in IP, port info early so even if SSL setup below fails, > - // error handler would have the corresponding info. > - // Thanks to Johannes Winkelmann for the patch. > - // TODO(lsm): Fix IPv6 case > - conn->request_info.remote_port = ntohs(conn->client.rsa.sin.sin_port); > - memcpy(&conn->request_info.remote_ip, > - &conn->client.rsa.sin.sin_addr.s_addr, 4); > - conn->request_info.remote_ip = ntohl(conn->request_info.remote_ip); > - conn->request_info.is_ssl = conn->client.is_ssl; > - > - if (!conn->client.is_ssl > -#ifndef NO_SSL > - || sslize(conn, conn->ctx->ssl_ctx, SSL_accept) > -#endif > - ) { > - process_new_connection(conn); > + bytes_written = TCPIP_TCP_FifoTxFreeGet((TCP_SOCKET) nc->sock); > + if (bytes_written != 0) { > + if (bytes_written > nc->send_mbuf.len) { > + bytes_written = nc->send_mbuf.len; > + } > + if (TCPIP_TCP_ArrayPut((TCP_SOCKET) nc->sock, > + (uint8_t *) nc->send_mbuf.buf, > + bytes_written) != bytes_written) { > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + bytes_written = 0; > } > - > - close_connection(conn); > } > - free(conn); > } > > - // Signal master that we're done with connection and exiting > - (void) pthread_mutex_lock(&ctx->mutex); > - ctx->num_threads--; > - (void) pthread_cond_signal(&ctx->cond); > - assert(ctx->num_threads >= 0); > - (void) pthread_mutex_unlock(&ctx->mutex); > - > - DEBUG_TRACE(("exiting")); > - return NULL; > + mg_if_sent_cb(nc, bytes_written); > } > > -// Master thread adds accepted socket to a queue > -static void produce_socket(struct mg_context *ctx, const struct socket *sp) { > - (void) pthread_mutex_lock(&ctx->mutex); > - > - // If the queue is full, wait > - while (ctx->stop_flag == 0 && > - ctx->sq_head - ctx->sq_tail >= (int) ARRAY_SIZE(ctx->queue)) { > - (void) pthread_cond_wait(&ctx->sq_empty, &ctx->mutex); > +static void mg_handle_recv(struct mg_connection *nc) { > + uint16_t bytes_read = 0; > + uint8_t *buf = NULL; > + if (nc->flags & MG_F_UDP) { > + bytes_read = TCPIP_UDP_GetIsReady((UDP_SOCKET) nc->sock); > + if (bytes_read != 0 && > + (nc->recv_mbuf_limit == -1 || > + nc->recv_mbuf.len + bytes_read < nc->recv_mbuf_limit)) { > + buf = (uint8_t *) MG_MALLOC(bytes_read); > + if (TCPIP_UDP_ArrayGet((UDP_SOCKET) nc->sock, buf, bytes_read) != > + bytes_read) { > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + bytes_read = 0; > + MG_FREE(buf); > + } > + } > + } else { > + bytes_read = TCPIP_TCP_GetIsReady((TCP_SOCKET) nc->sock); > + if (bytes_read != 0) { > + if (nc->recv_mbuf_limit != -1 && > + nc->recv_mbuf_limit - nc->recv_mbuf.len > bytes_read) { > + bytes_read = nc->recv_mbuf_limit - nc->recv_mbuf.len; > + } > + buf = (uint8_t *) MG_MALLOC(bytes_read); > + if (TCPIP_TCP_ArrayGet((TCP_SOCKET) nc->sock, buf, bytes_read) != > + bytes_read) { > + nc->flags |= MG_F_CLOSE_IMMEDIATELY; > + MG_FREE(buf); > + bytes_read = 0; > + } > + } > } > > - if (ctx->sq_head - ctx->sq_tail < (int) ARRAY_SIZE(ctx->queue)) { > - // Copy socket to the queue and increment head > - ctx->queue[ctx->sq_head % ARRAY_SIZE(ctx->queue)] = *sp; > - ctx->sq_head++; > - DEBUG_TRACE(("queued socket %d", sp->sock)); > + if (bytes_read != 0) { > + mg_if_recv_tcp_cb(nc, buf, bytes_read, 1 /* own */); > } > - > - (void) pthread_cond_signal(&ctx->sq_full); > - (void) pthread_mutex_unlock(&ctx->mutex); > -} > - > -static int set_sock_timeout(SOCKET sock, int milliseconds) { > -#ifdef _WIN32 > - DWORD t = milliseconds; > -#else > - struct timeval t; > - t.tv_sec = milliseconds / 1000; > - t.tv_usec = (milliseconds * 1000) % 1000000; > -#endif > - return setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, (void *) &t, sizeof(t)) || > - setsockopt(sock, SOL_SOCKET, SO_SNDTIMEO, (void *) &t, sizeof(t)); > } > > -static void accept_new_connection(const struct socket *listener, > - struct mg_context *ctx) { > - struct socket so; > - char src_addr[20]; > - socklen_t len = sizeof(so.rsa); > - int on = 1; > - > - if ((so.sock = accept(listener->sock, &so.rsa.sa, &len)) == INVALID_SOCKET) { > - } else if (!check_acl(ctx, ntohl(* (uint32_t *) &so.rsa.sin.sin_addr))) { > - sockaddr_to_string(src_addr, sizeof(src_addr), &so.rsa); > - cry(fc(ctx), "%s: %s is not allowed to connect", __func__, src_addr); > - closesocket(so.sock); > - } else { > - // Put so socket structure into the queue > - DEBUG_TRACE(("Accepted socket %d", (int) so.sock)); > - so.is_ssl = listener->is_ssl; > - so.ssl_redir = listener->ssl_redir; > - getsockname(so.sock, &so.lsa.sa, &len); > - // Set TCP keep-alive. This is needed because if HTTP-level keep-alive > - // is enabled, and client resets the connection, server won't get > - // TCP FIN or RST and will keep the connection open forever. With TCP > - // keep-alive, next keep-alive handshake will figure out that the client > - // is down and will close the server end. > - // Thanks to Igor Klopov who suggested the patch. > - setsockopt(so.sock, SOL_SOCKET, SO_KEEPALIVE, (void *) &on, sizeof(on)); > - set_sock_timeout(so.sock, atoi(ctx->config[REQUEST_TIMEOUT])); > - produce_socket(ctx, &so); > - } > -} > - > -static void *master_thread(void *thread_func_param) { > - struct mg_context *ctx = thread_func_param; > - struct pollfd *pfd; > - int i; > +time_t mg_pic32_if_poll(struct mg_iface *iface, int timeout_ms) { > + struct mg_mgr *mgr = iface->mgr; > + double now = mg_time(); > + struct mg_connection *nc, *tmp; > > - // Increase priority of the master thread > -#if defined(_WIN32) > - SetThreadPriority(GetCurrentThread(), THREAD_PRIORITY_ABOVE_NORMAL); > -#endif > - > -#if defined(ISSUE_317) > - struct sched_param sched_param; > - sched_param.sched_priority = sched_get_priority_max(SCHED_RR); > - pthread_setschedparam(pthread_self(), SCHED_RR, &sched_param); > -#endif > + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { > + tmp = nc->next; > > - pfd = calloc(ctx->num_listening_sockets, sizeof(pfd[0])); > - while (ctx->stop_flag == 0) { > - for (i = 0; i < ctx->num_listening_sockets; i++) { > - pfd[i].fd = ctx->listening_sockets[i].sock; > - pfd[i].events = POLLIN; > - } > + if (nc->flags & MG_F_CONNECTING) { > + /* processing connections */ > + if (nc->flags & MG_F_UDP || > + TCPIP_TCP_IsConnected((TCP_SOCKET) nc->sock)) { > + mg_if_connect_cb(nc, 0); > + } > + } else if (nc->flags & MG_F_LISTENING) { > + if (TCPIP_TCP_IsConnected((TCP_SOCKET) nc->sock)) { > + /* accept new connections */ > + mg_accept_conn(nc); > + } > + } else { > + if (nc->send_mbuf.len != 0) { > + mg_handle_send(nc); > + } > > - if (poll(pfd, ctx->num_listening_sockets, 200) > 0) { > - for (i = 0; i < ctx->num_listening_sockets; i++) { > - // NOTE(lsm): on QNX, poll() returns POLLRDNORM after the > - // successful poll, and POLLIN is defined as (POLLRDNORM | POLLRDBAND) > - // Therefore, we're checking pfd[i].revents & POLLIN, not > - // pfd[i].revents == POLLIN. > - if (ctx->stop_flag == 0 && (pfd[i].revents & POLLIN)) { > - accept_new_connection(&ctx->listening_sockets[i], ctx); > - } > + if (nc->recv_mbuf_limit == -1 || > + nc->recv_mbuf.len < nc->recv_mbuf_limit) { > + mg_handle_recv(nc); > } > } > } > - free(pfd); > - DEBUG_TRACE(("stopping workers")); > - > - // Stop signal received: somebody called mg_stop. Quit. > - close_all_listening_sockets(ctx); > > - // Wakeup workers that are waiting for connections to handle. > - pthread_cond_broadcast(&ctx->sq_full); > - > - // Wait until all threads finish > - (void) pthread_mutex_lock(&ctx->mutex); > - while (ctx->num_threads > 0) { > - (void) pthread_cond_wait(&ctx->cond, &ctx->mutex); > + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { > + tmp = nc->next; > + if ((nc->flags & MG_F_CLOSE_IMMEDIATELY) || > + (nc->send_mbuf.len == 0 && (nc->flags & MG_F_SEND_AND_CLOSE))) { > + mg_close_conn(nc); > + } > } > - (void) pthread_mutex_unlock(&ctx->mutex); > > - // All threads exited, no sync is needed. Destroy mutex and condvars > - (void) pthread_mutex_destroy(&ctx->mutex); > - (void) pthread_cond_destroy(&ctx->cond); > - (void) pthread_cond_destroy(&ctx->sq_empty); > - (void) pthread_cond_destroy(&ctx->sq_full); > - > -#if !defined(NO_SSL) > - uninitialize_ssl(ctx); > -#endif > - DEBUG_TRACE(("exiting")); > - > - // Signal mg_stop() that we're done. > - // WARNING: This must be the very last thing this > - // thread does, as ctx becomes invalid after this line. > - ctx->stop_flag = 2; > - return NULL; > + return now; > } > > -static void free_context(struct mg_context *ctx) { > - int i; > - > - // Deallocate config parameters > - for (i = 0; i < NUM_OPTIONS; i++) { > - if (ctx->config[i] != NULL) > - free(ctx->config[i]); > - } > - > -#ifndef NO_SSL > - // Deallocate SSL context > - if (ctx->ssl_ctx != NULL) { > - SSL_CTX_free(ctx->ssl_ctx); > - } > - if (ssl_mutexes != NULL) { > - free(ssl_mutexes); > - ssl_mutexes = NULL; > - } > -#endif // !NO_SSL > - > - // Deallocate context itself > - free(ctx); > +void mg_pic32_if_sock_set(struct mg_connection *nc, sock_t sock) { > + nc->sock = sock; > } > > -void mg_stop(struct mg_context *ctx) { > - ctx->stop_flag = 1; > - > - // Wait until mg_fini() stops > - while (ctx->stop_flag != 2) { > - (void) mg_sleep(10); > - } > - free_context(ctx); > - > -#if defined(_WIN32) && !defined(__SYMBIAN32__) > - (void) WSACleanup(); > -#endif // _WIN32 > +void mg_pic32_if_get_conn_addr(struct mg_connection *nc, int remote, > + union socket_address *sa) { > + /* TODO(alaskin): not implemented yet */ > } > > -struct mg_context *mg_start(const struct mg_callbacks *callbacks, > - void *user_data, > - const char **options) { > - struct mg_context *ctx; > - const char *name, *value, *default_value; > - int i; > - > -#if defined(_WIN32) && !defined(__SYMBIAN32__) > - WSADATA data; > - WSAStartup(MAKEWORD(2,2), &data); > - InitializeCriticalSection(&global_log_file_lock); > -#endif // _WIN32 > - > - // Allocate context and initialize reasonable general case defaults. > - // TODO(lsm): do proper error handling here. > - if ((ctx = (struct mg_context *) calloc(1, sizeof(*ctx))) == NULL) { > - return NULL; > - } > - ctx->callbacks = *callbacks; > - ctx->user_data = user_data; > +void mg_pic32_if_connect_tcp(struct mg_connection *nc, > + const union socket_address *sa) { > + nc->sock = TCPIP_TCP_ClientOpen( > + sa->sin.sin_family == AF_INET ? IP_ADDRESS_TYPE_IPV4 > + : IP_ADDRESS_TYPE_IPV6, > + ntohs(sa->sin.sin_port), (IP_MULTI_ADDRESS *) &sa->sin); > + nc->err = (nc->sock == INVALID_SOCKET) ? -1 : 0; > +} > > - while (options && (name = *options++) != NULL) { > - if ((i = get_option_index(name)) == -1) { > - cry(fc(ctx), "Invalid option: %s", name); > - free_context(ctx); > - return NULL; > - } else if ((value = *options++) == NULL) { > - cry(fc(ctx), "%s: option value cannot be NULL", name); > - free_context(ctx); > - return NULL; > - } > - if (ctx->config[i] != NULL) { > - cry(fc(ctx), "warning: %s: duplicate option", name); > - free(ctx->config[i]); > - } > - ctx->config[i] = mg_strdup(value); > - DEBUG_TRACE(("[%s] -> [%s]", name, value)); > - } > +void mg_pic32_if_connect_udp(struct mg_connection *nc) { > + nc->sock = TCPIP_UDP_ClientOpen(IP_ADDRESS_TYPE_ANY, 0, NULL); > + nc->err = (nc->sock == INVALID_SOCKET) ? -1 : 0; > +} > > - // Set default value if needed > - for (i = 0; config_options[i * 2] != NULL; i++) { > - default_value = config_options[i * 2 + 1]; > - if (ctx->config[i] == NULL && default_value != NULL) { > - ctx->config[i] = mg_strdup(default_value); > - } > +/* clang-format off */ > +#define MG_PIC32_IFACE_VTABLE \ > + { \ > + mg_pic32_if_init, \ > + mg_pic32_if_free, \ > + mg_pic32_if_add_conn, \ > + mg_pic32_if_remove_conn, \ > + mg_pic32_if_poll, \ > + mg_pic32_if_listen_tcp, \ > + mg_pic32_if_listen_udp, \ > + mg_pic32_if_connect_tcp, \ > + mg_pic32_if_connect_udp, \ > + mg_pic32_if_tcp_send, \ > + mg_pic32_if_udp_send, \ > + mg_pic32_if_recved, \ > + mg_pic32_if_create_conn, \ > + mg_pic32_if_destroy_conn, \ > + mg_pic32_if_sock_set, \ > + mg_pic32_if_get_conn_addr, \ > } > +/* clang-format on */ > > - // NOTE(lsm): order is important here. SSL certificates must > - // be initialized before listening ports. UID must be set last. > - if (!set_gpass_option(ctx) || > -#if !defined(NO_SSL) > - !set_ssl_option(ctx) || > +const struct mg_iface_vtable mg_pic32_iface_vtable = MG_PIC32_IFACE_VTABLE; > +#if MG_NET_IF == MG_NET_IF_PIC32 > +const struct mg_iface_vtable mg_default_iface_vtable = MG_PIC32_IFACE_VTABLE; > #endif > - !set_ports_option(ctx) || > -#if !defined(_WIN32) > - !set_uid_option(ctx) || > -#endif > - !set_acl_option(ctx)) { > - free_context(ctx); > - return NULL; > - } > - > -#if !defined(_WIN32) && !defined(__SYMBIAN32__) > - // Ignore SIGPIPE signal, so if browser cancels the request, it > - // won't kill the whole process. > - (void) signal(SIGPIPE, SIG_IGN); > - // Also ignoring SIGCHLD to let the OS to reap zombies properly. > - //(void) signal(SIGCHLD, SIG_IGN); > -#endif // !_WIN32 > > - (void) pthread_mutex_init(&ctx->mutex, NULL); > - (void) pthread_cond_init(&ctx->cond, NULL); > - (void) pthread_cond_init(&ctx->sq_empty, NULL); > - (void) pthread_cond_init(&ctx->sq_full, NULL); > +#endif /* MG_ENABLE_NET_IF_PIC32 */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/windows/windows_direct.c" > +#endif > +/* > + * Copyright (c) 2017 Cesanta Software Limited > + * All rights reserved > + */ > > - // Start master (listening) thread > - mg_start_thread(master_thread, ctx); > +#ifdef _WIN32 > > - // Start worker threads > - for (i = 0; i < atoi(ctx->config[NUM_THREADS]); i++) { > - if (mg_start_thread(worker_thread, ctx) != 0) { > - cry(fc(ctx), "Cannot start worker thread: %ld", (long) ERRNO); > - } else { > - ctx->num_threads++; > - } > - } > +int rmdir(const char *dirname) { > + return _rmdir(dirname); > +} > > - return ctx; > +unsigned int sleep(unsigned int seconds) { > + Sleep(seconds * 1000); > + return 0; > } > + > +#endif /* _WIN32 */ > diff --git a/mongoose/mongoose.h b/mongoose/mongoose.h > index bf26182..3b56e26 100644 > --- a/mongoose/mongoose.h > +++ b/mongoose/mongoose.h > @@ -1,357 +1,6107 @@ > -// Copyright (c) 2004-2012 Sergey Lyubka > -// > -// Permission is hereby granted, free of charge, to any person obtaining a copy > -// of this software and associated documentation files (the "Software"), to deal > -// in the Software without restriction, including without limitation the rights > -// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell > -// copies of the Software, and to permit persons to whom the Software is > -// furnished to do so, subject to the following conditions: > -// > -// The above copyright notice and this permission notice shall be included in > -// all copies or substantial portions of the Software. > -// > -// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR > -// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, > -// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE > -// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER > -// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, > -// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN > -// THE SOFTWARE. > - > -#ifndef MONGOOSE_HEADER_INCLUDED > -#define MONGOOSE_HEADER_INCLUDED > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/common.h" > +#endif > +/* > + * Copyright (c) 2004-2013 Sergey Lyubka > + * Copyright (c) 2013-2015 Cesanta Software Limited > + * All rights reserved > + * > + * This software is dual-licensed: you can redistribute it and/or modify > + * it under the terms of the GNU General Public License version 2 as > + * published by the Free Software Foundation. For the terms of this > + * license, see <http://www.gnu.org/licenses/>. > + * > + * You are free to use this software under the terms of the GNU General > + * Public License, but WITHOUT ANY WARRANTY; without even the implied > + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. > + * See the GNU General Public License for more details. > + * > + * Alternatively, you can license this software under a commercial > + * license, as set out in <https://www.cesanta.com/license>. > + */ > > -#include <stdio.h> > +#ifndef CS_MONGOOSE_SRC_COMMON_H_ > +#define CS_MONGOOSE_SRC_COMMON_H_ > + > +#define MG_VERSION "6.10" > + > +/* Local tweaks, applied before any of Mongoose's own headers. */ > +#ifdef MG_LOCALS > +#include <mg_locals.h> > +#endif > + > +#endif /* CS_MONGOOSE_SRC_COMMON_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platform.h" > +#endif > +#ifndef CS_COMMON_PLATFORM_H_ > +#define CS_COMMON_PLATFORM_H_ > + > +/* > + * For the "custom" platform, includes and dependencies can be > + * provided through mg_locals.h. > + */ > +#define CS_P_CUSTOM 0 > +#define CS_P_UNIX 1 > +#define CS_P_WINDOWS 2 > +#define CS_P_ESP32 15 > +#define CS_P_ESP8266 3 > +#define CS_P_CC3100 6 > +#define CS_P_CC3200 4 > +#define CS_P_CC3220 17 > +#define CS_P_MSP432 5 > +#define CS_P_TM4C129 14 > +#define CS_P_MBED 7 > +#define CS_P_WINCE 8 > +#define CS_P_NXP_LPC 13 > +#define CS_P_NXP_KINETIS 9 > +#define CS_P_NRF51 12 > +#define CS_P_NRF52 10 > +#define CS_P_PIC32 11 > +#define CS_P_STM32 16 > +/* Next id: 18 */ > + > +/* If not specified explicitly, we guess platform by defines. */ > +#ifndef CS_PLATFORM > + > +#if defined(TARGET_IS_MSP432P4XX) || defined(__MSP432P401R__) > +#define CS_PLATFORM CS_P_MSP432 > +#elif defined(cc3200) || defined(TARGET_IS_CC3200) > +#define CS_PLATFORM CS_P_CC3200 > +#elif defined(cc3220) || defined(TARGET_IS_CC3220) > +#define CS_PLATFORM CS_P_CC3220 > +#elif defined(__unix__) || defined(__APPLE__) > +#define CS_PLATFORM CS_P_UNIX > +#elif defined(WINCE) > +#define CS_PLATFORM CS_P_WINCE > +#elif defined(_WIN32) > +#define CS_PLATFORM CS_P_WINDOWS > +#elif defined(__MBED__) > +#define CS_PLATFORM CS_P_MBED > +#elif defined(__USE_LPCOPEN) > +#define CS_PLATFORM CS_P_NXP_LPC > +#elif defined(FRDM_K64F) || defined(FREEDOM) > +#define CS_PLATFORM CS_P_NXP_KINETIS > +#elif defined(PIC32) > +#define CS_PLATFORM CS_P_PIC32 > +#elif defined(ESP_PLATFORM) > +#define CS_PLATFORM CS_P_ESP32 > +#elif defined(ICACHE_FLASH) > +#define CS_PLATFORM CS_P_ESP8266 > +#elif defined(TARGET_IS_TM4C129_RA0) || defined(TARGET_IS_TM4C129_RA1) || \ > + defined(TARGET_IS_TM4C129_RA2) > +#define CS_PLATFORM CS_P_TM4C129 > +#elif defined(STM32) > +#define CS_PLATFORM CS_P_STM32 > +#endif > + > +#ifndef CS_PLATFORM > +#error "CS_PLATFORM is not specified and we couldn't guess it." > +#endif > + > +#endif /* !defined(CS_PLATFORM) */ > + > +#define MG_NET_IF_SOCKET 1 > +#define MG_NET_IF_SIMPLELINK 2 > +#define MG_NET_IF_LWIP_LOW_LEVEL 3 > +#define MG_NET_IF_PIC32 4 > + > +#define MG_SSL_IF_OPENSSL 1 > +#define MG_SSL_IF_MBEDTLS 2 > +#define MG_SSL_IF_SIMPLELINK 3 > + > +/* Amalgamated: #include "common/platforms/platform_unix.h" */ > +/* Amalgamated: #include "common/platforms/platform_windows.h" */ > +/* Amalgamated: #include "common/platforms/platform_esp32.h" */ > +/* Amalgamated: #include "common/platforms/platform_esp8266.h" */ > +/* Amalgamated: #include "common/platforms/platform_cc3100.h" */ > +/* Amalgamated: #include "common/platforms/platform_cc3200.h" */ > +/* Amalgamated: #include "common/platforms/platform_cc3220.h" */ > +/* Amalgamated: #include "common/platforms/platform_mbed.h" */ > +/* Amalgamated: #include "common/platforms/platform_nrf51.h" */ > +/* Amalgamated: #include "common/platforms/platform_nrf52.h" */ > +/* Amalgamated: #include "common/platforms/platform_wince.h" */ > +/* Amalgamated: #include "common/platforms/platform_nxp_lpc.h" */ > +/* Amalgamated: #include "common/platforms/platform_nxp_kinetis.h" */ > +/* Amalgamated: #include "common/platforms/platform_pic32.h" */ > +/* Amalgamated: #include "common/platforms/platform_stm32.h" */ > + > +/* Common stuff */ > + > +#if !defined(WEAK) > +#if (defined(__GNUC__) || defined(__TI_COMPILER_VERSION__)) && !defined(_WIN32) > +#define WEAK __attribute__((weak)) > +#else > +#define WEAK > +#endif > +#endif > + > +#ifdef __GNUC__ > +#define NORETURN __attribute__((noreturn)) > +#define NOINLINE __attribute__((noinline)) > +#define WARN_UNUSED_RESULT __attribute__((warn_unused_result)) > +#define NOINSTR __attribute__((no_instrument_function)) > +#define DO_NOT_WARN_UNUSED __attribute__((unused)) > +#else > +#define NORETURN > +#define NOINLINE > +#define WARN_UNUSED_RESULT > +#define NOINSTR > +#define DO_NOT_WARN_UNUSED > +#endif /* __GNUC__ */ > + > +#ifndef ARRAY_SIZE > +#define ARRAY_SIZE(array) (sizeof(array) / sizeof(array[0])) > +#endif > + > +#endif /* CS_COMMON_PLATFORM_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_windows.h" > +#endif > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_WINDOWS_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_WINDOWS_H_ > +#if CS_PLATFORM == CS_P_WINDOWS > + > +/* > + * MSVC++ 14.0 _MSC_VER == 1900 (Visual Studio 2015) > + * MSVC++ 12.0 _MSC_VER == 1800 (Visual Studio 2013) > + * MSVC++ 11.0 _MSC_VER == 1700 (Visual Studio 2012) > + * MSVC++ 10.0 _MSC_VER == 1600 (Visual Studio 2010) > + * MSVC++ 9.0 _MSC_VER == 1500 (Visual Studio 2008) > + * MSVC++ 8.0 _MSC_VER == 1400 (Visual Studio 2005) > + * MSVC++ 7.1 _MSC_VER == 1310 (Visual Studio 2003) > + * MSVC++ 7.0 _MSC_VER == 1300 > + * MSVC++ 6.0 _MSC_VER == 1200 > + * MSVC++ 5.0 _MSC_VER == 1100 > + */ > +#ifdef _MSC_VER > +#pragma warning(disable : 4127) /* FD_SET() emits warning, disable it */ > +#pragma warning(disable : 4204) /* missing c99 support */ > +#endif > + > +#ifndef _WINSOCK_DEPRECATED_NO_WARNINGS > +#define _WINSOCK_DEPRECATED_NO_WARNINGS 1 > +#endif > + > +#ifndef _CRT_SECURE_NO_WARNINGS > +#define _CRT_SECURE_NO_WARNINGS > +#endif > + > +#include <assert.h> > +#include <direct.h> > +#include <errno.h> > +#include <fcntl.h> > +#include <io.h> > +#include <limits.h> > +#include <signal.h> > #include <stddef.h> > +#include <stdio.h> > +#include <stdlib.h> > +#include <sys/stat.h> > +#include <time.h> > +#include <ctype.h> > > -#ifdef __cplusplus > -extern "C" { > -#endif // __cplusplus > - > -struct mg_context; // Handle for the HTTP service itself > -struct mg_connection; // Handle for the individual connection > - > - > -// This structure contains information about the HTTP request. > -struct mg_request_info { > - const char *request_method; // "GET", "POST", etc > - const char *uri; // URL-decoded URI > - const char *http_version; // E.g. "1.0", "1.1" > - const char *query_string; // URL part after '?', not including '?', or NULL > - const char *remote_user; // Authenticated user, or NULL if no auth used > - long remote_ip; // Client's IP address > - int remote_port; // Client's port > - int is_ssl; // 1 if SSL-ed, 0 if not > - void *user_data; // User data pointer passed to mg_start() > - > - int num_headers; // Number of HTTP headers > - struct mg_header { > - const char *name; // HTTP header name > - const char *value; // HTTP header value > - } http_headers[64]; // Maximum 64 headers > -}; > - > - > -// This structure needs to be passed to mg_start(), to let mongoose know > -// which callbacks to invoke. For detailed description, see > -// https://github.com/valenok/mongoose/blob/master/UserManual.md > -struct mg_callbacks { > - // Called when mongoose has received new HTTP request. > - // If callback returns non-zero, > - // callback must process the request by sending valid HTTP headers and body, > - // and mongoose will not do any further processing. > - // If callback returns 0, mongoose processes the request itself. In this case, > - // callback must not send any data to the client. > - int (*begin_request)(struct mg_connection *); > - > - // Called when mongoose has finished processing request. > - void (*end_request)(const struct mg_connection *, int reply_status_code); > - > - // Called when mongoose is about to log a message. If callback returns > - // non-zero, mongoose does not log anything. > - int (*log_message)(const struct mg_connection *, const char *message); > - > - // Called when mongoose initializes SSL library. > - int (*init_ssl)(void *ssl_context, void *user_data); > - > - // Called when websocket request is received, before websocket handshake. > - // If callback returns 0, mongoose proceeds with handshake, otherwise > - // cinnection is closed immediately. > - int (*websocket_connect)(const struct mg_connection *); > - > - // Called when websocket handshake is successfully completed, and > - // connection is ready for data exchange. > - void (*websocket_ready)(struct mg_connection *); > - > - // Called when data frame has been received from the client. > - // Parameters: > - // bits: first byte of the websocket frame, see websocket RFC at > - // http://tools.ietf.org/html/rfc6455, section 5.2 > - // data, data_len: payload, with mask (if any) already applied. > - // Return value: > - // 0: keep this websocket connection opened. > - // non-0: close this websocket connection. > - int (*websocket_data)(struct mg_connection *, int bits, > - char *data, size_t data_len); > - > - // Called when mongoose tries to open a file. Used to intercept file open > - // calls, and serve file data from memory instead. > - // Parameters: > - // path: Full path to the file to open. > - // data_len: Placeholder for the file size, if file is served from memory. > - // Return value: > - // NULL: do not serve file from memory, proceed with normal file open. > - // non-NULL: pointer to the file contents in memory. data_len must be > - // initilized with the size of the memory block. > - const char * (*open_file)(const struct mg_connection *, > - const char *path, size_t *data_len); > - > - // Called when mongoose is about to serve Lua server page (.lp file), if > - // Lua support is enabled. > - // Parameters: > - // lua_context: "lua_State *" pointer. > - void (*init_lua)(struct mg_connection *, void *lua_context); > - > - // Called when mongoose has uploaded a file to a temporary directory as a > - // result of mg_upload() call. > - // Parameters: > - // file_file: full path name to the uploaded file. > - void (*upload)(struct mg_connection *, const char *file_name); > - > - // Called when mongoose is about to send HTTP error to the client. > - // Implementing this callback allows to create custom error pages. > - // Parameters: > - // status: HTTP error status code. > - int (*http_error)(struct mg_connection *, int status); > -}; > - > -// Start web server. > -// > -// Parameters: > -// callbacks: mg_callbacks structure with user-defined callbacks. > -// options: NULL terminated list of option_name, option_value pairs that > -// specify Mongoose configuration parameters. > -// > -// Side-effects: on UNIX, ignores SIGCHLD and SIGPIPE signals. If custom > -// processing is required for these, signal handlers must be set up > -// after calling mg_start(). > -// > -// > -// Example: > -// const char *options[] = { > -// "document_root", "/var/www", > -// "listening_ports", "80,443s", > -// NULL > -// }; > -// struct mg_context *ctx = mg_start(&my_func, NULL, options); > -// > -// Refer to https://github.com/valenok/mongoose/blob/master/UserManual.md > -// for the list of valid option and their possible values. > -// > -// Return: > -// web server context, or NULL on error. > -struct mg_context *mg_start(const struct mg_callbacks *callbacks, > - void *user_data, > - const char **configuration_options); > - > - > -// Stop the web server. > -// > -// Must be called last, when an application wants to stop the web server and > -// release all associated resources. This function blocks until all Mongoose > -// threads are stopped. Context pointer becomes invalid. > -void mg_stop(struct mg_context *); > - > - > -// Get the value of particular configuration parameter. > -// The value returned is read-only. Mongoose does not allow changing > -// configuration at run time. > -// If given parameter name is not valid, NULL is returned. For valid > -// names, return value is guaranteed to be non-NULL. If parameter is not > -// set, zero-length string is returned. > -const char *mg_get_option(const struct mg_context *ctx, const char *name); > - > - > -// Return array of strings that represent valid configuration options. > -// For each option, a short name, long name, and default value is returned. > -// Array is NULL terminated. > -const char **mg_get_valid_option_names(void); > - > - > -// Add, edit or delete the entry in the passwords file. > -// > -// This function allows an application to manipulate .htpasswd files on the > -// fly by adding, deleting and changing user records. This is one of the > -// several ways of implementing authentication on the server side. For another, > -// cookie-based way please refer to the examples/chat.c in the source tree. > -// > -// If password is not NULL, entry is added (or modified if already exists). > -// If password is NULL, entry is deleted. > -// > -// Return: > -// 1 on success, 0 on error. > -int mg_modify_passwords_file(const char *passwords_file_name, > - const char *domain, > - const char *user, > - const char *password); > - > - > -// Return information associated with the request. > -struct mg_request_info *mg_get_request_info(struct mg_connection *); > - > - > -// Send data to the client. > -// Return: > -// 0 when the connection has been closed > -// -1 on error > -// >0 number of bytes written on success > -int mg_write(struct mg_connection *, const void *buf, size_t len); > - > - > -// Macros for enabling compiler-specific checks for printf-like arguments. > -#undef PRINTF_FORMAT_STRING > +#ifdef _MSC_VER > +#pragma comment(lib, "ws2_32.lib") /* Linking with winsock library */ > +#endif > + > +#include <winsock2.h> > +#include <ws2tcpip.h> > +#include <windows.h> > +#include <process.h> > + > +#if defined(_MSC_VER) && _MSC_VER >= 1800 > +#define strdup _strdup > +#endif > + > +#ifndef EINPROGRESS > +#define EINPROGRESS WSAEINPROGRESS > +#endif > +#ifndef EWOULDBLOCK > +#define EWOULDBLOCK WSAEWOULDBLOCK > +#endif > +#ifndef __func__ > +#define STRX(x) #x > +#define STR(x) STRX(x) > +#define __func__ __FILE__ ":" STR(__LINE__) > +#endif > +#define snprintf _snprintf > +#define vsnprintf _vsnprintf > +#define to64(x) _atoi64(x) > +#if !defined(__MINGW32__) && !defined(__MINGW64__) > +#define popen(x, y) _popen((x), (y)) > +#define pclose(x) _pclose(x) > +#define fileno _fileno > +#endif > #if defined(_MSC_VER) && _MSC_VER >= 1400 > -#include <sal.h> > -#if _MSC_VER > 1400 > -#define PRINTF_FORMAT_STRING(s) _Printf_format_string_ s > +#define fseeko(x, y, z) _fseeki64((x), (y), (z)) > #else > -#define PRINTF_FORMAT_STRING(s) __format_string s > +#define fseeko(x, y, z) fseek((x), (y), (z)) > #endif > +#if defined(_MSC_VER) && _MSC_VER <= 1200 > +typedef unsigned long uintptr_t; > +typedef long intptr_t; > +#endif > +typedef int socklen_t; > +#if _MSC_VER >= 1700 > +#include <stdint.h> > #else > -#define PRINTF_FORMAT_STRING(s) s > +typedef signed char int8_t; > +typedef unsigned char uint8_t; > +typedef int int32_t; > +typedef unsigned int uint32_t; > +typedef short int16_t; > +typedef unsigned short uint16_t; > +typedef __int64 int64_t; > +typedef unsigned __int64 uint64_t; > +#endif > +typedef SOCKET sock_t; > +typedef uint32_t in_addr_t; > +#ifndef UINT16_MAX > +#define UINT16_MAX 65535 > +#endif > +#ifndef UINT32_MAX > +#define UINT32_MAX 4294967295 > +#endif > +#ifndef pid_t > +#define pid_t HANDLE > #endif > +#define INT64_FMT "I64d" > +#define INT64_X_FMT "I64x" > +#define SIZE_T_FMT "Iu" > +typedef struct _stati64 cs_stat_t; > +#ifndef S_ISDIR > +#define S_ISDIR(x) (((x) &_S_IFMT) == _S_IFDIR) > +#endif > +#ifndef S_ISREG > +#define S_ISREG(x) (((x) &_S_IFMT) == _S_IFREG) > +#endif > +#define DIRSEP '\\' > +#define CS_DEFINE_DIRENT > > -#ifdef __GNUC__ > -#define PRINTF_ARGS(x, y) __attribute__((format(printf, x, y))) > +#ifndef va_copy > +#ifdef __va_copy > +#define va_copy __va_copy > +#else > +#define va_copy(x, y) (x) = (y) > +#endif > +#endif > + > +#ifndef MG_MAX_HTTP_REQUEST_SIZE > +#define MG_MAX_HTTP_REQUEST_SIZE 8192 > +#endif > + > +#ifndef MG_MAX_HTTP_SEND_MBUF > +#define MG_MAX_HTTP_SEND_MBUF 4096 > +#endif > + > +#ifndef MG_MAX_HTTP_HEADERS > +#define MG_MAX_HTTP_HEADERS 40 > +#endif > + > +#ifndef CS_ENABLE_STDIO > +#define CS_ENABLE_STDIO 1 > +#endif > + > +#ifndef MG_ENABLE_BROADCAST > +#define MG_ENABLE_BROADCAST 1 > +#endif > + > +#ifndef MG_ENABLE_DIRECTORY_LISTING > +#define MG_ENABLE_DIRECTORY_LISTING 1 > +#endif > + > +#ifndef MG_ENABLE_FILESYSTEM > +#define MG_ENABLE_FILESYSTEM 1 > +#endif > + > +#ifndef MG_ENABLE_HTTP_CGI > +#define MG_ENABLE_HTTP_CGI MG_ENABLE_FILESYSTEM > +#endif > + > +#ifndef MG_NET_IF > +#define MG_NET_IF MG_NET_IF_SOCKET > +#endif > + > +int rmdir(const char *dirname); > +unsigned int sleep(unsigned int seconds); > + > +#endif /* CS_PLATFORM == CS_P_WINDOWS */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_WINDOWS_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_unix.h" > +#endif > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_UNIX_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_UNIX_H_ > +#if CS_PLATFORM == CS_P_UNIX > + > +#ifndef _XOPEN_SOURCE > +#define _XOPEN_SOURCE 600 > +#endif > + > +/* <inttypes.h> wants this for C++ */ > +#ifndef __STDC_FORMAT_MACROS > +#define __STDC_FORMAT_MACROS > +#endif > + > +/* C++ wants that for INT64_MAX */ > +#ifndef __STDC_LIMIT_MACROS > +#define __STDC_LIMIT_MACROS > +#endif > + > +/* Enable fseeko() and ftello() functions */ > +#ifndef _LARGEFILE_SOURCE > +#define _LARGEFILE_SOURCE > +#endif > + > +/* Enable 64-bit file offsets */ > +#ifndef _FILE_OFFSET_BITS > +#define _FILE_OFFSET_BITS 64 > +#endif > + > +#include <arpa/inet.h> > +#include <assert.h> > +#include <ctype.h> > +#include <dirent.h> > +#include <errno.h> > +#include <fcntl.h> > +#include <inttypes.h> > +#include <stdint.h> > +#include <limits.h> > +#include <math.h> > +#include <netdb.h> > +#include <netinet/in.h> > +#include <pthread.h> > +#include <signal.h> > +#include <stdarg.h> > +#include <stdio.h> > +#include <stdlib.h> > +#include <string.h> > +#include <sys/param.h> > +#include <sys/socket.h> > +#include <sys/select.h> > +#include <sys/stat.h> > +#include <sys/time.h> > +#include <sys/types.h> > +#include <unistd.h> > + > +#ifdef __APPLE__ > +#include <machine/endian.h> > +#ifndef BYTE_ORDER > +#define LITTLE_ENDIAN __DARWIN_LITTLE_ENDIAN > +#define BIG_ENDIAN __DARWIN_BIG_ENDIAN > +#define PDP_ENDIAN __DARWIN_PDP_ENDIAN > +#define BYTE_ORDER __DARWIN_BYTE_ORDER > +#endif > +#endif > + > +/* > + * osx correctly avoids defining strtoll when compiling in strict ansi mode. > + * c++ 11 standard defines strtoll as well. > + * We require strtoll, and if your embedded pre-c99 compiler lacks one, please > + * implement a shim. > + */ > +#if !(defined(__cplusplus) && __cplusplus >= 201103L) && \ > + !(defined(__DARWIN_C_LEVEL) && __DARWIN_C_LEVEL >= 200809L) > +long long strtoll(const char *, char **, int); > +#endif > + > +typedef int sock_t; > +#define INVALID_SOCKET (-1) > +#define SIZE_T_FMT "zu" > +typedef struct stat cs_stat_t; > +#define DIRSEP '/' > +#define to64(x) strtoll(x, NULL, 10) > +#define INT64_FMT PRId64 > +#define INT64_X_FMT PRIx64 > + > +#ifndef __cdecl > +#define __cdecl > +#endif > + > +#ifndef va_copy > +#ifdef __va_copy > +#define va_copy __va_copy > +#else > +#define va_copy(x, y) (x) = (y) > +#endif > +#endif > + > +#define closesocket(x) close(x) > + > +#ifndef MG_MAX_HTTP_REQUEST_SIZE > +#define MG_MAX_HTTP_REQUEST_SIZE 8192 > +#endif > + > +#ifndef MG_MAX_HTTP_SEND_MBUF > +#define MG_MAX_HTTP_SEND_MBUF 4096 > +#endif > + > +#ifndef MG_MAX_HTTP_HEADERS > +#define MG_MAX_HTTP_HEADERS 40 > +#endif > + > +#ifndef CS_ENABLE_STDIO > +#define CS_ENABLE_STDIO 1 > +#endif > + > +#ifndef MG_ENABLE_BROADCAST > +#define MG_ENABLE_BROADCAST 1 > +#endif > + > +#ifndef MG_ENABLE_DIRECTORY_LISTING > +#define MG_ENABLE_DIRECTORY_LISTING 1 > +#endif > + > +#ifndef MG_ENABLE_FILESYSTEM > +#define MG_ENABLE_FILESYSTEM 1 > +#endif > + > +#ifndef MG_ENABLE_HTTP_CGI > +#define MG_ENABLE_HTTP_CGI MG_ENABLE_FILESYSTEM > +#endif > + > +#ifndef MG_NET_IF > +#define MG_NET_IF MG_NET_IF_SOCKET > +#endif > + > +#ifndef MG_HOSTS_FILE_NAME > +#define MG_HOSTS_FILE_NAME "/etc/hosts" > +#endif > + > +#ifndef MG_RESOLV_CONF_FILE_NAME > +#define MG_RESOLV_CONF_FILE_NAME "/etc/resolv.conf" > +#endif > + > +#endif /* CS_PLATFORM == CS_P_UNIX */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_UNIX_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_esp32.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_ESP32_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_ESP32_H_ > +#if CS_PLATFORM == CS_P_ESP32 > + > +#include <assert.h> > +#include <ctype.h> > +#include <dirent.h> > +#include <fcntl.h> > +#include <inttypes.h> > +#include <machine/endian.h> > +#include <stdint.h> > +#include <string.h> > +#include <sys/stat.h> > +#include <sys/time.h> > + > +#define SIZE_T_FMT "u" > +typedef struct stat cs_stat_t; > +#define DIRSEP '/' > +#define to64(x) strtoll(x, NULL, 10) > +#define INT64_FMT PRId64 > +#define INT64_X_FMT PRIx64 > +#define __cdecl > +#define _FILE_OFFSET_BITS 32 > + > +#define MG_LWIP 1 > + > +#ifndef MG_NET_IF > +#define MG_NET_IF MG_NET_IF_SOCKET > +#endif > + > +#ifndef CS_ENABLE_STDIO > +#define CS_ENABLE_STDIO 1 > +#endif > + > +#endif /* CS_PLATFORM == CS_P_ESP32 */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_ESP32_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_esp8266.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_ESP8266_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_ESP8266_H_ > +#if CS_PLATFORM == CS_P_ESP8266 > + > +#include <assert.h> > +#include <ctype.h> > +#include <fcntl.h> > +#include <inttypes.h> > +#include <machine/endian.h> > +#include <string.h> > +#include <sys/stat.h> > +#include <sys/time.h> > + > +#define SIZE_T_FMT "u" > +typedef struct stat cs_stat_t; > +#define DIRSEP '/' > +#if !defined(MGOS_VFS_DEFINE_DIRENT) > +#define CS_DEFINE_DIRENT > +#endif > + > +#define to64(x) strtoll(x, NULL, 10) > +#define INT64_FMT PRId64 > +#define INT64_X_FMT PRIx64 > +#define __cdecl > +#define _FILE_OFFSET_BITS 32 > + > +#if !defined(RTOS_SDK) && !defined(__cplusplus) > +#define fileno(x) -1 > +#endif > + > +#define MG_LWIP 1 > + > +/* struct timeval is defined in sys/time.h. */ > +#define LWIP_TIMEVAL_PRIVATE 0 > + > +#ifndef MG_NET_IF > +#include <lwip/opt.h> > +#if LWIP_SOCKET /* RTOS SDK has LWIP sockets */ > +#define MG_NET_IF MG_NET_IF_SOCKET > +#else > +#define MG_NET_IF MG_NET_IF_LWIP_LOW_LEVEL > +#endif > +#endif > + > +#ifndef CS_ENABLE_STDIO > +#define CS_ENABLE_STDIO 1 > +#endif > + > +#endif /* CS_PLATFORM == CS_P_ESP8266 */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_ESP8266_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_cc3100.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_CC3100_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_CC3100_H_ > +#if CS_PLATFORM == CS_P_CC3100 > + > +#include <assert.h> > +#include <ctype.h> > +#include <errno.h> > +#include <inttypes.h> > +#include <stdint.h> > +#include <string.h> > +#include <time.h> > + > +#define MG_NET_IF MG_NET_IF_SIMPLELINK > +#define MG_SSL_IF MG_SSL_IF_SIMPLELINK > + > +/* > + * CC3100 SDK and STM32 SDK include headers w/out path, just like > + * #include "simplelink.h". As result, we have to add all required directories > + * into Makefile IPATH and do the same thing (include w/out path) > + */ > + > +#include <simplelink.h> > +#include <netapp.h> > +#undef timeval > + > +typedef int sock_t; > +#define INVALID_SOCKET (-1) > + > +#define to64(x) strtoll(x, NULL, 10) > +#define INT64_FMT PRId64 > +#define INT64_X_FMT PRIx64 > +#define SIZE_T_FMT "u" > + > +#define SOMAXCONN 8 > + > +const char *inet_ntop(int af, const void *src, char *dst, socklen_t size); > +char *inet_ntoa(struct in_addr in); > +int inet_pton(int af, const char *src, void *dst); > + > +#endif /* CS_PLATFORM == CS_P_CC3100 */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_CC3100_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_cc3200.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_CC3200_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_CC3200_H_ > +#if CS_PLATFORM == CS_P_CC3200 > + > +#include <assert.h> > +#include <ctype.h> > +#include <errno.h> > +#include <inttypes.h> > +#include <stdint.h> > +#include <string.h> > +#include <time.h> > + > +#ifndef __TI_COMPILER_VERSION__ > +#include <fcntl.h> > +#include <sys/time.h> > +#endif > + > +#define MG_NET_IF MG_NET_IF_SIMPLELINK > +#define MG_SSL_IF MG_SSL_IF_SIMPLELINK > + > +/* Only SPIFFS supports directories, SLFS does not. */ > +#if defined(CC3200_FS_SPIFFS) && !defined(MG_ENABLE_DIRECTORY_LISTING) > +#define MG_ENABLE_DIRECTORY_LISTING 1 > +#endif > + > +/* Amalgamated: #include "common/platforms/simplelink/cs_simplelink.h" */ > + > +typedef int sock_t; > +#define INVALID_SOCKET (-1) > +#define SIZE_T_FMT "u" > +typedef struct stat cs_stat_t; > +#define DIRSEP '/' > +#define to64(x) strtoll(x, NULL, 10) > +#define INT64_FMT PRId64 > +#define INT64_X_FMT PRIx64 > +#define __cdecl > + > +#define fileno(x) -1 > + > +/* Some functions we implement for Mongoose. */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif > + > +#ifdef __TI_COMPILER_VERSION__ > +struct SlTimeval_t; > +#define timeval SlTimeval_t > +int gettimeofday(struct timeval *t, void *tz); > +int settimeofday(const struct timeval *tv, const void *tz); > + > +int asprintf(char **strp, const char *fmt, ...); > + > +#endif > + > +/* TI's libc does not have stat & friends, add them. */ > +#ifdef __TI_COMPILER_VERSION__ > + > +#include <file.h> > + > +typedef unsigned int mode_t; > +typedef size_t _off_t; > +typedef long ssize_t; > + > +struct stat { > + int st_ino; > + mode_t st_mode; > + int st_nlink; > + time_t st_mtime; > + off_t st_size; > +}; > + > +int _stat(const char *pathname, struct stat *st); > +int stat(const char *pathname, struct stat *st); > + > +#define __S_IFMT 0170000 > + > +#define __S_IFDIR 0040000 > +#define __S_IFCHR 0020000 > +#define __S_IFREG 0100000 > + > +#define __S_ISTYPE(mode, mask) (((mode) &__S_IFMT) == (mask)) > + > +#define S_IFDIR __S_IFDIR > +#define S_IFCHR __S_IFCHR > +#define S_IFREG __S_IFREG > +#define S_ISDIR(mode) __S_ISTYPE((mode), __S_IFDIR) > +#define S_ISREG(mode) __S_ISTYPE((mode), __S_IFREG) > + > +/* 5.x series compilers don't have va_copy, 16.x do. */ > +#if __TI_COMPILER_VERSION__ < 16000000 > +#define va_copy(apc, ap) ((apc) = (ap)) > +#endif > + > +#endif /* __TI_COMPILER_VERSION__ */ > + > +#ifdef CC3200_FS_SLFS > +#define MG_FS_SLFS > +#endif > + > +#if (defined(CC3200_FS_SPIFFS) || defined(CC3200_FS_SLFS)) && \ > + !defined(MG_ENABLE_FILESYSTEM) > +#define MG_ENABLE_FILESYSTEM 1 > +#define CS_DEFINE_DIRENT > +#endif > + > +#ifndef CS_ENABLE_STDIO > +#define CS_ENABLE_STDIO 1 > +#endif > + > +#ifdef __cplusplus > +} > +#endif > + > +#endif /* CS_PLATFORM == CS_P_CC3200 */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_CC3200_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_msp432.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_MSP432_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_MSP432_H_ > +#if CS_PLATFORM == CS_P_MSP432 > + > +#include <assert.h> > +#include <ctype.h> > +#include <errno.h> > +#include <inttypes.h> > +#include <stdint.h> > +#include <string.h> > +#include <time.h> > + > +#ifndef __TI_COMPILER_VERSION__ > +#include <fcntl.h> > +#include <sys/time.h> > +#endif > + > +#define MG_NET_IF MG_NET_IF_SIMPLELINK > +#define MG_SSL_IF MG_SSL_IF_SIMPLELINK > + > +/* Amalgamated: #include "common/platforms/simplelink/cs_simplelink.h" */ > + > +typedef int sock_t; > +#define INVALID_SOCKET (-1) > +#define SIZE_T_FMT "u" > +typedef struct stat cs_stat_t; > +#define DIRSEP '/' > +#define to64(x) strtoll(x, NULL, 10) > +#define INT64_FMT PRId64 > +#define INT64_X_FMT PRIx64 > +#define __cdecl > + > +#define fileno(x) -1 > + > +/* Some functions we implement for Mongoose. */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif > + > +#ifdef __TI_COMPILER_VERSION__ > +struct SlTimeval_t; > +#define timeval SlTimeval_t > +int gettimeofday(struct timeval *t, void *tz); > +#endif > + > +/* TI's libc does not have stat & friends, add them. */ > +#ifdef __TI_COMPILER_VERSION__ > + > +#include <file.h> > + > +typedef unsigned int mode_t; > +typedef size_t _off_t; > +typedef long ssize_t; > + > +struct stat { > + int st_ino; > + mode_t st_mode; > + int st_nlink; > + time_t st_mtime; > + off_t st_size; > +}; > + > +int _stat(const char *pathname, struct stat *st); > +#define stat(a, b) _stat(a, b) > + > +#define __S_IFMT 0170000 > + > +#define __S_IFDIR 0040000 > +#define __S_IFCHR 0020000 > +#define __S_IFREG 0100000 > + > +#define __S_ISTYPE(mode, mask) (((mode) &__S_IFMT) == (mask)) > + > +#define S_IFDIR __S_IFDIR > +#define S_IFCHR __S_IFCHR > +#define S_IFREG __S_IFREG > +#define S_ISDIR(mode) __S_ISTYPE((mode), __S_IFDIR) > +#define S_ISREG(mode) __S_ISTYPE((mode), __S_IFREG) > + > +/* As of 5.2.7, TI compiler does not support va_copy() yet. */ > +#define va_copy(apc, ap) ((apc) = (ap)) > + > +#endif /* __TI_COMPILER_VERSION__ */ > + > +#ifndef CS_ENABLE_STDIO > +#define CS_ENABLE_STDIO 1 > +#endif > + > +#if (defined(CC3200_FS_SPIFFS) || defined(CC3200_FS_SLFS)) && \ > + !defined(MG_ENABLE_FILESYSTEM) > +#define MG_ENABLE_FILESYSTEM 1 > +#endif > + > +#ifdef __cplusplus > +} > +#endif > + > +#endif /* CS_PLATFORM == CS_P_MSP432 */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_MSP432_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_tm4c129.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_TM4C129_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_TM4C129_H_ > +#if CS_PLATFORM == CS_P_TM4C129 > + > +#include <assert.h> > +#include <ctype.h> > +#include <errno.h> > +#include <inttypes.h> > +#include <stdint.h> > +#include <string.h> > +#include <time.h> > + > +#ifndef __TI_COMPILER_VERSION__ > +#include <fcntl.h> > +#include <sys/time.h> > +#endif > + > +#define SIZE_T_FMT "u" > +typedef struct stat cs_stat_t; > +#define DIRSEP '/' > +#define to64(x) strtoll(x, NULL, 10) > +#define INT64_FMT PRId64 > +#define INT64_X_FMT PRIx64 > +#define __cdecl > + > +#ifndef MG_NET_IF > +#include <lwip/opt.h> > +#if LWIP_SOCKET > +#define MG_NET_IF MG_NET_IF_SOCKET > #else > -#define PRINTF_ARGS(x, y) > -#endif > - > -// Send data to the client using printf() semantics. > -// > -// Works exactly like mg_write(), but allows to do message formatting. > -int mg_printf(struct mg_connection *, > - PRINTF_FORMAT_STRING(const char *fmt), ...) PRINTF_ARGS(2, 3); > - > - > -// Send contents of the entire file together with HTTP headers. > -void mg_send_file(struct mg_connection *conn, const char *path); > - > - > -// Read data from the remote end, return number of bytes read. > -int mg_read(struct mg_connection *, void *buf, size_t len); > - > - > -// Get the value of particular HTTP header. > -// > -// This is a helper function. It traverses request_info->http_headers array, > -// and if the header is present in the array, returns its value. If it is > -// not present, NULL is returned. > -const char *mg_get_header(const struct mg_connection *, const char *name); > - > - > -// Get a value of particular form variable. > -// > -// Parameters: > -// data: pointer to form-uri-encoded buffer. This could be either POST data, > -// or request_info.query_string. > -// data_len: length of the encoded data. > -// var_name: variable name to decode from the buffer > -// dst: destination buffer for the decoded variable > -// dst_len: length of the destination buffer > -// > -// Return: > -// On success, length of the decoded variable. > -// On error: > -// -1 (variable not found). > -// -2 (destination buffer is NULL, zero length or too small to hold the > -// decoded variable). > -// > -// Destination buffer is guaranteed to be '\0' - terminated if it is not > -// NULL or zero length. > -int mg_get_var(const char *data, size_t data_len, > - const char *var_name, char *dst, size_t dst_len); > - > -// Fetch value of certain cookie variable into the destination buffer. > -// > -// Destination buffer is guaranteed to be '\0' - terminated. In case of > -// failure, dst[0] == '\0'. Note that RFC allows many occurrences of the same > -// parameter. This function returns only first occurrence. > -// > -// Return: > -// On success, value length. > -// On error: > -// -1 (either "Cookie:" header is not present at all or the requested > -// parameter is not found). > -// -2 (destination buffer is NULL, zero length or too small to hold the > -// value). > -int mg_get_cookie(const char *cookie, const char *var_name, > - char *buf, size_t buf_len); > - > - > -// Download data from the remote web server. > -// host: host name to connect to, e.g. "foo.com", or "10.12.40.1". > -// port: port number, e.g. 80. > -// use_ssl: wether to use SSL connection. > -// error_buffer, error_buffer_size: error message placeholder. > -// request_fmt,...: HTTP request. > -// Return: > -// On success, valid pointer to the new connection, suitable for mg_read(). > -// On error, NULL. error_buffer contains error message. > -// Example: > -// char ebuf[100]; > -// struct mg_connection *conn; > -// conn = mg_download("google.com", 80, 0, ebuf, sizeof(ebuf), > -// "%s", "GET / HTTP/1.0\r\nHost: google.com\r\n\r\n"); > -struct mg_connection *mg_download(const char *host, int port, int use_ssl, > - char *error_buffer, size_t error_buffer_size, > - PRINTF_FORMAT_STRING(const char *request_fmt), > - ...) PRINTF_ARGS(6, 7); > - > - > -// Close the connection opened by mg_download(). > -void mg_close_connection(struct mg_connection *conn); > - > -struct mg_connection *mg_connect(const char *host, int port, int use_ssl, > - char *ebuf, size_t ebuf_len); > - > -// File upload functionality. Each uploaded file gets saved into a temporary > -// file and MG_UPLOAD event is sent. > -// Return number of uploaded files. > -int mg_upload(struct mg_connection *conn, const char *destination_dir); > - > - > -// Convenience function -- create detached thread. > -// Return: 0 on success, non-0 on error. > -typedef void * (*mg_thread_func_t)(void *); > -int mg_start_thread(mg_thread_func_t f, void *p); > - > - > -// Return builtin mime type for the given file name. > -// For unrecognized extensions, "text/plain" is returned. > -const char *mg_get_builtin_mime_type(const char *file_name); > - > - > -// Return Mongoose version. > -const char *mg_version(void); > - > - > -// MD5 hash given strings. > -// Buffer 'buf' must be 33 bytes long. Varargs is a NULL terminated list of > -// ASCIIz strings. When function returns, buf will contain human-readable > -// MD5 hash. Example: > -// char buf[33]; > -// mg_md5(buf, "aa", "bb", NULL); > -char *mg_md5(char buf[33], ...); > - > - > -// Added some general functions > -const char *mg_strcasestr(const char *big_str, const char *small_str); > -int get_request_len(const char *buf, int buflen); > -int mg_vprintf(struct mg_connection *conn, const char *fmt, va_list ap); > - > -#ifdef __cplusplus > -} > -#endif // __cplusplus > - > -#endif // MONGOOSE_HEADER_INCLUDED > +#define MG_NET_IF MG_NET_IF_LWIP_LOW_LEVEL > +#endif > +#define MG_LWIP 1 > +#elif MG_NET_IF == MG_NET_IF_SIMPLELINK > +/* Amalgamated: #include "common/platforms/simplelink/cs_simplelink.h" */ > +#endif > + > +#ifndef CS_ENABLE_STDIO > +#define CS_ENABLE_STDIO 1 > +#endif > + > +#ifdef __TI_COMPILER_VERSION__ > +/* As of 5.2.8, TI compiler does not support va_copy() yet. */ > +#define va_copy(apc, ap) ((apc) = (ap)) > +#endif /* __TI_COMPILER_VERSION__ */ > + > +#ifdef __cplusplus > +} > +#endif > + > +#endif /* CS_PLATFORM == CS_P_TM4C129 */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_TM4C129_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_mbed.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_MBED_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_MBED_H_ > +#if CS_PLATFORM == CS_P_MBED > + > +/* > + * mbed.h contains C++ code (e.g. templates), thus, it should be processed > + * only if included directly to startup file (ex: main.cpp) > + */ > +#ifdef __cplusplus > +/* Amalgamated: #include "mbed.h" */ > +#endif /* __cplusplus */ > + > +#include <assert.h> > +#include <ctype.h> > +#include <errno.h> > +#include <inttypes.h> > +#include <stdint.h> > +#include <string.h> > +#include <time.h> > +#include <sys/stat.h> > +#include <sys/types.h> > +#include <fcntl.h> > +#include <stdio.h> > + > +typedef struct stat cs_stat_t; > +#define DIRSEP '/' > + > +#ifndef CS_ENABLE_STDIO > +#define CS_ENABLE_STDIO 1 > +#endif > + > +/* > + * mbed can be compiled with the ARM compiler which > + * just doesn't come with a gettimeofday shim > + * because it's a BSD API and ARM targets embedded > + * non-unix platforms. > + */ > +#if defined(__ARMCC_VERSION) || defined(__ICCARM__) > +#define _TIMEVAL_DEFINED > +#define gettimeofday _gettimeofday > + > +/* copied from GCC on ARM; for some reason useconds are signed */ > +typedef long suseconds_t; /* microseconds (signed) */ > +struct timeval { > + time_t tv_sec; /* seconds */ > + suseconds_t tv_usec; /* and microseconds */ > +}; > + > +#endif > + > +#if MG_NET_IF == MG_NET_IF_SIMPLELINK > + > +#define MG_SIMPLELINK_NO_OSI 1 > + > +#include <simplelink.h> > + > +typedef int sock_t; > +#define INVALID_SOCKET (-1) > + > +#define to64(x) strtoll(x, NULL, 10) > +#define INT64_FMT PRId64 > +#define INT64_X_FMT PRIx64 > +#define SIZE_T_FMT "u" > + > +#define SOMAXCONN 8 > + > +const char *inet_ntop(int af, const void *src, char *dst, socklen_t size); > +char *inet_ntoa(struct in_addr in); > +int inet_pton(int af, const char *src, void *dst); > +int inet_aton(const char *cp, struct in_addr *inp); > +in_addr_t inet_addr(const char *cp); > + > +#endif /* MG_NET_IF == MG_NET_IF_SIMPLELINK */ > + > +#endif /* CS_PLATFORM == CS_P_MBED */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_MBED_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_nrf51.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_NRF51_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_NRF51_H_ > +#if CS_PLATFORM == CS_P_NRF51 > + > +#include <assert.h> > +#include <ctype.h> > +#include <inttypes.h> > +#include <stdint.h> > +#include <string.h> > +#include <time.h> > + > +#define to64(x) strtoll(x, NULL, 10) > + > +#define MG_NET_IF MG_NET_IF_LWIP_LOW_LEVEL > +#define MG_LWIP 1 > +#define MG_ENABLE_IPV6 1 > + > +/* > + * For ARM C Compiler, make lwip to export `struct timeval`; for other > + * compilers, suppress it. > + */ > +#if !defined(__ARMCC_VERSION) > +#define LWIP_TIMEVAL_PRIVATE 0 > +#else > +struct timeval; > +int gettimeofday(struct timeval *tp, void *tzp); > +#endif > + > +#define INT64_FMT PRId64 > +#define SIZE_T_FMT "u" > + > +/* > + * ARM C Compiler doesn't have strdup, so we provide it > + */ > +#define CS_ENABLE_STRDUP defined(__ARMCC_VERSION) > + > +#endif /* CS_PLATFORM == CS_P_NRF51 */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_NRF51_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_nrf52.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_NRF52_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_NRF52_H_ > +#if CS_PLATFORM == CS_P_NRF52 > + > +#include <assert.h> > +#include <ctype.h> > +#include <errno.h> > +#include <inttypes.h> > +#include <stdint.h> > +#include <string.h> > +#include <time.h> > + > +#define to64(x) strtoll(x, NULL, 10) > + > +#define MG_NET_IF MG_NET_IF_LWIP_LOW_LEVEL > +#define MG_LWIP 1 > +#define MG_ENABLE_IPV6 1 > + > +#if !defined(ENOSPC) > +#define ENOSPC 28 /* No space left on device */ > +#endif > + > +/* > + * For ARM C Compiler, make lwip to export `struct timeval`; for other > + * compilers, suppress it. > + */ > +#if !defined(__ARMCC_VERSION) > +#define LWIP_TIMEVAL_PRIVATE 0 > +#endif > + > +#define INT64_FMT PRId64 > +#define SIZE_T_FMT "u" > + > +/* > + * ARM C Compiler doesn't have strdup, so we provide it > + */ > +#define CS_ENABLE_STRDUP defined(__ARMCC_VERSION) > + > +#endif /* CS_PLATFORM == CS_P_NRF52 */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_NRF52_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/simplelink/cs_simplelink.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_SIMPLELINK_CS_SIMPLELINK_H_ > +#define CS_COMMON_PLATFORMS_SIMPLELINK_CS_SIMPLELINK_H_ > + > +#if defined(MG_NET_IF) && MG_NET_IF == MG_NET_IF_SIMPLELINK > + > +/* If simplelink.h is already included, all bets are off. */ > +#if !defined(__SIMPLELINK_H__) > + > +#include <stdbool.h> > + > +#ifndef __TI_COMPILER_VERSION__ > +#undef __CONCAT > +#undef FD_CLR > +#undef FD_ISSET > +#undef FD_SET > +#undef FD_SETSIZE > +#undef FD_ZERO > +#undef fd_set > +#endif > + > +#if CS_PLATFORM == CS_P_CC3220 > +#include <ti/drivers/net/wifi/porting/user.h> > +#include <ti/drivers/net/wifi/simplelink.h> > +#include <ti/drivers/net/wifi/sl_socket.h> > +#include <ti/drivers/net/wifi/netapp.h> > +#else > +/* We want to disable SL_INC_STD_BSD_API_NAMING, so we include user.h ourselves > + * and undef it. */ > +#define PROVISIONING_API_H_ > +#include <simplelink/user.h> > +#undef PROVISIONING_API_H_ > +#undef SL_INC_STD_BSD_API_NAMING > + > +#include <simplelink/include/simplelink.h> > +#include <simplelink/include/netapp.h> > +#endif /* CS_PLATFORM == CS_P_CC3220 */ > + > +/* Now define only the subset of the BSD API that we use. > + * Notably, close(), read() and write() are not defined. */ > +#define AF_INET SL_AF_INET > + > +#define socklen_t SlSocklen_t > +#define sockaddr SlSockAddr_t > +#define sockaddr_in SlSockAddrIn_t > +#define in_addr SlInAddr_t > + > +#define SOCK_STREAM SL_SOCK_STREAM > +#define SOCK_DGRAM SL_SOCK_DGRAM > + > +#define htonl sl_Htonl > +#define ntohl sl_Ntohl > +#define htons sl_Htons > +#define ntohs sl_Ntohs > + > +#ifndef EACCES > +#define EACCES SL_EACCES > +#endif > +#ifndef EAFNOSUPPORT > +#define EAFNOSUPPORT SL_EAFNOSUPPORT > +#endif > +#ifndef EAGAIN > +#define EAGAIN SL_EAGAIN > +#endif > +#ifndef EBADF > +#define EBADF SL_EBADF > +#endif > +#ifndef EINVAL > +#define EINVAL SL_EINVAL > +#endif > +#ifndef ENOMEM > +#define ENOMEM SL_ENOMEM > +#endif > +#ifndef EWOULDBLOCK > +#define EWOULDBLOCK SL_EWOULDBLOCK > +#endif > + > +#define SOMAXCONN 8 > + > +#ifdef __cplusplus > +extern "C" { > +#endif > + > +const char *inet_ntop(int af, const void *src, char *dst, socklen_t size); > +char *inet_ntoa(struct in_addr in); > +int inet_pton(int af, const char *src, void *dst); > + > +struct mg_mgr; > +struct mg_connection; > + > +typedef void (*mg_init_cb)(struct mg_mgr *mgr); > +bool mg_start_task(int priority, int stack_size, mg_init_cb mg_init); > + > +void mg_run_in_task(void (*cb)(struct mg_mgr *mgr, void *arg), void *cb_arg); > + > +int sl_fs_init(void); > + > +void sl_restart_cb(struct mg_mgr *mgr); > + > +int sl_set_ssl_opts(int sock, struct mg_connection *nc); > + > +#ifdef __cplusplus > +} > +#endif > + > +#endif /* !defined(__SIMPLELINK_H__) */ > + > +/* Compatibility with older versions of SimpleLink */ > +#if SL_MAJOR_VERSION_NUM < 2 > + > +#define SL_ERROR_BSD_EAGAIN SL_EAGAIN > +#define SL_ERROR_BSD_EALREADY SL_EALREADY > +#define SL_ERROR_BSD_ENOPROTOOPT SL_ENOPROTOOPT > +#define SL_ERROR_BSD_ESECDATEERROR SL_ESECDATEERROR > +#define SL_ERROR_BSD_ESECSNOVERIFY SL_ESECSNOVERIFY > +#define SL_ERROR_FS_FAILED_TO_ALLOCATE_MEM SL_FS_ERR_FAILED_TO_ALLOCATE_MEM > +#define SL_ERROR_FS_FILE_HAS_NOT_BEEN_CLOSE_CORRECTLY \ > + SL_FS_FILE_HAS_NOT_BEEN_CLOSE_CORRECTLY > +#define SL_ERROR_FS_FILE_NAME_EXIST SL_FS_FILE_NAME_EXIST > +#define SL_ERROR_FS_FILE_NOT_EXISTS SL_FS_ERR_FILE_NOT_EXISTS > +#define SL_ERROR_FS_NO_AVAILABLE_NV_INDEX SL_FS_ERR_NO_AVAILABLE_NV_INDEX > +#define SL_ERROR_FS_NOT_ENOUGH_STORAGE_SPACE SL_FS_ERR_NO_AVAILABLE_BLOCKS > +#define SL_ERROR_FS_NOT_SUPPORTED SL_FS_ERR_NOT_SUPPORTED > +#define SL_ERROR_FS_WRONG_FILE_NAME SL_FS_WRONG_FILE_NAME > +#define SL_ERROR_FS_INVALID_HANDLE SL_FS_ERR_INVALID_HANDLE > +#define SL_NETCFG_MAC_ADDRESS_GET SL_MAC_ADDRESS_GET > +#define SL_SOCKET_FD_ZERO SL_FD_ZERO > +#define SL_SOCKET_FD_SET SL_FD_SET > +#define SL_SOCKET_FD_ISSET SL_FD_ISSET > +#define SL_SO_SECURE_DOMAIN_NAME_VERIFICATION SO_SECURE_DOMAIN_NAME_VERIFICATION > + > +#define SL_FS_READ FS_MODE_OPEN_READ > +#define SL_FS_WRITE FS_MODE_OPEN_WRITE > + > +#define SL_FI_FILE_SIZE(fi) ((fi).FileLen) > +#define SL_FI_FILE_MAX_SIZE(fi) ((fi).AllocatedLen) > + > +#define SlDeviceVersion_t SlVersionFull > +#define sl_DeviceGet sl_DevGet > +#define SL_DEVICE_GENERAL SL_DEVICE_GENERAL_CONFIGURATION > +#define SL_LEN_TYPE _u8 > +#define SL_OPT_TYPE _u8 > + > +#else /* SL_MAJOR_VERSION_NUM >= 2 */ > + > +#define FS_MODE_OPEN_CREATE(max_size, flag) \ > + (SL_FS_CREATE | SL_FS_CREATE_MAX_SIZE(max_size)) > +#define SL_FI_FILE_SIZE(fi) ((fi).Len) > +#define SL_FI_FILE_MAX_SIZE(fi) ((fi).MaxSize) > + > +#define SL_LEN_TYPE _u16 > +#define SL_OPT_TYPE _u16 > + > +#endif /* SL_MAJOR_VERSION_NUM < 2 */ > + > +int slfs_open(const unsigned char *fname, uint32_t flags); > + > +#endif /* MG_NET_IF == MG_NET_IF_SIMPLELINK */ > + > +#endif /* CS_COMMON_PLATFORMS_SIMPLELINK_CS_SIMPLELINK_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_wince.h" > +#endif > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_WINCE_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_WINCE_H_ > + > +#if CS_PLATFORM == CS_P_WINCE > + > +/* > + * MSVC++ 14.0 _MSC_VER == 1900 (Visual Studio 2015) > + * MSVC++ 12.0 _MSC_VER == 1800 (Visual Studio 2013) > + * MSVC++ 11.0 _MSC_VER == 1700 (Visual Studio 2012) > + * MSVC++ 10.0 _MSC_VER == 1600 (Visual Studio 2010) > + * MSVC++ 9.0 _MSC_VER == 1500 (Visual Studio 2008) > + * MSVC++ 8.0 _MSC_VER == 1400 (Visual Studio 2005) > + * MSVC++ 7.1 _MSC_VER == 1310 (Visual Studio 2003) > + * MSVC++ 7.0 _MSC_VER == 1300 > + * MSVC++ 6.0 _MSC_VER == 1200 > + * MSVC++ 5.0 _MSC_VER == 1100 > + */ > +#pragma warning(disable : 4127) /* FD_SET() emits warning, disable it */ > +#pragma warning(disable : 4204) /* missing c99 support */ > + > +#ifndef _WINSOCK_DEPRECATED_NO_WARNINGS > +#define _WINSOCK_DEPRECATED_NO_WARNINGS 1 > +#endif > + > +#ifndef _CRT_SECURE_NO_WARNINGS > +#define _CRT_SECURE_NO_WARNINGS > +#endif > + > +#include <assert.h> > +#include <limits.h> > +#include <stddef.h> > +#include <stdio.h> > +#include <stdlib.h> > +#include <time.h> > + > +#pragma comment(lib, "ws2.lib") /* Linking with WinCE winsock library */ > + > +#include <winsock2.h> > +#include <ws2tcpip.h> > +#include <windows.h> > + > +#define strdup _strdup > + > +#ifndef EINPROGRESS > +#define EINPROGRESS WSAEINPROGRESS > +#endif > + > +#ifndef EWOULDBLOCK > +#define EWOULDBLOCK WSAEWOULDBLOCK > +#endif > + > +#ifndef EAGAIN > +#define EAGAIN EWOULDBLOCK > +#endif > + > +#ifndef __func__ > +#define STRX(x) #x > +#define STR(x) STRX(x) > +#define __func__ __FILE__ ":" STR(__LINE__) > +#endif > + > +#define snprintf _snprintf > +#define fileno _fileno > +#define vsnprintf _vsnprintf > +#define sleep(x) Sleep((x) *1000) > +#define to64(x) _atoi64(x) > +#define rmdir _rmdir > + > +#if defined(_MSC_VER) && _MSC_VER >= 1400 > +#define fseeko(x, y, z) _fseeki64((x), (y), (z)) > +#else > +#define fseeko(x, y, z) fseek((x), (y), (z)) > +#endif > + > +typedef int socklen_t; > + > +#if _MSC_VER >= 1700 > +#include <stdint.h> > +#else > +typedef signed char int8_t; > +typedef unsigned char uint8_t; > +typedef int int32_t; > +typedef unsigned int uint32_t; > +typedef short int16_t; > +typedef unsigned short uint16_t; > +typedef __int64 int64_t; > +typedef unsigned __int64 uint64_t; > +#endif > + > +typedef SOCKET sock_t; > +typedef uint32_t in_addr_t; > + > +#ifndef UINT16_MAX > +#define UINT16_MAX 65535 > +#endif > + > +#ifndef UINT32_MAX > +#define UINT32_MAX 4294967295 > +#endif > + > +#ifndef pid_t > +#define pid_t HANDLE > +#endif > + > +#define INT64_FMT "I64d" > +#define INT64_X_FMT "I64x" > +/* TODO(alashkin): check if this is correct */ > +#define SIZE_T_FMT "u" > + > +#define DIRSEP '\\' > +#define CS_DEFINE_DIRENT > + > +#ifndef va_copy > +#ifdef __va_copy > +#define va_copy __va_copy > +#else > +#define va_copy(x, y) (x) = (y) > +#endif > +#endif > + > +#ifndef MG_MAX_HTTP_REQUEST_SIZE > +#define MG_MAX_HTTP_REQUEST_SIZE 8192 > +#endif > + > +#ifndef MG_MAX_HTTP_SEND_MBUF > +#define MG_MAX_HTTP_SEND_MBUF 4096 > +#endif > + > +#ifndef MG_MAX_HTTP_HEADERS > +#define MG_MAX_HTTP_HEADERS 40 > +#endif > + > +#ifndef CS_ENABLE_STDIO > +#define CS_ENABLE_STDIO 1 > +#endif > + > +#define abort() DebugBreak(); > + > +#ifndef BUFSIZ > +#define BUFSIZ 4096 > +#endif > +/* > + * Explicitly disabling MG_ENABLE_THREADS for WinCE > + * because they are enabled for _WIN32 by default > + */ > +#ifndef MG_ENABLE_THREADS > +#define MG_ENABLE_THREADS 0 > +#endif > + > +#ifndef MG_ENABLE_FILESYSTEM > +#define MG_ENABLE_FILESYSTEM 1 > +#endif > + > +#ifndef MG_NET_IF > +#define MG_NET_IF MG_NET_IF_SOCKET > +#endif > + > +typedef struct _stati64 { > + uint32_t st_mtime; > + uint32_t st_size; > + uint32_t st_mode; > +} cs_stat_t; > + > +/* > + * WinCE 6.0 has a lot of useful definitions in ATL (not windows.h) headers > + * use #ifdefs to avoid conflicts > + */ > + > +#ifndef ENOENT > +#define ENOENT ERROR_PATH_NOT_FOUND > +#endif > + > +#ifndef EACCES > +#define EACCES ERROR_ACCESS_DENIED > +#endif > + > +#ifndef ENOMEM > +#define ENOMEM ERROR_NOT_ENOUGH_MEMORY > +#endif > + > +#ifndef _UINTPTR_T_DEFINED > +typedef unsigned int *uintptr_t; > +#endif > + > +#define _S_IFREG 2 > +#define _S_IFDIR 4 > + > +#ifndef S_ISDIR > +#define S_ISDIR(x) (((x) &_S_IFDIR) != 0) > +#endif > + > +#ifndef S_ISREG > +#define S_ISREG(x) (((x) &_S_IFREG) != 0) > +#endif > + > +int open(const char *filename, int oflag, int pmode); > +int _wstati64(const wchar_t *path, cs_stat_t *st); > +const char *strerror(); > + > +#endif /* CS_PLATFORM == CS_P_WINCE */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_WINCE_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_nxp_lpc.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_NXP_LPC_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_NXP_LPC_H_ > + > +#if CS_PLATFORM == CS_P_NXP_LPC > + > +#include <ctype.h> > +#include <stdint.h> > +#include <string.h> > + > +#define SIZE_T_FMT "u" > +typedef struct stat cs_stat_t; > +#define INT64_FMT "lld" > +#define INT64_X_FMT "llx" > +#define __cdecl > + > +#define MG_LWIP 1 > + > +#define MG_NET_IF MG_NET_IF_LWIP_LOW_LEVEL > + > +/* > + * LPCXpress comes with 3 C library implementations: Newlib, NewlibNano and > + *Redlib. > + * See https://community.nxp.com/message/630860 for more details. > + * > + * Redlib is the default and lacks certain things, so we provide them. > + */ > +#ifdef __REDLIB_INTERFACE_VERSION__ > + > +/* Let LWIP define timeval for us. */ > +#define LWIP_TIMEVAL_PRIVATE 1 > + > +#define va_copy(d, s) __builtin_va_copy(d, s) > + > +#define CS_ENABLE_TO64 1 > +#define to64(x) cs_to64(x) > + > +#define CS_ENABLE_STRDUP 1 > + > +#else > + > +#include <sys/time.h> > +#define LWIP_TIMEVAL_PRIVATE 0 > +#define to64(x) strtoll(x, NULL, 10) > + > +#endif > + > +#endif /* CS_PLATFORM == CS_P_NXP_LPC */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_NXP_LPC_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_nxp_kinetis.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_NXP_KINETIS_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_NXP_KINETIS_H_ > + > +#if CS_PLATFORM == CS_P_NXP_KINETIS > + > +#include <ctype.h> > +#include <inttypes.h> > +#include <string.h> > +#include <sys/time.h> > + > +#define SIZE_T_FMT "u" > +typedef struct stat cs_stat_t; > +#define to64(x) strtoll(x, NULL, 10) > +#define INT64_FMT "lld" > +#define INT64_X_FMT "llx" > +#define __cdecl > + > +#define MG_LWIP 1 > + > +#define MG_NET_IF MG_NET_IF_LWIP_LOW_LEVEL > + > +/* struct timeval is defined in sys/time.h. */ > +#define LWIP_TIMEVAL_PRIVATE 0 > + > +#endif /* CS_PLATFORM == CS_P_NXP_KINETIS */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_NXP_KINETIS_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_pic32.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_PIC32_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_PIC32_H_ > + > +#if CS_PLATFORM == CS_P_PIC32 > + > +#define MG_NET_IF MG_NET_IF_PIC32 > + > +#include <stdint.h> > +#include <time.h> > +#include <ctype.h> > +#include <stdlib.h> > + > +#include <system_config.h> > +#include <system_definitions.h> > + > +#include <sys/types.h> > + > +typedef TCP_SOCKET sock_t; > +#define to64(x) strtoll(x, NULL, 10) > + > +#define SIZE_T_FMT "lu" > +#define INT64_FMT "lld" > + > +#ifndef CS_ENABLE_STDIO > +#define CS_ENABLE_STDIO 1 > +#endif > + > +char *inet_ntoa(struct in_addr in); > + > +#endif /* CS_PLATFORM == CS_P_PIC32 */ > + > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_PIC32_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/platform_stm32.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_PLATFORM_STM32_H_ > +#define CS_COMMON_PLATFORMS_PLATFORM_STM32_H_ > +#if CS_PLATFORM == CS_P_STM32 > + > +#include <sys/types.h> > +#include <sys/stat.h> > +#include <stdint.h> > +#include <inttypes.h> > +#include <stdio.h> > +#include <ctype.h> > +#include <errno.h> > +#include <memory.h> > +#include <fcntl.h> > +#include <stm32_sdk_hal.h> > + > +#define to64(x) strtoll(x, NULL, 10) > +#define INT64_FMT PRId64 > +#define SIZE_T_FMT "u" > +typedef struct stat cs_stat_t; > +#define DIRSEP '/' > + > +#ifndef CS_ENABLE_STDIO > +#define CS_ENABLE_STDIO 1 > +#endif > + > +#ifndef MG_ENABLE_FILESYSTEM > +#define MG_ENABLE_FILESYSTEM 1 > +#endif > + > +#define CS_DEFINE_DIRENT > + > +#endif /* CS_PLATFORM == CS_P_STM32 */ > +#endif /* CS_COMMON_PLATFORMS_PLATFORM_STM32_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/platforms/lwip/mg_lwip.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_PLATFORMS_LWIP_MG_LWIP_H_ > +#define CS_COMMON_PLATFORMS_LWIP_MG_LWIP_H_ > + > +#ifndef MG_LWIP > +#define MG_LWIP 0 > +#endif > + > +#if MG_LWIP > + > +/* > + * When compiling for nRF5x chips with arm-none-eabi-gcc, it has BYTE_ORDER > + * already defined, so in order to avoid warnings in lwip, we have to undefine > + * it. > + * > + * TODO: Check if in the future versions of nRF5 SDK that changes. > + * Current version of nRF51 SDK: 0.8.0 > + * nRF5 SDK: 0.9.0 > + */ > +#if CS_PLATFORM == CS_P_NRF51 || CS_PLATFORM == CS_P_NRF52 > +#undef BYTE_ORDER > +#endif > + > +#include <lwip/opt.h> > +#include <lwip/err.h> > +#include <lwip/ip_addr.h> > +#include <lwip/inet.h> > +#include <lwip/netdb.h> > +#include <lwip/dns.h> > + > +#ifndef LWIP_PROVIDE_ERRNO > +#include <errno.h> > +#endif > + > +#if LWIP_SOCKET > +#include <lwip/sockets.h> > +#else > +/* We really need the definitions from sockets.h. */ > +#undef LWIP_SOCKET > +#define LWIP_SOCKET 1 > +#include <lwip/sockets.h> > +#undef LWIP_SOCKET > +#define LWIP_SOCKET 0 > +#endif > + > +#define INVALID_SOCKET (-1) > +#define SOMAXCONN 10 > +typedef int sock_t; > + > +#if MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL > +struct mg_mgr; > +struct mg_connection; > +uint32_t mg_lwip_get_poll_delay_ms(struct mg_mgr *mgr); > +void mg_lwip_set_keepalive_params(struct mg_connection *nc, int idle, > + int interval, int count); > +#endif > + > +/* For older version of LWIP */ > +#ifndef ipX_2_ip > +#define ipX_2_ip(x) (x) > +#endif > + > +#endif /* MG_LWIP */ > + > +#endif /* CS_COMMON_PLATFORMS_LWIP_MG_LWIP_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/cs_md5.h" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_MD5_H_ > +#define CS_COMMON_MD5_H_ > + > +/* Amalgamated: #include "common/platform.h" */ > + > +#ifndef CS_DISABLE_MD5 > +#define CS_DISABLE_MD5 0 > +#endif > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +typedef struct { > + uint32_t buf[4]; > + uint32_t bits[2]; > + unsigned char in[64]; > +} cs_md5_ctx; > + > +void cs_md5_init(cs_md5_ctx *c); > +void cs_md5_update(cs_md5_ctx *c, const unsigned char *data, size_t len); > +void cs_md5_final(unsigned char *md, cs_md5_ctx *c); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* CS_COMMON_MD5_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/cs_sha1.h" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_SHA1_H_ > +#define CS_COMMON_SHA1_H_ > + > +#ifndef CS_DISABLE_SHA1 > +#define CS_DISABLE_SHA1 0 > +#endif > + > +#if !CS_DISABLE_SHA1 > + > +/* Amalgamated: #include "common/platform.h" */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +typedef struct { > + uint32_t state[5]; > + uint32_t count[2]; > + unsigned char buffer[64]; > +} cs_sha1_ctx; > + > +void cs_sha1_init(cs_sha1_ctx *); > +void cs_sha1_update(cs_sha1_ctx *, const unsigned char *data, uint32_t len); > +void cs_sha1_final(unsigned char digest[20], cs_sha1_ctx *); > +void cs_hmac_sha1(const unsigned char *key, size_t key_len, > + const unsigned char *text, size_t text_len, > + unsigned char out[20]); > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* CS_DISABLE_SHA1 */ > + > +#endif /* CS_COMMON_SHA1_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/cs_time.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_CS_TIME_H_ > +#define CS_COMMON_CS_TIME_H_ > + > +#include <time.h> > + > +/* Amalgamated: #include "common/platform.h" */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +/* Sub-second granularity time(). */ > +double cs_time(void); > + > +/* > + * Similar to (non-standard) timegm, converts broken-down time into the number > + * of seconds since Unix Epoch. > + */ > +double cs_timegm(const struct tm *tm); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* CS_COMMON_CS_TIME_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/mg_str.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_MG_STR_H_ > +#define CS_COMMON_MG_STR_H_ > + > +#include <stddef.h> > + > +/* Amalgamated: #include "common/platform.h" */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif > + > +/* Describes chunk of memory */ > +struct mg_str { > + const char *p; /* Memory chunk pointer */ > + size_t len; /* Memory chunk length */ > +}; > + > +/* > + * Helper functions for creating mg_str struct from plain C string. > + * `NULL` is allowed and becomes `{NULL, 0}`. > + */ > +struct mg_str mg_mk_str(const char *s); > +struct mg_str mg_mk_str_n(const char *s, size_t len); > + > +/* Macro for initializing mg_str. */ > +#define MG_MK_STR(str_literal) \ > + { str_literal, sizeof(str_literal) - 1 } > +#define MG_NULL_STR \ > + { NULL, 0 } > + > +/* > + * Cross-platform version of `strcmp()` where where first string is > + * specified by `struct mg_str`. > + */ > +int mg_vcmp(const struct mg_str *str2, const char *str1); > + > +/* > + * Cross-platform version of `strncasecmp()` where first string is > + * specified by `struct mg_str`. > + */ > +int mg_vcasecmp(const struct mg_str *str2, const char *str1); > + > +/* Creates a copy of s (heap-allocated). */ > +struct mg_str mg_strdup(const struct mg_str s); > + > +/* > + * Creates a copy of s (heap-allocated). > + * Resulting string is NUL-terminated (but NUL is not included in len). > + */ > +struct mg_str mg_strdup_nul(const struct mg_str s); > + > +/* > + * Locates character in a string. > + */ > +const char *mg_strchr(const struct mg_str s, int c); > + > +int mg_strcmp(const struct mg_str str1, const struct mg_str str2); > +int mg_strncmp(const struct mg_str str1, const struct mg_str str2, size_t n); > + > +const char *mg_strstr(const struct mg_str haystack, const struct mg_str needle); > + > +#ifdef __cplusplus > +} > +#endif > + > +#endif /* CS_COMMON_MG_STR_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/mbuf.h" > +#endif > +/* > + * Copyright (c) 2015 Cesanta Software Limited > + * All rights reserved > + */ > + > +/* > + * === Memory Buffers > + * > + * Mbufs are mutable/growing memory buffers, like C++ strings. > + * Mbuf can append data to the end of a buffer or insert data into arbitrary > + * position in the middle of a buffer. The buffer grows automatically when > + * needed. > + */ > + > +#ifndef CS_COMMON_MBUF_H_ > +#define CS_COMMON_MBUF_H_ > + > +#include <stdlib.h> > +/* Amalgamated: #include "common/platform.h" */ > + > +#if defined(__cplusplus) > +extern "C" { > +#endif > + > +#ifndef MBUF_SIZE_MULTIPLIER > +#define MBUF_SIZE_MULTIPLIER 1.5 > +#endif > + > +/* Memory buffer descriptor */ > +struct mbuf { > + char *buf; /* Buffer pointer */ > + size_t len; /* Data length. Data is located between offset 0 and len. */ > + size_t size; /* Buffer size allocated by realloc(1). Must be >= len */ > +}; > + > +/* > + * Initialises an Mbuf. > + * `initial_capacity` specifies the initial capacity of the mbuf. > + */ > +void mbuf_init(struct mbuf *, size_t initial_capacity); > + > +/* Frees the space allocated for the mbuffer and resets the mbuf structure. */ > +void mbuf_free(struct mbuf *); > + > +/* > + * Appends data to the Mbuf. > + * > + * Returns the number of bytes appended or 0 if out of memory. > + */ > +size_t mbuf_append(struct mbuf *, const void *data, size_t data_size); > + > +/* > + * Inserts data at a specified offset in the Mbuf. > + * > + * Existing data will be shifted forwards and the buffer will > + * be grown if necessary. > + * Returns the number of bytes inserted. > + */ > +size_t mbuf_insert(struct mbuf *, size_t, const void *, size_t); > + > +/* Removes `data_size` bytes from the beginning of the buffer. */ > +void mbuf_remove(struct mbuf *, size_t data_size); > + > +/* > + * Resizes an Mbuf. > + * > + * If `new_size` is smaller than buffer's `len`, the > + * resize is not performed. > + */ > +void mbuf_resize(struct mbuf *, size_t new_size); > + > +/* Shrinks an Mbuf by resizing its `size` to `len`. */ > +void mbuf_trim(struct mbuf *); > + > +#if defined(__cplusplus) > +} > +#endif /* __cplusplus */ > + > +#endif /* CS_COMMON_MBUF_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/base64.h" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_BASE64_H_ > +#define CS_COMMON_BASE64_H_ > + > +#ifndef DISABLE_BASE64 > +#define DISABLE_BASE64 0 > +#endif > + > +#if !DISABLE_BASE64 > + > +#include <stdio.h> > + > +#ifdef __cplusplus > +extern "C" { > +#endif > + > +typedef void (*cs_base64_putc_t)(char, void *); > + > +struct cs_base64_ctx { > + /* cannot call it putc because it's a macro on some environments */ > + cs_base64_putc_t b64_putc; > + unsigned char chunk[3]; > + int chunk_size; > + void *user_data; > +}; > + > +void cs_base64_init(struct cs_base64_ctx *ctx, cs_base64_putc_t putc, > + void *user_data); > +void cs_base64_update(struct cs_base64_ctx *ctx, const char *str, size_t len); > +void cs_base64_finish(struct cs_base64_ctx *ctx); > + > +void cs_base64_encode(const unsigned char *src, int src_len, char *dst); > +void cs_fprint_base64(FILE *f, const unsigned char *src, int src_len); > +int cs_base64_decode(const unsigned char *s, int len, char *dst, int *dec_len); > + > +#ifdef __cplusplus > +} > +#endif > + > +#endif /* DISABLE_BASE64 */ > + > +#endif /* CS_COMMON_BASE64_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/str_util.h" > +#endif > +/* > + * Copyright (c) 2015 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_COMMON_STR_UTIL_H_ > +#define CS_COMMON_STR_UTIL_H_ > + > +#include <stdarg.h> > +#include <stdlib.h> > + > +/* Amalgamated: #include "common/platform.h" */ > +/* Amalgamated: #include "common/mg_str.h" */ > + > +#ifndef CS_ENABLE_STRDUP > +#define CS_ENABLE_STRDUP 0 > +#endif > + > +#ifndef CS_ENABLE_TO64 > +#define CS_ENABLE_TO64 0 > +#endif > + > +/* > + * Expands to a string representation of its argument: e.g. > + * `CS_STRINGIFY_LIT(5) expands to "5"` > + */ > +#define CS_STRINGIFY_LIT(x) #x > + > +/* > + * Expands to a string representation of its argument, which is allowed > + * to be a macro: e.g. > + * > + * #define FOO 123 > + * CS_STRINGIFY_MACRO(FOO) > + * > + * expands to 123. > + */ > +#define CS_STRINGIFY_MACRO(x) CS_STRINGIFY_LIT(x) > + > +#ifdef __cplusplus > +extern "C" { > +#endif > + > +size_t c_strnlen(const char *s, size_t maxlen); > +int c_snprintf(char *buf, size_t buf_size, const char *format, ...); > +int c_vsnprintf(char *buf, size_t buf_size, const char *format, va_list ap); > +/* > + * Find the first occurrence of find in s, where the search is limited to the > + * first slen characters of s. > + */ > +const char *c_strnstr(const char *s, const char *find, size_t slen); > + > +/* > + * Stringify binary data. Output buffer size must be 2 * size_of_input + 1 > + * because each byte of input takes 2 bytes in string representation > + * plus 1 byte for the terminating \0 character. > + */ > +void cs_to_hex(char *to, const unsigned char *p, size_t len); > + > +/* > + * Convert stringified binary data back to binary. > + * Does the reverse of `cs_to_hex()`. > + */ > +void cs_from_hex(char *to, const char *p, size_t len); > + > +#if CS_ENABLE_STRDUP > +char *strdup(const char *src); > +#endif > + > +#if CS_ENABLE_TO64 > +#include <stdint.h> > +/* > + * Simple string -> int64 conversion routine. > + */ > +int64_t cs_to64(const char *s); > +#endif > + > +/* > + * Cross-platform version of `strncasecmp()`. > + */ > +int mg_ncasecmp(const char *s1, const char *s2, size_t len); > + > +/* > + * Cross-platform version of `strcasecmp()`. > + */ > +int mg_casecmp(const char *s1, const char *s2); > + > +/* > + * Prints message to the buffer. If the buffer is large enough to hold the > + * message, it returns buffer. If buffer is to small, it allocates a large > + * enough buffer on heap and returns allocated buffer. > + * This is a supposed use case: > + * > + * char buf[5], *p = buf; > + * mg_avprintf(&p, sizeof(buf), "%s", "hi there"); > + * use_p_somehow(p); > + * if (p != buf) { > + * free(p); > + * } > + * > + * The purpose of this is to avoid malloc-ing if generated strings are small. > + */ > +int mg_asprintf(char **buf, size_t size, const char *fmt, ...); > + > +/* Same as mg_asprintf, but takes varargs list. */ > +int mg_avprintf(char **buf, size_t size, const char *fmt, va_list ap); > + > +/* > + * A helper function for traversing a comma separated list of values. > + * It returns a list pointer shifted to the next value or NULL if the end > + * of the list found. > + * The value is stored in a val vector. If the value has a form "x=y", then > + * eq_val vector is initialised to point to the "y" part, and val vector length > + * is adjusted to point only to "x". > + * If the list is just a comma separated list of entries, like "aa,bb,cc" then > + * `eq_val` will contain zero-length string. > + * > + * The purpose of this function is to parse comma separated string without > + * any copying/memory allocation. > + */ > +const char *mg_next_comma_list_entry(const char *list, struct mg_str *val, > + struct mg_str *eq_val); > +struct mg_str mg_next_comma_list_entry_n(struct mg_str list, struct mg_str *val, > + struct mg_str *eq_val); > + > +/* > + * Matches 0-terminated string (mg_match_prefix) or string with given length > + * mg_match_prefix_n against a glob pattern. > + * > + * Match is case-insensitive. Returns number of bytes matched, or -1 if no > + * match. > + */ > +int mg_match_prefix(const char *pattern, int pattern_len, const char *str); > +int mg_match_prefix_n(const struct mg_str pattern, const struct mg_str str); > + > +#ifdef __cplusplus > +} > +#endif > + > +#endif /* CS_COMMON_STR_UTIL_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "common/queue.h" > +#endif > +/* clang-format off */ > +/*- > + * Copyright (c) 1991, 1993 > + * The Regents of the University of California. All rights reserved. > + * > + * Redistribution and use in source and binary forms, with or without > + * modification, are permitted provided that the following conditions > + * are met: > + * 1. Redistributions of source code must retain the above copyright > + * notice, this list of conditions and the following disclaimer. > + * 2. Redistributions in binary form must reproduce the above copyright > + * notice, this list of conditions and the following disclaimer in the > + * documentation and/or other materials provided with the distribution. > + * 4. Neither the name of the University nor the names of its contributors > + * may be used to endorse or promote products derived from this software > + * without specific prior written permission. > + * > + * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND > + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE > + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE > + * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE > + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL > + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS > + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) > + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT > + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY > + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF > + * SUCH DAMAGE. > + * > + * @(#)queue.h 8.5 (Berkeley) 8/20/94 > + * $FreeBSD$ > + */ > + > +#ifndef _SYS_QUEUE_H_ > +#define _SYS_QUEUE_H_ > + > +/* > + * This file defines four types of data structures: singly-linked lists, > + * singly-linked tail queues, lists and tail queues. > + * > + * A singly-linked list is headed by a single forward pointer. The elements > + * are singly linked for minimum space and pointer manipulation overhead at > + * the expense of O(n) removal for arbitrary elements. New elements can be > + * added to the list after an existing element or at the head of the list. > + * Elements being removed from the head of the list should use the explicit > + * macro for this purpose for optimum efficiency. A singly-linked list may > + * only be traversed in the forward direction. Singly-linked lists are ideal > + * for applications with large datasets and few or no removals or for > + * implementing a LIFO queue. > + * > + * A singly-linked tail queue is headed by a pair of pointers, one to the > + * head of the list and the other to the tail of the list. The elements are > + * singly linked for minimum space and pointer manipulation overhead at the > + * expense of O(n) removal for arbitrary elements. New elements can be added > + * to the list after an existing element, at the head of the list, or at the > + * end of the list. Elements being removed from the head of the tail queue > + * should use the explicit macro for this purpose for optimum efficiency. > + * A singly-linked tail queue may only be traversed in the forward direction. > + * Singly-linked tail queues are ideal for applications with large datasets > + * and few or no removals or for implementing a FIFO queue. > + * > + * A list is headed by a single forward pointer (or an array of forward > + * pointers for a hash table header). The elements are doubly linked > + * so that an arbitrary element can be removed without a need to > + * traverse the list. New elements can be added to the list before > + * or after an existing element or at the head of the list. A list > + * may be traversed in either direction. > + * > + * A tail queue is headed by a pair of pointers, one to the head of the > + * list and the other to the tail of the list. The elements are doubly > + * linked so that an arbitrary element can be removed without a need to > + * traverse the list. New elements can be added to the list before or > + * after an existing element, at the head of the list, or at the end of > + * the list. A tail queue may be traversed in either direction. > + * > + * For details on the use of these macros, see the queue(3) manual page. > + * > + * > + * SLIST LIST STAILQ TAILQ > + * _HEAD + + + + > + * _CLASS_HEAD + + + + > + * _HEAD_INITIALIZER + + + + > + * _ENTRY + + + + > + * _CLASS_ENTRY + + + + > + * _INIT + + + + > + * _EMPTY + + + + > + * _FIRST + + + + > + * _NEXT + + + + > + * _PREV - + - + > + * _LAST - - + + > + * _FOREACH + + + + > + * _FOREACH_FROM + + + + > + * _FOREACH_SAFE + + + + > + * _FOREACH_FROM_SAFE + + + + > + * _FOREACH_REVERSE - - - + > + * _FOREACH_REVERSE_FROM - - - + > + * _FOREACH_REVERSE_SAFE - - - + > + * _FOREACH_REVERSE_FROM_SAFE - - - + > + * _INSERT_HEAD + + + + > + * _INSERT_BEFORE - + - + > + * _INSERT_AFTER + + + + > + * _INSERT_TAIL - - + + > + * _CONCAT - - + + > + * _REMOVE_AFTER + - + - > + * _REMOVE_HEAD + - + - > + * _REMOVE + + + + > + * _SWAP + + + + > + * > + */ > +#ifdef QUEUE_MACRO_DEBUG > +/* Store the last 2 places the queue element or head was altered */ > +struct qm_trace { > + unsigned long lastline; > + unsigned long prevline; > + const char *lastfile; > + const char *prevfile; > +}; > + > +#define TRACEBUF struct qm_trace trace; > +#define TRACEBUF_INITIALIZER { __LINE__, 0, __FILE__, NULL } , > +#define TRASHIT(x) do {(x) = (void *)-1;} while (0) > +#define QMD_SAVELINK(name, link) void **name = (void *)&(link) > + > +#define QMD_TRACE_HEAD(head) do { \ > + (head)->trace.prevline = (head)->trace.lastline; \ > + (head)->trace.prevfile = (head)->trace.lastfile; \ > + (head)->trace.lastline = __LINE__; \ > + (head)->trace.lastfile = __FILE__; \ > +} while (0) > + > +#define QMD_TRACE_ELEM(elem) do { \ > + (elem)->trace.prevline = (elem)->trace.lastline; \ > + (elem)->trace.prevfile = (elem)->trace.lastfile; \ > + (elem)->trace.lastline = __LINE__; \ > + (elem)->trace.lastfile = __FILE__; \ > +} while (0) > + > +#else > +#define QMD_TRACE_ELEM(elem) > +#define QMD_TRACE_HEAD(head) > +#define QMD_SAVELINK(name, link) > +#define TRACEBUF > +#define TRACEBUF_INITIALIZER > +#define TRASHIT(x) > +#endif /* QUEUE_MACRO_DEBUG */ > + > +#ifdef __cplusplus > +/* > + * In C++ there can be structure lists and class lists: > + */ > +#define QUEUE_TYPEOF(type) type > +#else > +#define QUEUE_TYPEOF(type) struct type > +#endif > + > +/* > + * Singly-linked List declarations. > + */ > +#define SLIST_HEAD(name, type) \ > +struct name { \ > + struct type *slh_first; /* first element */ \ > +} > + > +#define SLIST_CLASS_HEAD(name, type) \ > +struct name { \ > + class type *slh_first; /* first element */ \ > +} > + > +#define SLIST_HEAD_INITIALIZER(head) \ > + { NULL } > + > +#define SLIST_ENTRY(type) \ > +struct { \ > + struct type *sle_next; /* next element */ \ > +} > + > +#define SLIST_CLASS_ENTRY(type) \ > +struct { \ > + class type *sle_next; /* next element */ \ > +} > + > +/* > + * Singly-linked List functions. > + */ > +#define SLIST_EMPTY(head) ((head)->slh_first == NULL) > + > +#define SLIST_FIRST(head) ((head)->slh_first) > + > +#define SLIST_FOREACH(var, head, field) \ > + for ((var) = SLIST_FIRST((head)); \ > + (var); \ > + (var) = SLIST_NEXT((var), field)) > + > +#define SLIST_FOREACH_FROM(var, head, field) \ > + for ((var) = ((var) ? (var) : SLIST_FIRST((head))); \ > + (var); \ > + (var) = SLIST_NEXT((var), field)) > + > +#define SLIST_FOREACH_SAFE(var, head, field, tvar) \ > + for ((var) = SLIST_FIRST((head)); \ > + (var) && ((tvar) = SLIST_NEXT((var), field), 1); \ > + (var) = (tvar)) > + > +#define SLIST_FOREACH_FROM_SAFE(var, head, field, tvar) \ > + for ((var) = ((var) ? (var) : SLIST_FIRST((head))); \ > + (var) && ((tvar) = SLIST_NEXT((var), field), 1); \ > + (var) = (tvar)) > + > +#define SLIST_FOREACH_PREVPTR(var, varp, head, field) \ > + for ((varp) = &SLIST_FIRST((head)); \ > + ((var) = *(varp)) != NULL; \ > + (varp) = &SLIST_NEXT((var), field)) > + > +#define SLIST_INIT(head) do { \ > + SLIST_FIRST((head)) = NULL; \ > +} while (0) > + > +#define SLIST_INSERT_AFTER(slistelm, elm, field) do { \ > + SLIST_NEXT((elm), field) = SLIST_NEXT((slistelm), field); \ > + SLIST_NEXT((slistelm), field) = (elm); \ > +} while (0) > + > +#define SLIST_INSERT_HEAD(head, elm, field) do { \ > + SLIST_NEXT((elm), field) = SLIST_FIRST((head)); \ > + SLIST_FIRST((head)) = (elm); \ > +} while (0) > + > +#define SLIST_NEXT(elm, field) ((elm)->field.sle_next) > + > +#define SLIST_REMOVE(head, elm, type, field) do { \ > + QMD_SAVELINK(oldnext, (elm)->field.sle_next); \ > + if (SLIST_FIRST((head)) == (elm)) { \ > + SLIST_REMOVE_HEAD((head), field); \ > + } \ > + else { \ > + QUEUE_TYPEOF(type) *curelm = SLIST_FIRST(head); \ > + while (SLIST_NEXT(curelm, field) != (elm)) \ > + curelm = SLIST_NEXT(curelm, field); \ > + SLIST_REMOVE_AFTER(curelm, field); \ > + } \ > + TRASHIT(*oldnext); \ > +} while (0) > + > +#define SLIST_REMOVE_AFTER(elm, field) do { \ > + SLIST_NEXT(elm, field) = \ > + SLIST_NEXT(SLIST_NEXT(elm, field), field); \ > +} while (0) > + > +#define SLIST_REMOVE_HEAD(head, field) do { \ > + SLIST_FIRST((head)) = SLIST_NEXT(SLIST_FIRST((head)), field); \ > +} while (0) > + > +#define SLIST_SWAP(head1, head2, type) do { \ > + QUEUE_TYPEOF(type) *swap_first = SLIST_FIRST(head1); \ > + SLIST_FIRST(head1) = SLIST_FIRST(head2); \ > + SLIST_FIRST(head2) = swap_first; \ > +} while (0) > + > +/* > + * Singly-linked Tail queue declarations. > + */ > +#define STAILQ_HEAD(name, type) \ > +struct name { \ > + struct type *stqh_first;/* first element */ \ > + struct type **stqh_last;/* addr of last next element */ \ > +} > + > +#define STAILQ_CLASS_HEAD(name, type) \ > +struct name { \ > + class type *stqh_first; /* first element */ \ > + class type **stqh_last; /* addr of last next element */ \ > +} > + > +#define STAILQ_HEAD_INITIALIZER(head) \ > + { NULL, &(head).stqh_first } > + > +#define STAILQ_ENTRY(type) \ > +struct { \ > + struct type *stqe_next; /* next element */ \ > +} > + > +#define STAILQ_CLASS_ENTRY(type) \ > +struct { \ > + class type *stqe_next; /* next element */ \ > +} > + > +/* > + * Singly-linked Tail queue functions. > + */ > +#define STAILQ_CONCAT(head1, head2) do { \ > + if (!STAILQ_EMPTY((head2))) { \ > + *(head1)->stqh_last = (head2)->stqh_first; \ > + (head1)->stqh_last = (head2)->stqh_last; \ > + STAILQ_INIT((head2)); \ > + } \ > +} while (0) > + > +#define STAILQ_EMPTY(head) ((head)->stqh_first == NULL) > + > +#define STAILQ_FIRST(head) ((head)->stqh_first) > + > +#define STAILQ_FOREACH(var, head, field) \ > + for((var) = STAILQ_FIRST((head)); \ > + (var); \ > + (var) = STAILQ_NEXT((var), field)) > + > +#define STAILQ_FOREACH_FROM(var, head, field) \ > + for ((var) = ((var) ? (var) : STAILQ_FIRST((head))); \ > + (var); \ > + (var) = STAILQ_NEXT((var), field)) > + > +#define STAILQ_FOREACH_SAFE(var, head, field, tvar) \ > + for ((var) = STAILQ_FIRST((head)); \ > + (var) && ((tvar) = STAILQ_NEXT((var), field), 1); \ > + (var) = (tvar)) > + > +#define STAILQ_FOREACH_FROM_SAFE(var, head, field, tvar) \ > + for ((var) = ((var) ? (var) : STAILQ_FIRST((head))); \ > + (var) && ((tvar) = STAILQ_NEXT((var), field), 1); \ > + (var) = (tvar)) > + > +#define STAILQ_INIT(head) do { \ > + STAILQ_FIRST((head)) = NULL; \ > + (head)->stqh_last = &STAILQ_FIRST((head)); \ > +} while (0) > + > +#define STAILQ_INSERT_AFTER(head, tqelm, elm, field) do { \ > + if ((STAILQ_NEXT((elm), field) = STAILQ_NEXT((tqelm), field)) == NULL)\ > + (head)->stqh_last = &STAILQ_NEXT((elm), field); \ > + STAILQ_NEXT((tqelm), field) = (elm); \ > +} while (0) > + > +#define STAILQ_INSERT_HEAD(head, elm, field) do { \ > + if ((STAILQ_NEXT((elm), field) = STAILQ_FIRST((head))) == NULL) \ > + (head)->stqh_last = &STAILQ_NEXT((elm), field); \ > + STAILQ_FIRST((head)) = (elm); \ > +} while (0) > + > +#define STAILQ_INSERT_TAIL(head, elm, field) do { \ > + STAILQ_NEXT((elm), field) = NULL; \ > + *(head)->stqh_last = (elm); \ > + (head)->stqh_last = &STAILQ_NEXT((elm), field); \ > +} while (0) > + > +#define STAILQ_LAST(head, type, field) \ > + (STAILQ_EMPTY((head)) ? NULL : \ > + __containerof((head)->stqh_last, \ > + QUEUE_TYPEOF(type), field.stqe_next)) > + > +#define STAILQ_NEXT(elm, field) ((elm)->field.stqe_next) > + > +#define STAILQ_REMOVE(head, elm, type, field) do { \ > + QMD_SAVELINK(oldnext, (elm)->field.stqe_next); \ > + if (STAILQ_FIRST((head)) == (elm)) { \ > + STAILQ_REMOVE_HEAD((head), field); \ > + } \ > + else { \ > + QUEUE_TYPEOF(type) *curelm = STAILQ_FIRST(head); \ > + while (STAILQ_NEXT(curelm, field) != (elm)) \ > + curelm = STAILQ_NEXT(curelm, field); \ > + STAILQ_REMOVE_AFTER(head, curelm, field); \ > + } \ > + TRASHIT(*oldnext); \ > +} while (0) > + > +#define STAILQ_REMOVE_AFTER(head, elm, field) do { \ > + if ((STAILQ_NEXT(elm, field) = \ > + STAILQ_NEXT(STAILQ_NEXT(elm, field), field)) == NULL) \ > + (head)->stqh_last = &STAILQ_NEXT((elm), field); \ > +} while (0) > + > +#define STAILQ_REMOVE_HEAD(head, field) do { \ > + if ((STAILQ_FIRST((head)) = \ > + STAILQ_NEXT(STAILQ_FIRST((head)), field)) == NULL) \ > + (head)->stqh_last = &STAILQ_FIRST((head)); \ > +} while (0) > + > +#define STAILQ_SWAP(head1, head2, type) do { \ > + QUEUE_TYPEOF(type) *swap_first = STAILQ_FIRST(head1); \ > + QUEUE_TYPEOF(type) **swap_last = (head1)->stqh_last; \ > + STAILQ_FIRST(head1) = STAILQ_FIRST(head2); \ > + (head1)->stqh_last = (head2)->stqh_last; \ > + STAILQ_FIRST(head2) = swap_first; \ > + (head2)->stqh_last = swap_last; \ > + if (STAILQ_EMPTY(head1)) \ > + (head1)->stqh_last = &STAILQ_FIRST(head1); \ > + if (STAILQ_EMPTY(head2)) \ > + (head2)->stqh_last = &STAILQ_FIRST(head2); \ > +} while (0) > + > + > +/* > + * List declarations. > + */ > +#define LIST_HEAD(name, type) \ > +struct name { \ > + struct type *lh_first; /* first element */ \ > +} > + > +#define LIST_CLASS_HEAD(name, type) \ > +struct name { \ > + class type *lh_first; /* first element */ \ > +} > + > +#define LIST_HEAD_INITIALIZER(head) \ > + { NULL } > + > +#define LIST_ENTRY(type) \ > +struct { \ > + struct type *le_next; /* next element */ \ > + struct type **le_prev; /* address of previous next element */ \ > +} > + > +#define LIST_CLASS_ENTRY(type) \ > +struct { \ > + class type *le_next; /* next element */ \ > + class type **le_prev; /* address of previous next element */ \ > +} > + > +/* > + * List functions. > + */ > + > +#if (defined(_KERNEL) && defined(INVARIANTS)) > +#define QMD_LIST_CHECK_HEAD(head, field) do { \ > + if (LIST_FIRST((head)) != NULL && \ > + LIST_FIRST((head))->field.le_prev != \ > + &LIST_FIRST((head))) \ > + panic("Bad list head %p first->prev != head", (head)); \ > +} while (0) > + > +#define QMD_LIST_CHECK_NEXT(elm, field) do { \ > + if (LIST_NEXT((elm), field) != NULL && \ > + LIST_NEXT((elm), field)->field.le_prev != \ > + &((elm)->field.le_next)) \ > + panic("Bad link elm %p next->prev != elm", (elm)); \ > +} while (0) > + > +#define QMD_LIST_CHECK_PREV(elm, field) do { \ > + if (*(elm)->field.le_prev != (elm)) \ > + panic("Bad link elm %p prev->next != elm", (elm)); \ > +} while (0) > +#else > +#define QMD_LIST_CHECK_HEAD(head, field) > +#define QMD_LIST_CHECK_NEXT(elm, field) > +#define QMD_LIST_CHECK_PREV(elm, field) > +#endif /* (_KERNEL && INVARIANTS) */ > + > +#define LIST_EMPTY(head) ((head)->lh_first == NULL) > + > +#define LIST_FIRST(head) ((head)->lh_first) > + > +#define LIST_FOREACH(var, head, field) \ > + for ((var) = LIST_FIRST((head)); \ > + (var); \ > + (var) = LIST_NEXT((var), field)) > + > +#define LIST_FOREACH_FROM(var, head, field) \ > + for ((var) = ((var) ? (var) : LIST_FIRST((head))); \ > + (var); \ > + (var) = LIST_NEXT((var), field)) > + > +#define LIST_FOREACH_SAFE(var, head, field, tvar) \ > + for ((var) = LIST_FIRST((head)); \ > + (var) && ((tvar) = LIST_NEXT((var), field), 1); \ > + (var) = (tvar)) > + > +#define LIST_FOREACH_FROM_SAFE(var, head, field, tvar) \ > + for ((var) = ((var) ? (var) : LIST_FIRST((head))); \ > + (var) && ((tvar) = LIST_NEXT((var), field), 1); \ > + (var) = (tvar)) > + > +#define LIST_INIT(head) do { \ > + LIST_FIRST((head)) = NULL; \ > +} while (0) > + > +#define LIST_INSERT_AFTER(listelm, elm, field) do { \ > + QMD_LIST_CHECK_NEXT(listelm, field); \ > + if ((LIST_NEXT((elm), field) = LIST_NEXT((listelm), field)) != NULL)\ > + LIST_NEXT((listelm), field)->field.le_prev = \ > + &LIST_NEXT((elm), field); \ > + LIST_NEXT((listelm), field) = (elm); \ > + (elm)->field.le_prev = &LIST_NEXT((listelm), field); \ > +} while (0) > + > +#define LIST_INSERT_BEFORE(listelm, elm, field) do { \ > + QMD_LIST_CHECK_PREV(listelm, field); \ > + (elm)->field.le_prev = (listelm)->field.le_prev; \ > + LIST_NEXT((elm), field) = (listelm); \ > + *(listelm)->field.le_prev = (elm); \ > + (listelm)->field.le_prev = &LIST_NEXT((elm), field); \ > +} while (0) > + > +#define LIST_INSERT_HEAD(head, elm, field) do { \ > + QMD_LIST_CHECK_HEAD((head), field); \ > + if ((LIST_NEXT((elm), field) = LIST_FIRST((head))) != NULL) \ > + LIST_FIRST((head))->field.le_prev = &LIST_NEXT((elm), field);\ > + LIST_FIRST((head)) = (elm); \ > + (elm)->field.le_prev = &LIST_FIRST((head)); \ > +} while (0) > + > +#define LIST_NEXT(elm, field) ((elm)->field.le_next) > + > +#define LIST_PREV(elm, head, type, field) \ > + ((elm)->field.le_prev == &LIST_FIRST((head)) ? NULL : \ > + __containerof((elm)->field.le_prev, \ > + QUEUE_TYPEOF(type), field.le_next)) > + > +#define LIST_REMOVE(elm, field) do { \ > + QMD_SAVELINK(oldnext, (elm)->field.le_next); \ > + QMD_SAVELINK(oldprev, (elm)->field.le_prev); \ > + QMD_LIST_CHECK_NEXT(elm, field); \ > + QMD_LIST_CHECK_PREV(elm, field); \ > + if (LIST_NEXT((elm), field) != NULL) \ > + LIST_NEXT((elm), field)->field.le_prev = \ > + (elm)->field.le_prev; \ > + *(elm)->field.le_prev = LIST_NEXT((elm), field); \ > + TRASHIT(*oldnext); \ > + TRASHIT(*oldprev); \ > +} while (0) > + > +#define LIST_SWAP(head1, head2, type, field) do { \ > + QUEUE_TYPEOF(type) *swap_tmp = LIST_FIRST(head1); \ > + LIST_FIRST((head1)) = LIST_FIRST((head2)); \ > + LIST_FIRST((head2)) = swap_tmp; \ > + if ((swap_tmp = LIST_FIRST((head1))) != NULL) \ > + swap_tmp->field.le_prev = &LIST_FIRST((head1)); \ > + if ((swap_tmp = LIST_FIRST((head2))) != NULL) \ > + swap_tmp->field.le_prev = &LIST_FIRST((head2)); \ > +} while (0) > + > +/* > + * Tail queue declarations. > + */ > +#define TAILQ_HEAD(name, type) \ > +struct name { \ > + struct type *tqh_first; /* first element */ \ > + struct type **tqh_last; /* addr of last next element */ \ > + TRACEBUF \ > +} > + > +#define TAILQ_CLASS_HEAD(name, type) \ > +struct name { \ > + class type *tqh_first; /* first element */ \ > + class type **tqh_last; /* addr of last next element */ \ > + TRACEBUF \ > +} > + > +#define TAILQ_HEAD_INITIALIZER(head) \ > + { NULL, &(head).tqh_first, TRACEBUF_INITIALIZER } > + > +#define TAILQ_ENTRY(type) \ > +struct { \ > + struct type *tqe_next; /* next element */ \ > + struct type **tqe_prev; /* address of previous next element */ \ > + TRACEBUF \ > +} > + > +#define TAILQ_CLASS_ENTRY(type) \ > +struct { \ > + class type *tqe_next; /* next element */ \ > + class type **tqe_prev; /* address of previous next element */ \ > + TRACEBUF \ > +} > + > +/* > + * Tail queue functions. > + */ > +#if (defined(_KERNEL) && defined(INVARIANTS)) > +#define QMD_TAILQ_CHECK_HEAD(head, field) do { \ > + if (!TAILQ_EMPTY(head) && \ > + TAILQ_FIRST((head))->field.tqe_prev != \ > + &TAILQ_FIRST((head))) \ > + panic("Bad tailq head %p first->prev != head", (head)); \ > +} while (0) > + > +#define QMD_TAILQ_CHECK_TAIL(head, field) do { \ > + if (*(head)->tqh_last != NULL) \ > + panic("Bad tailq NEXT(%p->tqh_last) != NULL", (head)); \ > +} while (0) > + > +#define QMD_TAILQ_CHECK_NEXT(elm, field) do { \ > + if (TAILQ_NEXT((elm), field) != NULL && \ > + TAILQ_NEXT((elm), field)->field.tqe_prev != \ > + &((elm)->field.tqe_next)) \ > + panic("Bad link elm %p next->prev != elm", (elm)); \ > +} while (0) > + > +#define QMD_TAILQ_CHECK_PREV(elm, field) do { \ > + if (*(elm)->field.tqe_prev != (elm)) \ > + panic("Bad link elm %p prev->next != elm", (elm)); \ > +} while (0) > +#else > +#define QMD_TAILQ_CHECK_HEAD(head, field) > +#define QMD_TAILQ_CHECK_TAIL(head, headname) > +#define QMD_TAILQ_CHECK_NEXT(elm, field) > +#define QMD_TAILQ_CHECK_PREV(elm, field) > +#endif /* (_KERNEL && INVARIANTS) */ > + > +#define TAILQ_CONCAT(head1, head2, field) do { \ > + if (!TAILQ_EMPTY(head2)) { \ > + *(head1)->tqh_last = (head2)->tqh_first; \ > + (head2)->tqh_first->field.tqe_prev = (head1)->tqh_last; \ > + (head1)->tqh_last = (head2)->tqh_last; \ > + TAILQ_INIT((head2)); \ > + QMD_TRACE_HEAD(head1); \ > + QMD_TRACE_HEAD(head2); \ > + } \ > +} while (0) > + > +#define TAILQ_EMPTY(head) ((head)->tqh_first == NULL) > + > +#define TAILQ_FIRST(head) ((head)->tqh_first) > + > +#define TAILQ_FOREACH(var, head, field) \ > + for ((var) = TAILQ_FIRST((head)); \ > + (var); \ > + (var) = TAILQ_NEXT((var), field)) > + > +#define TAILQ_FOREACH_FROM(var, head, field) \ > + for ((var) = ((var) ? (var) : TAILQ_FIRST((head))); \ > + (var); \ > + (var) = TAILQ_NEXT((var), field)) > + > +#define TAILQ_FOREACH_SAFE(var, head, field, tvar) \ > + for ((var) = TAILQ_FIRST((head)); \ > + (var) && ((tvar) = TAILQ_NEXT((var), field), 1); \ > + (var) = (tvar)) > + > +#define TAILQ_FOREACH_FROM_SAFE(var, head, field, tvar) \ > + for ((var) = ((var) ? (var) : TAILQ_FIRST((head))); \ > + (var) && ((tvar) = TAILQ_NEXT((var), field), 1); \ > + (var) = (tvar)) > + > +#define TAILQ_FOREACH_REVERSE(var, head, headname, field) \ > + for ((var) = TAILQ_LAST((head), headname); \ > + (var); \ > + (var) = TAILQ_PREV((var), headname, field)) > + > +#define TAILQ_FOREACH_REVERSE_FROM(var, head, headname, field) \ > + for ((var) = ((var) ? (var) : TAILQ_LAST((head), headname)); \ > + (var); \ > + (var) = TAILQ_PREV((var), headname, field)) > + > +#define TAILQ_FOREACH_REVERSE_SAFE(var, head, headname, field, tvar) \ > + for ((var) = TAILQ_LAST((head), headname); \ > + (var) && ((tvar) = TAILQ_PREV((var), headname, field), 1); \ > + (var) = (tvar)) > + > +#define TAILQ_FOREACH_REVERSE_FROM_SAFE(var, head, headname, field, tvar) \ > + for ((var) = ((var) ? (var) : TAILQ_LAST((head), headname)); \ > + (var) && ((tvar) = TAILQ_PREV((var), headname, field), 1); \ > + (var) = (tvar)) > + > +#define TAILQ_INIT(head) do { \ > + TAILQ_FIRST((head)) = NULL; \ > + (head)->tqh_last = &TAILQ_FIRST((head)); \ > + QMD_TRACE_HEAD(head); \ > +} while (0) > + > +#define TAILQ_INSERT_AFTER(head, listelm, elm, field) do { \ > + QMD_TAILQ_CHECK_NEXT(listelm, field); \ > + if ((TAILQ_NEXT((elm), field) = TAILQ_NEXT((listelm), field)) != NULL)\ > + TAILQ_NEXT((elm), field)->field.tqe_prev = \ > + &TAILQ_NEXT((elm), field); \ > + else { \ > + (head)->tqh_last = &TAILQ_NEXT((elm), field); \ > + QMD_TRACE_HEAD(head); \ > + } \ > + TAILQ_NEXT((listelm), field) = (elm); \ > + (elm)->field.tqe_prev = &TAILQ_NEXT((listelm), field); \ > + QMD_TRACE_ELEM(&(elm)->field); \ > + QMD_TRACE_ELEM(&(listelm)->field); \ > +} while (0) > + > +#define TAILQ_INSERT_BEFORE(listelm, elm, field) do { \ > + QMD_TAILQ_CHECK_PREV(listelm, field); \ > + (elm)->field.tqe_prev = (listelm)->field.tqe_prev; \ > + TAILQ_NEXT((elm), field) = (listelm); \ > + *(listelm)->field.tqe_prev = (elm); \ > + (listelm)->field.tqe_prev = &TAILQ_NEXT((elm), field); \ > + QMD_TRACE_ELEM(&(elm)->field); \ > + QMD_TRACE_ELEM(&(listelm)->field); \ > +} while (0) > + > +#define TAILQ_INSERT_HEAD(head, elm, field) do { \ > + QMD_TAILQ_CHECK_HEAD(head, field); \ > + if ((TAILQ_NEXT((elm), field) = TAILQ_FIRST((head))) != NULL) \ > + TAILQ_FIRST((head))->field.tqe_prev = \ > + &TAILQ_NEXT((elm), field); \ > + else \ > + (head)->tqh_last = &TAILQ_NEXT((elm), field); \ > + TAILQ_FIRST((head)) = (elm); \ > + (elm)->field.tqe_prev = &TAILQ_FIRST((head)); \ > + QMD_TRACE_HEAD(head); \ > + QMD_TRACE_ELEM(&(elm)->field); \ > +} while (0) > + > +#define TAILQ_INSERT_TAIL(head, elm, field) do { \ > + QMD_TAILQ_CHECK_TAIL(head, field); \ > + TAILQ_NEXT((elm), field) = NULL; \ > + (elm)->field.tqe_prev = (head)->tqh_last; \ > + *(head)->tqh_last = (elm); \ > + (head)->tqh_last = &TAILQ_NEXT((elm), field); \ > + QMD_TRACE_HEAD(head); \ > + QMD_TRACE_ELEM(&(elm)->field); \ > +} while (0) > + > +#define TAILQ_LAST(head, headname) \ > + (*(((struct headname *)((head)->tqh_last))->tqh_last)) > + > +#define TAILQ_NEXT(elm, field) ((elm)->field.tqe_next) > + > +#define TAILQ_PREV(elm, headname, field) \ > + (*(((struct headname *)((elm)->field.tqe_prev))->tqh_last)) > + > +#define TAILQ_REMOVE(head, elm, field) do { \ > + QMD_SAVELINK(oldnext, (elm)->field.tqe_next); \ > + QMD_SAVELINK(oldprev, (elm)->field.tqe_prev); \ > + QMD_TAILQ_CHECK_NEXT(elm, field); \ > + QMD_TAILQ_CHECK_PREV(elm, field); \ > + if ((TAILQ_NEXT((elm), field)) != NULL) \ > + TAILQ_NEXT((elm), field)->field.tqe_prev = \ > + (elm)->field.tqe_prev; \ > + else { \ > + (head)->tqh_last = (elm)->field.tqe_prev; \ > + QMD_TRACE_HEAD(head); \ > + } \ > + *(elm)->field.tqe_prev = TAILQ_NEXT((elm), field); \ > + TRASHIT(*oldnext); \ > + TRASHIT(*oldprev); \ > + QMD_TRACE_ELEM(&(elm)->field); \ > +} while (0) > + > +#define TAILQ_SWAP(head1, head2, type, field) do { \ > + QUEUE_TYPEOF(type) *swap_first = (head1)->tqh_first; \ > + QUEUE_TYPEOF(type) **swap_last = (head1)->tqh_last; \ > + (head1)->tqh_first = (head2)->tqh_first; \ > + (head1)->tqh_last = (head2)->tqh_last; \ > + (head2)->tqh_first = swap_first; \ > + (head2)->tqh_last = swap_last; \ > + if ((swap_first = (head1)->tqh_first) != NULL) \ > + swap_first->field.tqe_prev = &(head1)->tqh_first; \ > + else \ > + (head1)->tqh_last = &(head1)->tqh_first; \ > + if ((swap_first = (head2)->tqh_first) != NULL) \ > + swap_first->field.tqe_prev = &(head2)->tqh_first; \ > + else \ > + (head2)->tqh_last = &(head2)->tqh_first; \ > +} while (0) > + > +#endif /* !_SYS_QUEUE_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/features.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_MONGOOSE_SRC_FEATURES_H_ > +#define CS_MONGOOSE_SRC_FEATURES_H_ > + > +#ifndef MG_DISABLE_HTTP_DIGEST_AUTH > +#define MG_DISABLE_HTTP_DIGEST_AUTH 0 > +#endif > + > +#ifndef MG_DISABLE_HTTP_KEEP_ALIVE > +#define MG_DISABLE_HTTP_KEEP_ALIVE 0 > +#endif > + > +#ifndef MG_DISABLE_PFS > +#define MG_DISABLE_PFS 0 > +#endif > + > +#ifndef MG_DISABLE_WS_RANDOM_MASK > +#define MG_DISABLE_WS_RANDOM_MASK 0 > +#endif > + > +#ifndef MG_ENABLE_ASYNC_RESOLVER > +#define MG_ENABLE_ASYNC_RESOLVER 1 > +#endif > + > +#ifndef MG_ENABLE_BROADCAST > +#define MG_ENABLE_BROADCAST 0 > +#endif > + > +#ifndef MG_ENABLE_COAP > +#define MG_ENABLE_COAP 0 > +#endif > + > +#ifndef MG_ENABLE_DEBUG > +#define MG_ENABLE_DEBUG 0 > +#endif > + > +#ifndef MG_ENABLE_DIRECTORY_LISTING > +#define MG_ENABLE_DIRECTORY_LISTING 0 > +#endif > + > +#ifndef MG_ENABLE_DNS > +#define MG_ENABLE_DNS 1 > +#endif > + > +#ifndef MG_ENABLE_DNS_SERVER > +#define MG_ENABLE_DNS_SERVER 0 > +#endif > + > +#ifndef MG_ENABLE_FAKE_DAVLOCK > +#define MG_ENABLE_FAKE_DAVLOCK 0 > +#endif > + > +#ifndef MG_ENABLE_FILESYSTEM > +#define MG_ENABLE_FILESYSTEM 0 > +#endif > + > +#ifndef MG_ENABLE_GETADDRINFO > +#define MG_ENABLE_GETADDRINFO 0 > +#endif > + > +#ifndef MG_ENABLE_HEXDUMP > +#define MG_ENABLE_HEXDUMP CS_ENABLE_STDIO > +#endif > + > +#ifndef MG_ENABLE_HTTP > +#define MG_ENABLE_HTTP 1 > +#endif > + > +#ifndef MG_ENABLE_HTTP_CGI > +#define MG_ENABLE_HTTP_CGI 0 > +#endif > + > +#ifndef MG_ENABLE_HTTP_SSI > +#define MG_ENABLE_HTTP_SSI MG_ENABLE_FILESYSTEM > +#endif > + > +#ifndef MG_ENABLE_HTTP_SSI_EXEC > +#define MG_ENABLE_HTTP_SSI_EXEC 0 > +#endif > + > +#ifndef MG_ENABLE_HTTP_STREAMING_MULTIPART > +#define MG_ENABLE_HTTP_STREAMING_MULTIPART 0 > +#endif > + > +#ifndef MG_ENABLE_HTTP_WEBDAV > +#define MG_ENABLE_HTTP_WEBDAV 0 > +#endif > + > +#ifndef MG_ENABLE_HTTP_WEBSOCKET > +#define MG_ENABLE_HTTP_WEBSOCKET MG_ENABLE_HTTP > +#endif > + > +#ifndef MG_ENABLE_IPV6 > +#define MG_ENABLE_IPV6 0 > +#endif > + > +#ifndef MG_ENABLE_MQTT > +#define MG_ENABLE_MQTT 1 > +#endif > + > +#ifndef MG_ENABLE_SOCKS > +#define MG_ENABLE_SOCKS 0 > +#endif > + > +#ifndef MG_ENABLE_MQTT_BROKER > +#define MG_ENABLE_MQTT_BROKER 0 > +#endif > + > +#ifndef MG_ENABLE_SSL > +#define MG_ENABLE_SSL 0 > +#endif > + > +#ifndef MG_ENABLE_SYNC_RESOLVER > +#define MG_ENABLE_SYNC_RESOLVER 0 > +#endif > + > +#ifndef MG_ENABLE_STDIO > +#define MG_ENABLE_STDIO CS_ENABLE_STDIO > +#endif > + > +#ifndef MG_NET_IF > +#define MG_NET_IF MG_NET_IF_SOCKET > +#endif > + > +#ifndef MG_SSL_IF > +#define MG_SSL_IF MG_SSL_IF_OPENSSL > +#endif > + > +#ifndef MG_ENABLE_THREADS /* ifdef-ok */ > +#ifdef _WIN32 > +#define MG_ENABLE_THREADS 1 > +#else > +#define MG_ENABLE_THREADS 0 > +#endif > +#endif > + > +#if MG_ENABLE_DEBUG && !defined(CS_ENABLE_DEBUG) > +#define CS_ENABLE_DEBUG 1 > +#endif > + > +/* MQTT broker requires MQTT */ > +#if MG_ENABLE_MQTT_BROKER && !MG_ENABLE_MQTT > +#undef MG_ENABLE_MQTT > +#define MG_ENABLE_MQTT 1 > +#endif > + > +#ifndef MG_ENABLE_HTTP_URL_REWRITES > +#define MG_ENABLE_HTTP_URL_REWRITES \ > + (CS_PLATFORM == CS_P_WINDOWS || CS_PLATFORM == CS_P_UNIX) > +#endif > + > +#ifndef MG_ENABLE_TUN > +#define MG_ENABLE_TUN MG_ENABLE_HTTP_WEBSOCKET > +#endif > + > +#ifndef MG_ENABLE_SNTP > +#define MG_ENABLE_SNTP 0 > +#endif > + > +#ifndef MG_ENABLE_EXTRA_ERRORS_DESC > +#define MG_ENABLE_EXTRA_ERRORS_DESC 0 > +#endif > + > +#ifndef MG_ENABLE_CALLBACK_USERDATA > +#define MG_ENABLE_CALLBACK_USERDATA 0 > +#endif > + > +#if MG_ENABLE_CALLBACK_USERDATA > +#define MG_UD_ARG(ud) , ud > +#define MG_CB(cb, ud) cb, ud > +#else > +#define MG_UD_ARG(ud) > +#define MG_CB(cb, ud) cb > +#endif > + > +#endif /* CS_MONGOOSE_SRC_FEATURES_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/net_if.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_MONGOOSE_SRC_NET_IF_H_ > +#define CS_MONGOOSE_SRC_NET_IF_H_ > + > +/* Amalgamated: #include "common/platform.h" */ > + > +/* > + * Internal async networking core interface. > + * Consists of calls made by the core, which should not block, > + * and callbacks back into the core ("..._cb"). > + * Callbacks may (will) cause methods to be invoked from within, > + * but methods are not allowed to invoke callbacks inline. > + * > + * Implementation must ensure that only one callback is invoked at any time. > + */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +#define MG_MAIN_IFACE 0 > + > +struct mg_mgr; > +struct mg_connection; > +union socket_address; > + > +struct mg_iface_vtable; > + > +struct mg_iface { > + struct mg_mgr *mgr; > + void *data; /* Implementation-specific data */ > + const struct mg_iface_vtable *vtable; > +}; > + > +struct mg_iface_vtable { > + void (*init)(struct mg_iface *iface); > + void (*free)(struct mg_iface *iface); > + void (*add_conn)(struct mg_connection *nc); > + void (*remove_conn)(struct mg_connection *nc); > + time_t (*poll)(struct mg_iface *iface, int timeout_ms); > + > + /* Set up a listening TCP socket on a given address. rv = 0 -> ok. */ > + int (*listen_tcp)(struct mg_connection *nc, union socket_address *sa); > + /* Request that a "listening" UDP socket be created. */ > + int (*listen_udp)(struct mg_connection *nc, union socket_address *sa); > + > + /* Request that a TCP connection is made to the specified address. */ > + void (*connect_tcp)(struct mg_connection *nc, const union socket_address *sa); > + /* Open a UDP socket. Doesn't actually connect anything. */ > + void (*connect_udp)(struct mg_connection *nc); > + > + /* Send functions for TCP and UDP. Sent data is copied before return. */ > + void (*tcp_send)(struct mg_connection *nc, const void *buf, size_t len); > + void (*udp_send)(struct mg_connection *nc, const void *buf, size_t len); > + > + void (*recved)(struct mg_connection *nc, size_t len); > + > + /* Perform interface-related connection initialization. Return 1 on ok. */ > + int (*create_conn)(struct mg_connection *nc); > + /* Perform interface-related cleanup on connection before destruction. */ > + void (*destroy_conn)(struct mg_connection *nc); > + > + /* Associate a socket to a connection. */ > + void (*sock_set)(struct mg_connection *nc, sock_t sock); > + > + /* Put connection's address into *sa, local (remote = 0) or remote. */ > + void (*get_conn_addr)(struct mg_connection *nc, int remote, > + union socket_address *sa); > +}; > + > +extern const struct mg_iface_vtable *mg_ifaces[]; > +extern int mg_num_ifaces; > + > +/* Creates a new interface instance. */ > +struct mg_iface *mg_if_create_iface(const struct mg_iface_vtable *vtable, > + struct mg_mgr *mgr); > + > +/* > + * Find an interface with a given implementation. The search is started from > + * interface `from`, exclusive. Returns NULL if none is found. > + */ > +struct mg_iface *mg_find_iface(struct mg_mgr *mgr, > + const struct mg_iface_vtable *vtable, > + struct mg_iface *from); > +/* > + * Deliver a new TCP connection. Returns NULL in case on error (unable to > + * create connection, in which case interface state should be discarded. > + * This is phase 1 of the two-phase process - MG_EV_ACCEPT will be delivered > + * when mg_if_accept_tcp_cb is invoked. > + */ > +struct mg_connection *mg_if_accept_new_conn(struct mg_connection *lc); > +void mg_if_accept_tcp_cb(struct mg_connection *nc, union socket_address *sa, > + size_t sa_len); > + > +/* Callback invoked by connect methods. err = 0 -> ok, != 0 -> error. */ > +void mg_if_connect_cb(struct mg_connection *nc, int err); > +/* Callback that reports that data has been put on the wire. */ > +void mg_if_sent_cb(struct mg_connection *nc, int num_sent); > +/* > + * Receive callback. > + * if `own` is true, buf must be heap-allocated and ownership is transferred > + * to the core. > + * Core will acknowledge consumption by calling iface::recved. > + */ > +void mg_if_recv_tcp_cb(struct mg_connection *nc, void *buf, int len, int own); > +/* > + * Receive callback. > + * buf must be heap-allocated and ownership is transferred to the core. > + * Core will acknowledge consumption by calling iface::recved. > + */ > +void mg_if_recv_udp_cb(struct mg_connection *nc, void *buf, int len, > + union socket_address *sa, size_t sa_len); > + > +/* void mg_if_close_conn(struct mg_connection *nc); */ > + > +/* Deliver a POLL event to the connection. */ > +void mg_if_poll(struct mg_connection *nc, time_t now); > + > +/* Deliver a TIMER event to the connection. */ > +void mg_if_timer(struct mg_connection *c, double now); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* CS_MONGOOSE_SRC_NET_IF_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/ssl_if.h" > +#endif > +/* > + * Copyright (c) 2014-2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_MONGOOSE_SRC_SSL_IF_H_ > +#define CS_MONGOOSE_SRC_SSL_IF_H_ > + > +#if MG_ENABLE_SSL > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +struct mg_ssl_if_ctx; > +struct mg_connection; > + > +void mg_ssl_if_init(); > + > +enum mg_ssl_if_result { > + MG_SSL_OK = 0, > + MG_SSL_WANT_READ = -1, > + MG_SSL_WANT_WRITE = -2, > + MG_SSL_ERROR = -3, > +}; > + > +struct mg_ssl_if_conn_params { > + const char *cert; > + const char *key; > + const char *ca_cert; > + const char *server_name; > + const char *cipher_suites; > + const char *psk_identity; > + const char *psk_key; > +}; > + > +enum mg_ssl_if_result mg_ssl_if_conn_init( > + struct mg_connection *nc, const struct mg_ssl_if_conn_params *params, > + const char **err_msg); > +enum mg_ssl_if_result mg_ssl_if_conn_accept(struct mg_connection *nc, > + struct mg_connection *lc); > +void mg_ssl_if_conn_close_notify(struct mg_connection *nc); > +void mg_ssl_if_conn_free(struct mg_connection *nc); > + > +enum mg_ssl_if_result mg_ssl_if_handshake(struct mg_connection *nc); > +int mg_ssl_if_read(struct mg_connection *nc, void *buf, size_t buf_size); > +int mg_ssl_if_write(struct mg_connection *nc, const void *data, size_t len); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* MG_ENABLE_SSL */ > + > +#endif /* CS_MONGOOSE_SRC_SSL_IF_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/net.h" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + * This software is dual-licensed: you can redistribute it and/or modify > + * it under the terms of the GNU General Public License version 2 as > + * published by the Free Software Foundation. For the terms of this > + * license, see <http://www.gnu.org/licenses/>. > + * > + * You are free to use this software under the terms of the GNU General > + * Public License, but WITHOUT ANY WARRANTY; without even the implied > + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. > + * See the GNU General Public License for more details. > + * > + * Alternatively, you can license this software under a commercial > + * license, as set out in <https://www.cesanta.com/license>. > + */ > + > +/* > + * === Core API: TCP/UDP/SSL > + * > + * NOTE: Mongoose manager is single threaded. It does not protect > + * its data structures by mutexes, therefore all functions that are dealing > + * with a particular event manager should be called from the same thread, > + * with exception of the `mg_broadcast()` function. It is fine to have different > + * event managers handled by different threads. > + */ > + > +#ifndef CS_MONGOOSE_SRC_NET_H_ > +#define CS_MONGOOSE_SRC_NET_H_ > + > +/* Amalgamated: #include "mongoose/src/common.h" */ > +/* Amalgamated: #include "mongoose/src/net_if.h" */ > +/* Amalgamated: #include "common/mbuf.h" */ > + > +#ifndef MG_VPRINTF_BUFFER_SIZE > +#define MG_VPRINTF_BUFFER_SIZE 100 > +#endif > + > +#ifdef MG_USE_READ_WRITE > +#define MG_RECV_FUNC(s, b, l, f) read(s, b, l) > +#define MG_SEND_FUNC(s, b, l, f) write(s, b, l) > +#else > +#define MG_RECV_FUNC(s, b, l, f) recv(s, b, l, f) > +#define MG_SEND_FUNC(s, b, l, f) send(s, b, l, f) > +#endif > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +union socket_address { > + struct sockaddr sa; > + struct sockaddr_in sin; > +#if MG_ENABLE_IPV6 > + struct sockaddr_in6 sin6; > +#else > + struct sockaddr sin6; > +#endif > +}; > + > +struct mg_connection; > + > +/* > + * Callback function (event handler) prototype. Must be defined by the user. > + * Mongoose calls the event handler, passing the events defined below. > + */ > +typedef void (*mg_event_handler_t)(struct mg_connection *nc, int ev, > + void *ev_data MG_UD_ARG(void *user_data)); > + > +/* Events. Meaning of event parameter (evp) is given in the comment. */ > +#define MG_EV_POLL 0 /* Sent to each connection on each mg_mgr_poll() call */ > +#define MG_EV_ACCEPT 1 /* New connection accepted. union socket_address * */ > +#define MG_EV_CONNECT 2 /* connect() succeeded or failed. int * */ > +#define MG_EV_RECV 3 /* Data has been received. int *num_bytes */ > +#define MG_EV_SEND 4 /* Data has been written to a socket. int *num_bytes */ > +#define MG_EV_CLOSE 5 /* Connection is closed. NULL */ > +#define MG_EV_TIMER 6 /* now >= conn->ev_timer_time. double * */ > + > +/* > + * Mongoose event manager. > + */ > +struct mg_mgr { > + struct mg_connection *active_connections; > +#if MG_ENABLE_HEXDUMP > + const char *hexdump_file; /* Debug hexdump file path */ > +#endif > +#if MG_ENABLE_BROADCAST > + sock_t ctl[2]; /* Socketpair for mg_broadcast() */ > +#endif > + void *user_data; /* User data */ > + int num_ifaces; > + struct mg_iface **ifaces; /* network interfaces */ > + const char *nameserver; /* DNS server to use */ > +}; > + > +/* > + * Mongoose connection. > + */ > +struct mg_connection { > + struct mg_connection *next, *prev; /* mg_mgr::active_connections linkage */ > + struct mg_connection *listener; /* Set only for accept()-ed connections */ > + struct mg_mgr *mgr; /* Pointer to containing manager */ > + > + sock_t sock; /* Socket to the remote peer */ > + int err; > + union socket_address sa; /* Remote peer address */ > + size_t recv_mbuf_limit; /* Max size of recv buffer */ > + struct mbuf recv_mbuf; /* Received data */ > + struct mbuf send_mbuf; /* Data scheduled for sending */ > + time_t last_io_time; /* Timestamp of the last socket IO */ > + double ev_timer_time; /* Timestamp of the future MG_EV_TIMER */ > +#if MG_ENABLE_SSL > + void *ssl_if_data; /* SSL library data. */ > +#endif > + mg_event_handler_t proto_handler; /* Protocol-specific event handler */ > + void *proto_data; /* Protocol-specific data */ > + void (*proto_data_destructor)(void *proto_data); > + mg_event_handler_t handler; /* Event handler function */ > + void *user_data; /* User-specific data */ > + union { > + void *v; > + /* > + * the C standard is fussy about fitting function pointers into > + * void pointers, since some archs might have fat pointers for functions. > + */ > + mg_event_handler_t f; > + } priv_1; > + void *priv_2; > + void *mgr_data; /* Implementation-specific event manager's data. */ > + struct mg_iface *iface; > + unsigned long flags; > +/* Flags set by Mongoose */ > +#define MG_F_LISTENING (1 << 0) /* This connection is listening */ > +#define MG_F_UDP (1 << 1) /* This connection is UDP */ > +#define MG_F_RESOLVING (1 << 2) /* Waiting for async resolver */ > +#define MG_F_CONNECTING (1 << 3) /* connect() call in progress */ > +#define MG_F_SSL (1 << 4) /* SSL is enabled on the connection */ > +#define MG_F_SSL_HANDSHAKE_DONE (1 << 5) /* SSL hanshake has completed */ > +#define MG_F_WANT_READ (1 << 6) /* SSL specific */ > +#define MG_F_WANT_WRITE (1 << 7) /* SSL specific */ > +#define MG_F_IS_WEBSOCKET (1 << 8) /* Websocket specific */ > + > +/* Flags that are settable by user */ > +#define MG_F_SEND_AND_CLOSE (1 << 10) /* Push remaining data and close */ > +#define MG_F_CLOSE_IMMEDIATELY (1 << 11) /* Disconnect */ > +#define MG_F_WEBSOCKET_NO_DEFRAG (1 << 12) /* Websocket specific */ > +#define MG_F_DELETE_CHUNK (1 << 13) /* HTTP specific */ > +#define MG_F_ENABLE_BROADCAST (1 << 14) /* Allow broadcast address usage */ > +#define MG_F_TUN_DO_NOT_RECONNECT (1 << 15) /* Don't reconnect tunnel */ > + > +#define MG_F_USER_1 (1 << 20) /* Flags left for application */ > +#define MG_F_USER_2 (1 << 21) > +#define MG_F_USER_3 (1 << 22) > +#define MG_F_USER_4 (1 << 23) > +#define MG_F_USER_5 (1 << 24) > +#define MG_F_USER_6 (1 << 25) > +}; > + > +/* > + * Initialise Mongoose manager. Side effect: ignores SIGPIPE signal. > + * `mgr->user_data` field will be initialised with a `user_data` parameter. > + * That is an arbitrary pointer, where the user code can associate some data > + * with the particular Mongoose manager. For example, a C++ wrapper class > + * could be written in which case `user_data` can hold a pointer to the > + * class instance. > + */ > +void mg_mgr_init(struct mg_mgr *mgr, void *user_data); > + > +/* > + * Optional parameters to `mg_mgr_init_opt()`. > + * > + * If `main_iface` is not NULL, it will be used as the main interface in the > + * default interface set. The pointer will be free'd by `mg_mgr_free`. > + * Otherwise, the main interface will be autodetected based on the current > + * platform. > + * > + * If `num_ifaces` is 0 and `ifaces` is NULL, the default interface set will be > + * used. > + * This is an advanced option, as it requires you to construct a full interface > + * set, including special networking interfaces required by some optional > + * features such as TCP tunneling. Memory backing `ifaces` and each of the > + * `num_ifaces` pointers it contains will be reclaimed by `mg_mgr_free`. > + */ > +struct mg_mgr_init_opts { > + const struct mg_iface_vtable *main_iface; > + int num_ifaces; > + const struct mg_iface_vtable **ifaces; > + const char *nameserver; > +}; > + > +/* > + * Like `mg_mgr_init` but with more options. > + * > + * Notably, this allows you to create a manger and choose > + * dynamically which networking interface implementation to use. > + */ > +void mg_mgr_init_opt(struct mg_mgr *mgr, void *user_data, > + struct mg_mgr_init_opts opts); > + > +/* > + * De-initialises Mongoose manager. > + * > + * Closes and deallocates all active connections. > + */ > +void mg_mgr_free(struct mg_mgr *); > + > +/* > + * This function performs the actual IO and must be called in a loop > + * (an event loop). It returns the current timestamp. > + * `milli` is the maximum number of milliseconds to sleep. > + * `mg_mgr_poll()` checks all connections for IO readiness. If at least one > + * of the connections is IO-ready, `mg_mgr_poll()` triggers the respective > + * event handlers and returns. > + */ > +time_t mg_mgr_poll(struct mg_mgr *, int milli); > + > +#if MG_ENABLE_BROADCAST > +/* > + * Passes a message of a given length to all connections. > + * > + * Must be called from a thread that does NOT call `mg_mgr_poll()`. > + * Note that `mg_broadcast()` is the only function > + * that can be, and must be, called from a different (non-IO) thread. > + * > + * `func` callback function will be called by the IO thread for each > + * connection. When called, the event will be `MG_EV_POLL`, and a message will > + * be passed as the `ev_data` pointer. Maximum message size is capped > + * by `MG_CTL_MSG_MESSAGE_SIZE` which is set to 8192 bytes. > + */ > +void mg_broadcast(struct mg_mgr *mgr, mg_event_handler_t cb, void *data, > + size_t len); > +#endif > + > +/* > + * Iterates over all active connections. > + * > + * Returns the next connection from the list > + * of active connections or `NULL` if there are no more connections. Below > + * is the iteration idiom: > + * > + * ```c > + * for (c = mg_next(srv, NULL); c != NULL; c = mg_next(srv, c)) { > + * // Do something with connection `c` > + * } > + * ``` > + */ > +struct mg_connection *mg_next(struct mg_mgr *mgr, struct mg_connection *c); > + > +/* > + * Optional parameters to `mg_add_sock_opt()`. > + * > + * `flags` is an initial `struct mg_connection::flags` bitmask to set, > + * see `MG_F_*` flags definitions. > + */ > +struct mg_add_sock_opts { > + void *user_data; /* Initial value for connection's user_data */ > + unsigned int flags; /* Initial connection flags */ > + const char **error_string; /* Placeholder for the error string */ > + struct mg_iface *iface; /* Interface instance */ > +}; > + > +/* > + * Creates a connection, associates it with the given socket and event handler > + * and adds it to the manager. > + * > + * For more options see the `mg_add_sock_opt` variant. > + */ > +struct mg_connection *mg_add_sock(struct mg_mgr *mgr, sock_t sock, > + MG_CB(mg_event_handler_t handler, > + void *user_data)); > + > +/* > + * Creates a connection, associates it with the given socket and event handler > + * and adds to the manager. > + * > + * See the `mg_add_sock_opts` structure for a description of the options. > + */ > +struct mg_connection *mg_add_sock_opt(struct mg_mgr *mgr, sock_t sock, > + MG_CB(mg_event_handler_t handler, > + void *user_data), > + struct mg_add_sock_opts opts); > + > +/* > + * Optional parameters to `mg_bind_opt()`. > + * > + * `flags` is an initial `struct mg_connection::flags` bitmask to set, > + * see `MG_F_*` flags definitions. > + */ > +struct mg_bind_opts { > + void *user_data; /* Initial value for connection's user_data */ > + unsigned int flags; /* Extra connection flags */ > + const char **error_string; /* Placeholder for the error string */ > + struct mg_iface *iface; /* Interface instance */ > +#if MG_ENABLE_SSL > + /* > + * SSL settings. > + * > + * Server certificate to present to clients or client certificate to > + * present to tunnel dispatcher (for tunneled connections). > + */ > + const char *ssl_cert; > + /* Private key corresponding to the certificate. If ssl_cert is set but > + * ssl_key is not, ssl_cert is used. */ > + const char *ssl_key; > + /* CA bundle used to verify client certificates or tunnel dispatchers. */ > + const char *ssl_ca_cert; > + /* Colon-delimited list of acceptable cipher suites. > + * Names depend on the library used, for example: > + * > + * ECDH-ECDSA-AES128-GCM-SHA256:DHE-RSA-AES128-SHA256 (OpenSSL) > + * TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256 > + * (mbedTLS) > + * > + * For OpenSSL the list can be obtained by running "openssl ciphers". > + * For mbedTLS, names can be found in library/ssl_ciphersuites.c > + * If NULL, a reasonable default is used. > + */ > + const char *ssl_cipher_suites; > +#endif > +}; > + > +/* > + * Creates a listening connection. > + * > + * See `mg_bind_opt` for full documentation. > + */ > +struct mg_connection *mg_bind(struct mg_mgr *mgr, const char *address, > + MG_CB(mg_event_handler_t handler, > + void *user_data)); > +/* > + * Creates a listening connection. > + * > + * The `address` parameter specifies which address to bind to. It's format is > + * the same as for the `mg_connect()` call, where `HOST` part is optional. > + * `address` can be just a port number, e.g. `:8000`. To bind to a specific > + * interface, an IP address can be specified, e.g. `1.2.3.4:8000`. By default, > + * a TCP connection is created. To create UDP connection, prepend `udp://` > + * prefix, e.g. `udp://:8000`. To summarize, `address` parameter has following > + * format: `[PROTO://][IP_ADDRESS]:PORT`, where `PROTO` could be `tcp` or > + * `udp`. > + * > + * See the `mg_bind_opts` structure for a description of the optional > + * parameters. > + * > + * Returns a new listening connection or `NULL` on error. > + * NOTE: The connection remains owned by the manager, do not free(). > + */ > +struct mg_connection *mg_bind_opt(struct mg_mgr *mgr, const char *address, > + MG_CB(mg_event_handler_t handler, > + void *user_data), > + struct mg_bind_opts opts); > + > +/* Optional parameters to `mg_connect_opt()` */ > +struct mg_connect_opts { > + void *user_data; /* Initial value for connection's user_data */ > + unsigned int flags; /* Extra connection flags */ > + const char **error_string; /* Placeholder for the error string */ > + struct mg_iface *iface; /* Interface instance */ > + const char *nameserver; /* DNS server to use, NULL for default */ > +#if MG_ENABLE_SSL > + /* > + * SSL settings. > + * Client certificate to present to the server. > + */ > + const char *ssl_cert; > + /* > + * Private key corresponding to the certificate. > + * If ssl_cert is set but ssl_key is not, ssl_cert is used. > + */ > + const char *ssl_key; > + /* > + * Verify server certificate using this CA bundle. If set to "*", then SSL > + * is enabled but no cert verification is performed. > + */ > + const char *ssl_ca_cert; > + /* Colon-delimited list of acceptable cipher suites. > + * Names depend on the library used, for example: > + * > + * ECDH-ECDSA-AES128-GCM-SHA256:DHE-RSA-AES128-SHA256 (OpenSSL) > + * TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256 > + * (mbedTLS) > + * > + * For OpenSSL the list can be obtained by running "openssl ciphers". > + * For mbedTLS, names can be found in library/ssl_ciphersuites.c > + * If NULL, a reasonable default is used. > + */ > + const char *ssl_cipher_suites; > + /* > + * Server name verification. If ssl_ca_cert is set and the certificate has > + * passed verification, its subject will be verified against this string. > + * By default (if ssl_server_name is NULL) hostname part of the address will > + * be used. Wildcard matching is supported. A special value of "*" disables > + * name verification. > + */ > + const char *ssl_server_name; > + /* > + * PSK identity and key. Identity is a NUL-terminated string and key is a hex > + * string. Key must be either 16 or 32 bytes (32 or 64 hex digits) for AES-128 > + * or AES-256 respectively. > + * Note: Default list of cipher suites does not include PSK suites, if you > + * want to use PSK you will need to set ssl_cipher_suites as well. > + */ > + const char *ssl_psk_identity; > + const char *ssl_psk_key; > +#endif > +}; > + > +/* > + * Connects to a remote host. > + * > + * See `mg_connect_opt()` for full documentation. > + */ > +struct mg_connection *mg_connect(struct mg_mgr *mgr, const char *address, > + MG_CB(mg_event_handler_t handler, > + void *user_data)); > + > +/* > + * Connects to a remote host. > + * > + * The `address` format is `[PROTO://]HOST:PORT`. `PROTO` could be `tcp` or > + * `udp`. `HOST` could be an IP address, > + * IPv6 address (if Mongoose is compiled with `-DMG_ENABLE_IPV6`) or a host > + * name. If `HOST` is a name, Mongoose will resolve it asynchronously. Examples > + * of valid addresses: `google.com:80`, `udp://1.2.3.4:53`, `10.0.0.1:443`, > + * `[::1]:80` > + * > + * See the `mg_connect_opts` structure for a description of the optional > + * parameters. > + * > + * Returns a new outbound connection or `NULL` on error. > + * > + * NOTE: The connection remains owned by the manager, do not free(). > + * > + * NOTE: To enable IPv6 addresses `-DMG_ENABLE_IPV6` should be specified > + * in the compilation flags. > + * > + * NOTE: The new connection will receive `MG_EV_CONNECT` as its first event > + * which will report the connect success status. > + * If the asynchronous resolution fails or the `connect()` syscall fails for > + * whatever reason (e.g. with `ECONNREFUSED` or `ENETUNREACH`), then > + * `MG_EV_CONNECT` event will report failure. Code example below: > + * > + * ```c > + * static void ev_handler(struct mg_connection *nc, int ev, void *ev_data) { > + * int connect_status; > + * > + * switch (ev) { > + * case MG_EV_CONNECT: > + * connect_status = * (int *) ev_data; > + * if (connect_status == 0) { > + * // Success > + * } else { > + * // Error > + * printf("connect() error: %s\n", strerror(connect_status)); > + * } > + * break; > + * ... > + * } > + * } > + * > + * ... > + * mg_connect(mgr, "my_site.com:80", ev_handler); > + * ``` > + */ > +struct mg_connection *mg_connect_opt(struct mg_mgr *mgr, const char *address, > + MG_CB(mg_event_handler_t handler, > + void *user_data), > + struct mg_connect_opts opts); > + > +#if MG_ENABLE_SSL && MG_NET_IF != MG_NET_IF_SIMPLELINK > +/* > + * Note: This function is deprecated. Please, use SSL options in > + * mg_connect_opt. > + * > + * Enables SSL for a given connection. > + * `cert` is a server certificate file name for a listening connection > + * or a client certificate file name for an outgoing connection. > + * The certificate files must be in PEM format. The server certificate file > + * must contain a certificate, concatenated with a private key, optionally > + * concatenated with DH parameters. > + * `ca_cert` is a CA certificate or NULL if peer verification is not > + * required. > + * Return: NULL on success or error message on error. > + */ > +const char *mg_set_ssl(struct mg_connection *nc, const char *cert, > + const char *ca_cert); > +#endif > + > +/* > + * Sends data to the connection. > + * > + * Note that sending functions do not actually push data to the socket. > + * They just append data to the output buffer. MG_EV_SEND will be delivered when > + * the data has actually been pushed out. > + */ > +void mg_send(struct mg_connection *, const void *buf, int len); > + > +/* Enables format string warnings for mg_printf */ > +#if defined(__GNUC__) > +__attribute__((format(printf, 2, 3))) > +#endif > +/* don't separate from mg_printf declaration */ > + > +/* > + * Sends `printf`-style formatted data to the connection. > + * > + * See `mg_send` for more details on send semantics. > + */ > +int mg_printf(struct mg_connection *, const char *fmt, ...); > + > +/* Same as `mg_printf()`, but takes `va_list ap` as an argument. */ > +int mg_vprintf(struct mg_connection *, const char *fmt, va_list ap); > + > +/* > + * Creates a socket pair. > + * `sock_type` can be either `SOCK_STREAM` or `SOCK_DGRAM`. > + * Returns 0 on failure and 1 on success. > + */ > +int mg_socketpair(sock_t[2], int sock_type); > + > +#if MG_ENABLE_SYNC_RESOLVER > +/* > + * Convert domain name into IP address. > + * > + * This is a utility function. If compilation flags have > + * `-DMG_ENABLE_GETADDRINFO`, then `getaddrinfo()` call is used for name > + * resolution. Otherwise, `gethostbyname()` is used. > + * > + * CAUTION: this function can block. > + * Return 1 on success, 0 on failure. > + */ > +int mg_resolve(const char *domain_name, char *ip_addr_buf, size_t buf_len); > +#endif > + > +/* > + * Verify given IP address against the ACL. > + * > + * `remote_ip` - an IPv4 address to check, in host byte order > + * `acl` - a comma separated list of IP subnets: `x.x.x.x/x` or `x.x.x.x`. > + * Each subnet is > + * prepended by either a - or a + sign. A plus sign means allow, where a > + * minus sign means deny. If a subnet mask is omitted, such as `-1.2.3.4`, > + * it means that only that single IP address is denied. > + * Subnet masks may vary from 0 to 32, inclusive. The default setting > + * is to allow all access. On each request the full list is traversed, > + * and the last match wins. Example: > + * > + * `-0.0.0.0/0,+192.168/16` - deny all accesses, only allow 192.168/16 subnet > + * > + * To learn more about subnet masks, see this > + * link:https://en.wikipedia.org/wiki/Subnetwork[Wikipedia page on Subnetwork]. > + * > + * Returns -1 if ACL is malformed, 0 if address is disallowed, 1 if allowed. > + */ > +int mg_check_ip_acl(const char *acl, uint32_t remote_ip); > + > +/* > + * Schedules an MG_EV_TIMER event to be delivered at `timestamp` time. > + * `timestamp` is UNIX time (the number of seconds since Epoch). It is > + * `double` instead of `time_t` to allow for sub-second precision. > + * Returns the old timer value. > + * > + * Example: set the connect timeout to 1.5 seconds: > + * > + * ``` > + * c = mg_connect(&mgr, "cesanta.com", ev_handler); > + * mg_set_timer(c, mg_time() + 1.5); > + * ... > + * > + * void ev_handler(struct mg_connection *c, int ev, void *ev_data) { > + * switch (ev) { > + * case MG_EV_CONNECT: > + * mg_set_timer(c, 0); // Clear connect timer > + * break; > + * case MG_EV_TIMER: > + * log("Connect timeout"); > + * c->flags |= MG_F_CLOSE_IMMEDIATELY; > + * break; > + * ``` > + */ > +double mg_set_timer(struct mg_connection *c, double timestamp); > + > +/* > + * A sub-second precision version of time(). > + */ > +double mg_time(void); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* CS_MONGOOSE_SRC_NET_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/uri.h" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +/* > + * === URI > + */ > + > +#ifndef CS_MONGOOSE_SRC_URI_H_ > +#define CS_MONGOOSE_SRC_URI_H_ > + > +/* Amalgamated: #include "mongoose/src/net.h" */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +/* > + * Parses an URI and fills string chunks with locations of the respective > + * uri components within the input uri string. NULL pointers will be > + * ignored. > + * > + * General syntax: > + * > + * [scheme://[user_info@]]host[:port][/path][?query][#fragment] > + * > + * Example: > + * > + * foo.com:80 > + * tcp://foo.com:1234 > + * http://foo.com:80/bar?baz=1 > + * https://user:pw@foo.com:443/blah > + * > + * `path` will include the leading slash. `query` won't include the leading `?`. > + * `host` can contain embedded colons if surrounded by square brackets in order > + * to support IPv6 literal addresses. > + * > + * > + * Returns 0 on success, -1 on error. > + */ > +int mg_parse_uri(const struct mg_str uri, struct mg_str *scheme, > + struct mg_str *user_info, struct mg_str *host, > + unsigned int *port, struct mg_str *path, struct mg_str *query, > + struct mg_str *fragment); > + > +/* > + * Assemble URI from parts. Any of the inputs can be NULL or zero-length mg_str. > + * > + * If normalize_path is true, path is normalized by resolving relative refs. > + * > + * Result is a heap-allocated string (uri->p must be free()d after use). > + * > + * Returns 0 on success, -1 on error. > + */ > +int mg_assemble_uri(const struct mg_str *scheme, const struct mg_str *user_info, > + const struct mg_str *host, unsigned int port, > + const struct mg_str *path, const struct mg_str *query, > + const struct mg_str *fragment, int normalize_path, > + struct mg_str *uri); > + > +int mg_normalize_uri_path(const struct mg_str *in, struct mg_str *out); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > +#endif /* CS_MONGOOSE_SRC_URI_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/util.h" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +/* > + * === Utility API > + */ > + > +#ifndef CS_MONGOOSE_SRC_UTIL_H_ > +#define CS_MONGOOSE_SRC_UTIL_H_ > + > +#include <stdio.h> > + > +/* Amalgamated: #include "mongoose/src/common.h" */ > +/* Amalgamated: #include "mongoose/src/net_if.h" */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +#ifndef MG_MAX_PATH > +#ifdef PATH_MAX > +#define MG_MAX_PATH PATH_MAX > +#else > +#define MG_MAX_PATH 256 > +#endif > +#endif > + > +/* > + * Fetches substring from input string `s`, `end` into `v`. > + * Skips initial delimiter characters. Records first non-delimiter character > + * at the beginning of substring `v`. Then scans the rest of the string > + * until a delimiter character or end-of-string is found. > + * `delimiters` is a 0-terminated string containing delimiter characters. > + * Either one of `delimiters` or `end_string` terminates the search. > + * Returns an `s` pointer, advanced forward where parsing has stopped. > + */ > +const char *mg_skip(const char *s, const char *end_string, > + const char *delimiters, struct mg_str *v); > + > +/* > + * Decodes base64-encoded string `s`, `len` into the destination `dst`. > + * The destination has to have enough space to hold the decoded buffer. > + * Decoding stops either when all strings have been decoded or invalid an > + * character appeared. > + * Destination is '\0'-terminated. > + * Returns the number of decoded characters. On success, that should be equal > + * to `len`. On error (invalid character) the return value is smaller then > + * `len`. > + */ > +int mg_base64_decode(const unsigned char *s, int len, char *dst); > + > +/* > + * Base64-encode chunk of memory `src`, `src_len` into the destination `dst`. > + * Destination has to have enough space to hold encoded buffer. > + * Destination is '\0'-terminated. > + */ > +void mg_base64_encode(const unsigned char *src, int src_len, char *dst); > + > +#if MG_ENABLE_FILESYSTEM > +/* > + * Performs a 64-bit `stat()` call against a given file. > + * > + * `path` should be UTF8 encoded. > + * > + * Return value is the same as for `stat()` syscall. > + */ > +int mg_stat(const char *path, cs_stat_t *st); > + > +/* > + * Opens the given file and returns a file stream. > + * > + * `path` and `mode` should be UTF8 encoded. > + * > + * Return value is the same as for the `fopen()` call. > + */ > +FILE *mg_fopen(const char *path, const char *mode); > + > +/* > + * Opens the given file and returns a file stream. > + * > + * `path` should be UTF8 encoded. > + * > + * Return value is the same as for the `open()` syscall. > + */ > +int mg_open(const char *path, int flag, int mode); > + > +/* > + * Reads data from the given file stream. > + * > + * Return value is a number of bytes readen. > + */ > +size_t mg_fread(void *ptr, size_t size, size_t count, FILE *f); > + > +/* > + * Writes data to the given file stream. > + * > + * Return value is a number of bytes wtitten. > + */ > +size_t mg_fwrite(const void *ptr, size_t size, size_t count, FILE *f); > + > +#endif /* MG_ENABLE_FILESYSTEM */ > + > +#if MG_ENABLE_THREADS > +/* > + * Starts a new detached thread. > + * Arguments and semantics are the same as pthead's `pthread_create()`. > + * `thread_func` is a thread function, `thread_func_param` is a parameter > + * that is passed to the thread function. > + */ > +void *mg_start_thread(void *(*thread_func)(void *), void *thread_func_param); > +#endif > + > +void mg_set_close_on_exec(sock_t); > + > +#define MG_SOCK_STRINGIFY_IP 1 > +#define MG_SOCK_STRINGIFY_PORT 2 > +#define MG_SOCK_STRINGIFY_REMOTE 4 > +/* > + * Converts a connection's local or remote address into string. > + * > + * The `flags` parameter is a bit mask that controls the behaviour, > + * see `MG_SOCK_STRINGIFY_*` definitions. > + * > + * - MG_SOCK_STRINGIFY_IP - print IP address > + * - MG_SOCK_STRINGIFY_PORT - print port number > + * - MG_SOCK_STRINGIFY_REMOTE - print remote peer's IP/port, not local address > + * > + * If both port number and IP address are printed, they are separated by `:`. > + * If compiled with `-DMG_ENABLE_IPV6`, IPv6 addresses are supported. > + * Return length of the stringified address. > + */ > +int mg_conn_addr_to_str(struct mg_connection *c, char *buf, size_t len, > + int flags); > +#if MG_NET_IF == MG_NET_IF_SOCKET > +/* Legacy interface. */ > +void mg_sock_to_str(sock_t sock, char *buf, size_t len, int flags); > +#endif > + > +/* > + * Convert the socket's address into string. > + * > + * `flags` is MG_SOCK_STRINGIFY_IP and/or MG_SOCK_STRINGIFY_PORT. > + */ > +int mg_sock_addr_to_str(const union socket_address *sa, char *buf, size_t len, > + int flags); > + > +#if MG_ENABLE_HEXDUMP > +/* > + * Generates a human-readable hexdump of memory chunk. > + * > + * Takes a memory buffer `buf` of length `len` and creates a hex dump of that > + * buffer in `dst`. The generated output is a-la hexdump(1). > + * Returns the length of generated string, excluding terminating `\0`. If > + * returned length is bigger than `dst_len`, the overflow bytes are discarded. > + */ > +int mg_hexdump(const void *buf, int len, char *dst, int dst_len); > + > +/* Same as mg_hexdump, but with output going to file instead of a buffer. */ > +void mg_hexdumpf(FILE *fp, const void *buf, int len); > + > +/* > + * Generates human-readable hexdump of the data sent or received by the > + * connection. `path` is a file name where hexdump should be written. > + * `num_bytes` is a number of bytes sent/received. `ev` is one of the `MG_*` > + * events sent to an event handler. This function is supposed to be called from > + * the event handler. > + */ > +void mg_hexdump_connection(struct mg_connection *nc, const char *path, > + const void *buf, int num_bytes, int ev); > +#endif > + > +/* > + * Returns true if target platform is big endian. > + */ > +int mg_is_big_endian(void); > + > +/* > + * Use with cs_base64_init/update/finish in order to write out base64 in chunks. > + */ > +void mg_mbuf_append_base64_putc(char ch, void *user_data); > + > +/* > + * Encode `len` bytes starting at `data` as base64 and append them to an mbuf. > + */ > +void mg_mbuf_append_base64(struct mbuf *mbuf, const void *data, size_t len); > + > +/* > + * Generate a Basic Auth header and appends it to buf. > + * If pass is NULL, then user is expected to contain the credentials pair > + * already encoded as `user:pass`. > + */ > +void mg_basic_auth_header(const struct mg_str user, const struct mg_str pass, > + struct mbuf *buf); > + > +/* > + * URL-escape the specified string. > + * All non-printable characters are escaped, plus `._-$,;~()/`. > + * Input need not be NUL-terminated, but the returned string is. > + * Returned string is heap-allocated and must be free()'d. > + */ > +struct mg_str mg_url_encode(const struct mg_str src); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > +#endif /* CS_MONGOOSE_SRC_UTIL_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/http.h" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +/* > + * === Common API reference > + */ > + > +#ifndef CS_MONGOOSE_SRC_HTTP_H_ > +#define CS_MONGOOSE_SRC_HTTP_H_ > + > +#if MG_ENABLE_HTTP > + > +/* Amalgamated: #include "mongoose/src/net.h" */ > +/* Amalgamated: #include "common/mg_str.h" */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +#ifndef MG_MAX_HTTP_HEADERS > +#define MG_MAX_HTTP_HEADERS 20 > +#endif > + > +#ifndef MG_MAX_HTTP_REQUEST_SIZE > +#define MG_MAX_HTTP_REQUEST_SIZE 1024 > +#endif > + > +#ifndef MG_MAX_HTTP_SEND_MBUF > +#define MG_MAX_HTTP_SEND_MBUF 1024 > +#endif > + > +#ifndef MG_CGI_ENVIRONMENT_SIZE > +#define MG_CGI_ENVIRONMENT_SIZE 8192 > +#endif > + > +/* HTTP message */ > +struct http_message { > + struct mg_str message; /* Whole message: request line + headers + body */ > + struct mg_str body; /* Message body. 0-length for requests with no body */ > + > + /* HTTP Request line (or HTTP response line) */ > + struct mg_str method; /* "GET" */ > + struct mg_str uri; /* "/my_file.html" */ > + struct mg_str proto; /* "HTTP/1.1" -- for both request and response */ > + > + /* For responses, code and response status message are set */ > + int resp_code; > + struct mg_str resp_status_msg; > + > + /* > + * Query-string part of the URI. For example, for HTTP request > + * GET /foo/bar?param1=val1¶m2=val2 > + * | uri | query_string | > + * > + * Note that question mark character doesn't belong neither to the uri, > + * nor to the query_string > + */ > + struct mg_str query_string; > + > + /* Headers */ > + struct mg_str header_names[MG_MAX_HTTP_HEADERS]; > + struct mg_str header_values[MG_MAX_HTTP_HEADERS]; > +}; > + > +#if MG_ENABLE_HTTP_WEBSOCKET > +/* WebSocket message */ > +struct websocket_message { > + unsigned char *data; > + size_t size; > + unsigned char flags; > +}; > +#endif > + > +/* HTTP multipart part */ > +struct mg_http_multipart_part { > + const char *file_name; > + const char *var_name; > + struct mg_str data; > + int status; /* <0 on error */ > + void *user_data; > +}; > + > +/* SSI call context */ > +struct mg_ssi_call_ctx { > + struct http_message *req; /* The request being processed. */ > + struct mg_str file; /* Filesystem path of the file being processed. */ > + struct mg_str arg; /* The argument passed to the tag: <!-- call arg -->. */ > +}; > + > +/* HTTP and websocket events. void *ev_data is described in a comment. */ > +#define MG_EV_HTTP_REQUEST 100 /* struct http_message * */ > +#define MG_EV_HTTP_REPLY 101 /* struct http_message * */ > +#define MG_EV_HTTP_CHUNK 102 /* struct http_message * */ > +#define MG_EV_SSI_CALL 105 /* char * */ > +#define MG_EV_SSI_CALL_CTX 106 /* struct mg_ssi_call_ctx * */ > + > +#if MG_ENABLE_HTTP_WEBSOCKET > +#define MG_EV_WEBSOCKET_HANDSHAKE_REQUEST 111 /* struct http_message * */ > +#define MG_EV_WEBSOCKET_HANDSHAKE_DONE 112 /* NULL */ > +#define MG_EV_WEBSOCKET_FRAME 113 /* struct websocket_message * */ > +#define MG_EV_WEBSOCKET_CONTROL_FRAME 114 /* struct websocket_message * */ > +#endif > + > +#if MG_ENABLE_HTTP_STREAMING_MULTIPART > +#define MG_EV_HTTP_MULTIPART_REQUEST 121 /* struct http_message */ > +#define MG_EV_HTTP_PART_BEGIN 122 /* struct mg_http_multipart_part */ > +#define MG_EV_HTTP_PART_DATA 123 /* struct mg_http_multipart_part */ > +#define MG_EV_HTTP_PART_END 124 /* struct mg_http_multipart_part */ > +/* struct mg_http_multipart_part */ > +#define MG_EV_HTTP_MULTIPART_REQUEST_END 125 > +#endif > + > +/* > + * Attaches a built-in HTTP event handler to the given connection. > + * The user-defined event handler will receive following extra events: > + * > + * - MG_EV_HTTP_REQUEST: HTTP request has arrived. Parsed HTTP request > + * is passed as > + * `struct http_message` through the handler's `void *ev_data` pointer. > + * - MG_EV_HTTP_REPLY: The HTTP reply has arrived. The parsed HTTP reply is > + * passed as `struct http_message` through the handler's `void *ev_data` > + * pointer. > + * - MG_EV_HTTP_CHUNK: The HTTP chunked-encoding chunk has arrived. > + * The parsed HTTP reply is passed as `struct http_message` through the > + * handler's `void *ev_data` pointer. `http_message::body` would contain > + * incomplete, reassembled HTTP body. > + * It will grow with every new chunk that arrives, and it can > + * potentially consume a lot of memory. An event handler may process > + * the body as chunks are coming, and signal Mongoose to delete processed > + * body by setting `MG_F_DELETE_CHUNK` in `mg_connection::flags`. When > + * the last zero chunk is received, > + * Mongoose sends `MG_EV_HTTP_REPLY` event with > + * full reassembled body (if handler did not signal to delete chunks) or > + * with empty body (if handler did signal to delete chunks). > + * - MG_EV_WEBSOCKET_HANDSHAKE_REQUEST: server has received the WebSocket > + * handshake request. `ev_data` contains parsed HTTP request. > + * - MG_EV_WEBSOCKET_HANDSHAKE_DONE: server has completed the WebSocket > + * handshake. `ev_data` is `NULL`. > + * - MG_EV_WEBSOCKET_FRAME: new WebSocket frame has arrived. `ev_data` is > + * `struct websocket_message *` > + * > + * When compiled with MG_ENABLE_HTTP_STREAMING_MULTIPART, Mongoose parses > + * multipart requests and splits them into separate events: > + * - MG_EV_HTTP_MULTIPART_REQUEST: Start of the request. > + * This event is sent before body is parsed. After this, the user > + * should expect a sequence of PART_BEGIN/DATA/END requests. > + * This is also the last time when headers and other request fields are > + * accessible. > + * - MG_EV_HTTP_PART_BEGIN: Start of a part of a multipart message. > + * Argument: mg_http_multipart_part with var_name and file_name set > + * (if present). No data is passed in this message. > + * - MG_EV_HTTP_PART_DATA: new portion of data from the multipart message. > + * Argument: mg_http_multipart_part. var_name and file_name are preserved, > + * data is available in mg_http_multipart_part.data. > + * - MG_EV_HTTP_PART_END: End of the current part. var_name, file_name are > + * the same, no data in the message. If status is 0, then the part is > + * properly terminated with a boundary, status < 0 means that connection > + * was terminated. > + * - MG_EV_HTTP_MULTIPART_REQUEST_END: End of the multipart request. > + * Argument: mg_http_multipart_part, var_name and file_name are NULL, > + * status = 0 means request was properly closed, < 0 means connection > + * was terminated (note: in this case both PART_END and REQUEST_END are > + * delivered). > + */ > +void mg_set_protocol_http_websocket(struct mg_connection *nc); > + > +#if MG_ENABLE_HTTP_WEBSOCKET > +/* > + * Send websocket handshake to the server. > + * > + * `nc` must be a valid connection, connected to a server. `uri` is an URI > + * to fetch, extra_headers` is extra HTTP headers to send or `NULL`. > + * > + * This function is intended to be used by websocket client. > + * > + * Note that the Host header is mandatory in HTTP/1.1 and must be > + * included in `extra_headers`. `mg_send_websocket_handshake2` offers > + * a better API for that. > + * > + * Deprecated in favour of `mg_send_websocket_handshake2` > + */ > +void mg_send_websocket_handshake(struct mg_connection *nc, const char *uri, > + const char *extra_headers); > + > +/* > + * Send websocket handshake to the server. > + * > + * `nc` must be a valid connection, connected to a server. `uri` is an URI > + * to fetch, `host` goes into the `Host` header, `protocol` goes into the > + * `Sec-WebSocket-Proto` header (NULL to omit), extra_headers` is extra HTTP > + * headers to send or `NULL`. > + * > + * This function is intended to be used by websocket client. > + */ > +void mg_send_websocket_handshake2(struct mg_connection *nc, const char *path, > + const char *host, const char *protocol, > + const char *extra_headers); > + > +/* Like mg_send_websocket_handshake2 but also passes basic auth header */ > +void mg_send_websocket_handshake3(struct mg_connection *nc, const char *path, > + const char *host, const char *protocol, > + const char *extra_headers, const char *user, > + const char *pass); > + > +/* Same as mg_send_websocket_handshake3 but with strings not necessarily > + * NUL-temrinated */ > +void mg_send_websocket_handshake3v(struct mg_connection *nc, > + const struct mg_str path, > + const struct mg_str host, > + const struct mg_str protocol, > + const struct mg_str extra_headers, > + const struct mg_str user, > + const struct mg_str pass); > + > +/* > + * Helper function that creates an outbound WebSocket connection. > + * > + * `url` is a URL to connect to. It must be properly URL-encoded, e.g. have > + * no spaces, etc. By default, `mg_connect_ws()` sends Connection and > + * Host headers. `extra_headers` is an extra HTTP header to send, e.g. > + * `"User-Agent: my-app\r\n"`. > + * If `protocol` is not NULL, then a `Sec-WebSocket-Protocol` header is sent. > + * > + * Examples: > + * > + * ```c > + * nc1 = mg_connect_ws(mgr, ev_handler_1, "ws://echo.websocket.org", NULL, > + * NULL); > + * nc2 = mg_connect_ws(mgr, ev_handler_1, "wss://echo.websocket.org", NULL, > + * NULL); > + * nc3 = mg_connect_ws(mgr, ev_handler_1, "ws://api.cesanta.com", > + * "clubby.cesanta.com", NULL); > + * ``` > + */ > +struct mg_connection *mg_connect_ws(struct mg_mgr *mgr, > + MG_CB(mg_event_handler_t event_handler, > + void *user_data), > + const char *url, const char *protocol, > + const char *extra_headers); > + > +/* > + * Helper function that creates an outbound WebSocket connection > + * > + * Mostly identical to `mg_connect_ws`, but allows to provide extra parameters > + * (for example, SSL parameters) > + */ > +struct mg_connection *mg_connect_ws_opt( > + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), > + struct mg_connect_opts opts, const char *url, const char *protocol, > + const char *extra_headers); > + > +/* > + * Send WebSocket frame to the remote end. > + * > + * `op_and_flags` specifies the frame's type. It's one of: > + * > + * - WEBSOCKET_OP_CONTINUE > + * - WEBSOCKET_OP_TEXT > + * - WEBSOCKET_OP_BINARY > + * - WEBSOCKET_OP_CLOSE > + * - WEBSOCKET_OP_PING > + * - WEBSOCKET_OP_PONG > + * > + * Orred with one of the flags: > + * > + * - WEBSOCKET_DONT_FIN: Don't set the FIN flag on the frame to be sent. > + * > + * `data` and `data_len` contain frame data. > + */ > +void mg_send_websocket_frame(struct mg_connection *nc, int op_and_flags, > + const void *data, size_t data_len); > + > +/* > + * Sends multiple websocket frames. > + * > + * Like `mg_send_websocket_frame()`, but composes a frame from multiple > + *buffers. > + */ > +void mg_send_websocket_framev(struct mg_connection *nc, int op_and_flags, > + const struct mg_str *strings, int num_strings); > + > +/* > + * Sends WebSocket frame to the remote end. > + * > + * Like `mg_send_websocket_frame()`, but allows to create formatted messages > + * with `printf()`-like semantics. > + */ > +void mg_printf_websocket_frame(struct mg_connection *nc, int op_and_flags, > + const char *fmt, ...); > + > +/* Websocket opcodes, from http://tools.ietf.org/html/rfc6455 */ > +#define WEBSOCKET_OP_CONTINUE 0 > +#define WEBSOCKET_OP_TEXT 1 > +#define WEBSOCKET_OP_BINARY 2 > +#define WEBSOCKET_OP_CLOSE 8 > +#define WEBSOCKET_OP_PING 9 > +#define WEBSOCKET_OP_PONG 10 > + > +/* > + * If set causes the FIN flag to not be set on outbound > + * frames. This enables sending multiple fragments of a single > + * logical message. > + * > + * The WebSocket protocol mandates that if the FIN flag of a data > + * frame is not set, the next frame must be a WEBSOCKET_OP_CONTINUE. > + * The last frame must have the FIN bit set. > + * > + * Note that mongoose will automatically defragment incoming messages, > + * so this flag is used only on outbound messages. > + */ > +#define WEBSOCKET_DONT_FIN 0x100 > + > +#endif /* MG_ENABLE_HTTP_WEBSOCKET */ > + > +/* > + * Decodes a URL-encoded string. > + * > + * Source string is specified by (`src`, `src_len`), and destination is > + * (`dst`, `dst_len`). If `is_form_url_encoded` is non-zero, then > + * `+` character is decoded as a blank space character. This function > + * guarantees to NUL-terminate the destination. If destination is too small, > + * then the source string is partially decoded and `-1` is returned. > + *Otherwise, > + * a length of the decoded string is returned, not counting final NUL. > + */ > +int mg_url_decode(const char *src, int src_len, char *dst, int dst_len, > + int is_form_url_encoded); > + > +extern void mg_hash_md5_v(size_t num_msgs, const uint8_t *msgs[], > + const size_t *msg_lens, uint8_t *digest); > +extern void mg_hash_sha1_v(size_t num_msgs, const uint8_t *msgs[], > + const size_t *msg_lens, uint8_t *digest); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* MG_ENABLE_HTTP */ > + > +#endif /* CS_MONGOOSE_SRC_HTTP_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/http_server.h" > +#endif > +/* > + * === Server API reference > + */ > + > +#ifndef CS_MONGOOSE_SRC_HTTP_SERVER_H_ > +#define CS_MONGOOSE_SRC_HTTP_SERVER_H_ > + > +#if MG_ENABLE_HTTP > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +/* > + * Parses a HTTP message. > + * > + * `is_req` should be set to 1 if parsing a request, 0 if reply. > + * > + * Returns the number of bytes parsed. If HTTP message is > + * incomplete `0` is returned. On parse error, a negative number is returned. > + */ > +int mg_parse_http(const char *s, int n, struct http_message *hm, int is_req); > + > +/* > + * Searches and returns the header `name` in parsed HTTP message `hm`. > + * If header is not found, NULL is returned. Example: > + * > + * struct mg_str *host_hdr = mg_get_http_header(hm, "Host"); > + */ > +struct mg_str *mg_get_http_header(struct http_message *hm, const char *name); > + > +/* > + * Parses the HTTP header `hdr`. Finds variable `var_name` and stores its value > + * in the buffer `buf`, `buf_size`. Returns 0 if variable not found, non-zero > + * otherwise. > + * > + * This function is supposed to parse cookies, authentication headers, etc. > + * Example (error handling omitted): > + * > + * char user[20]; > + * struct mg_str *hdr = mg_get_http_header(hm, "Authorization"); > + * mg_http_parse_header(hdr, "username", user, sizeof(user)); > + * > + * Returns the length of the variable's value. If buffer is not large enough, > + * or variable not found, 0 is returned. > + */ > +int mg_http_parse_header(struct mg_str *hdr, const char *var_name, char *buf, > + size_t buf_size); > + > +/* > + * Gets and parses the Authorization: Basic header > + * Returns -1 if no Authorization header is found, or if > + * mg_parse_http_basic_auth > + * fails parsing the resulting header. > + */ > +int mg_get_http_basic_auth(struct http_message *hm, char *user, size_t user_len, > + char *pass, size_t pass_len); > + > +/* > + * Parses the Authorization: Basic header > + * Returns -1 iif the authorization type is not "Basic" or any other error such > + * as incorrectly encoded base64 user password pair. > + */ > +int mg_parse_http_basic_auth(struct mg_str *hdr, char *user, size_t user_len, > + char *pass, size_t pass_len); > + > +/* > + * Parses the buffer `buf`, `buf_len` that contains multipart form data chunks. > + * Stores the chunk name in a `var_name`, `var_name_len` buffer. > + * If a chunk is an uploaded file, then `file_name`, `file_name_len` is > + * filled with an uploaded file name. `chunk`, `chunk_len` > + * points to the chunk data. > + * > + * Return: number of bytes to skip to the next chunk or 0 if there are > + * no more chunks. > + * > + * Usage example: > + * > + * ```c > + * static void ev_handler(struct mg_connection *nc, int ev, void *ev_data) { > + * switch(ev) { > + * case MG_EV_HTTP_REQUEST: { > + * struct http_message *hm = (struct http_message *) ev_data; > + * char var_name[100], file_name[100]; > + * const char *chunk; > + * size_t chunk_len, n1, n2; > + * > + * n1 = n2 = 0; > + * while ((n2 = mg_parse_multipart(hm->body.p + n1, > + * hm->body.len - n1, > + * var_name, sizeof(var_name), > + * file_name, sizeof(file_name), > + * &chunk, &chunk_len)) > 0) { > + * printf("var: %s, file_name: %s, size: %d, chunk: [%.*s]\n", > + * var_name, file_name, (int) chunk_len, > + * (int) chunk_len, chunk); > + * n1 += n2; > + * } > + * } > + * break; > + * ``` > + */ > +size_t mg_parse_multipart(const char *buf, size_t buf_len, char *var_name, > + size_t var_name_len, char *file_name, > + size_t file_name_len, const char **chunk, > + size_t *chunk_len); > + > +/* > + * Fetches a HTTP form variable. > + * > + * Fetches a variable `name` from a `buf` into a buffer specified by `dst`, > + * `dst_len`. The destination is always zero-terminated. Returns the length of > + * a fetched variable. If not found, 0 is returned. `buf` must be valid > + * url-encoded buffer. If destination is too small or an error occured, > + * negative number is returned. > + */ > +int mg_get_http_var(const struct mg_str *buf, const char *name, char *dst, > + size_t dst_len); > + > +#if MG_ENABLE_FILESYSTEM > +/* > + * This structure defines how `mg_serve_http()` works. > + * Best practice is to set only required settings, and leave the rest as NULL. > + */ > +struct mg_serve_http_opts { > + /* Path to web root directory */ > + const char *document_root; > + > + /* List of index files. Default is "" */ > + const char *index_files; > + > + /* > + * Leave as NULL to disable authentication. > + * To enable directory protection with authentication, set this to ".htpasswd" > + * Then, creating ".htpasswd" file in any directory automatically protects > + * it with digest authentication. > + * Use `mongoose` web server binary, or `htdigest` Apache utility to > + * create/manipulate passwords file. > + * Make sure `auth_domain` is set to a valid domain name. > + */ > + const char *per_directory_auth_file; > + > + /* Authorization domain (domain name of this web server) */ > + const char *auth_domain; > + > + /* > + * Leave as NULL to disable authentication. > + * Normally, only selected directories in the document root are protected. > + * If absolutely every access to the web server needs to be authenticated, > + * regardless of the URI, set this option to the path to the passwords file. > + * Format of that file is the same as ".htpasswd" file. Make sure that file > + * is located outside document root to prevent people fetching it. > + */ > + const char *global_auth_file; > + > + /* Set to "no" to disable directory listing. Enabled by default. */ > + const char *enable_directory_listing; > + > + /* > + * SSI files pattern. If not set, "**.shtml$|**.shtm$" is used. > + * > + * All files that match ssi_pattern are treated as SSI. > + * > + * Server Side Includes (SSI) is a simple interpreted server-side scripting > + * language which is most commonly used to include the contents of a file > + * into a web page. It can be useful when it is desirable to include a common > + * piece of code throughout a website, for example, headers and footers. > + * > + * In order for a webpage to recognize an SSI-enabled HTML file, the > + * filename should end with a special extension, by default the extension > + * should be either .shtml or .shtm > + * > + * Unknown SSI directives are silently ignored by Mongoose. Currently, > + * the following SSI directives are supported: > + * <!--#include FILE_TO_INCLUDE --> > + * <!--#exec "COMMAND_TO_EXECUTE" --> > + * <!--#call COMMAND --> > + * > + * Note that <!--#include ...> directive supports three path > + *specifications: > + * > + * <!--#include virtual="path" --> Path is relative to web server root > + * <!--#include abspath="path" --> Path is absolute or relative to the > + * web server working dir > + * <!--#include file="path" -->, Path is relative to current document > + * <!--#include "path" --> > + * > + * The include directive may be used to include the contents of a file or > + * the result of running a CGI script. > + * > + * The exec directive is used to execute > + * a command on a server, and show command's output. Example: > + * > + * <!--#exec "ls -l" --> > + * > + * The call directive is a way to invoke a C handler from the HTML page. > + * On each occurence of <!--#call COMMAND OPTIONAL_PARAMS> directive, > + * Mongoose calls a registered event handler with MG_EV_SSI_CALL event, > + * and event parameter will point to the COMMAND OPTIONAL_PARAMS string. > + * An event handler can output any text, for example by calling > + * `mg_printf()`. This is a flexible way of generating a web page on > + * server side by calling a C event handler. Example: > + * > + * <!--#call foo --> ... <!--#call bar --> > + * > + * In the event handler: > + * case MG_EV_SSI_CALL: { > + * const char *param = (const char *) ev_data; > + * if (strcmp(param, "foo") == 0) { > + * mg_printf(c, "hello from foo"); > + * } else if (strcmp(param, "bar") == 0) { > + * mg_printf(c, "hello from bar"); > + * } > + * break; > + * } > + */ > + const char *ssi_pattern; > + > + /* IP ACL. By default, NULL, meaning all IPs are allowed to connect */ > + const char *ip_acl; > + > +#if MG_ENABLE_HTTP_URL_REWRITES > + /* URL rewrites. > + * > + * Comma-separated list of `uri_pattern=url_file_or_directory_path` rewrites. > + * When HTTP request is received, Mongoose constructs a file name from the > + * requested URI by combining `document_root` and the URI. However, if the > + * rewrite option is used and `uri_pattern` matches requested URI, then > + * `document_root` is ignored. Instead, `url_file_or_directory_path` is used, > + * which should be a full path name or a path relative to the web server's > + * current working directory. It can also be an URI (http:// or https://) > + * in which case mongoose will behave as a reverse proxy for that destination. > + * > + * Note that `uri_pattern`, as all Mongoose patterns, is a prefix pattern. > + * > + * If uri_pattern starts with `@` symbol, then Mongoose compares it with the > + * HOST header of the request. If they are equal, Mongoose sets document root > + * to `file_or_directory_path`, implementing virtual hosts support. > + * Example: `@foo.com=/document/root/for/foo.com` > + * > + * If `uri_pattern` starts with `%` symbol, then Mongoose compares it with > + * the listening port. If they match, then Mongoose issues a 301 redirect. > + * For example, to redirect all HTTP requests to the > + * HTTPS port, do `%80=https://my.site.com`. Note that the request URI is > + * automatically appended to the redirect location. > + */ > + const char *url_rewrites; > +#endif > + > + /* DAV document root. If NULL, DAV requests are going to fail. */ > + const char *dav_document_root; > + > + /* > + * DAV passwords file. If NULL, DAV requests are going to fail. > + * If passwords file is set to "-", then DAV auth is disabled. > + */ > + const char *dav_auth_file; > + > + /* Glob pattern for the files to hide. */ > + const char *hidden_file_pattern; > + > + /* Set to non-NULL to enable CGI, e.g. **.cgi$|**.php$" */ > + const char *cgi_file_pattern; > + > + /* If not NULL, ignore CGI script hashbang and use this interpreter */ > + const char *cgi_interpreter; > + > + /* > + * Comma-separated list of Content-Type overrides for path suffixes, e.g. > + * ".txt=text/plain; charset=utf-8,.c=text/plain" > + */ > + const char *custom_mime_types; > + > + /* > + * Extra HTTP headers to add to each server response. > + * Example: to enable CORS, set this to "Access-Control-Allow-Origin: *". > + */ > + const char *extra_headers; > +}; > + > +/* > + * Serves given HTTP request according to the `options`. > + * > + * Example code snippet: > + * > + * ```c > + * static void ev_handler(struct mg_connection *nc, int ev, void *ev_data) { > + * struct http_message *hm = (struct http_message *) ev_data; > + * struct mg_serve_http_opts opts = { .document_root = "/var/www" }; // C99 > + * > + * switch (ev) { > + * case MG_EV_HTTP_REQUEST: > + * mg_serve_http(nc, hm, opts); > + * break; > + * default: > + * break; > + * } > + * } > + * ``` > + */ > +void mg_serve_http(struct mg_connection *nc, struct http_message *hm, > + struct mg_serve_http_opts opts); > + > +/* > + * Serves a specific file with a given MIME type and optional extra headers. > + * > + * Example code snippet: > + * > + * ```c > + * static void ev_handler(struct mg_connection *nc, int ev, void *ev_data) { > + * switch (ev) { > + * case MG_EV_HTTP_REQUEST: { > + * struct http_message *hm = (struct http_message *) ev_data; > + * mg_http_serve_file(nc, hm, "file.txt", > + * mg_mk_str("text/plain"), mg_mk_str("")); > + * break; > + * } > + * ... > + * } > + * } > + * ``` > + */ > +void mg_http_serve_file(struct mg_connection *nc, struct http_message *hm, > + const char *path, const struct mg_str mime_type, > + const struct mg_str extra_headers); > + > +#if MG_ENABLE_HTTP_STREAMING_MULTIPART > + > +/* Callback prototype for `mg_file_upload_handler()`. */ > +typedef struct mg_str (*mg_fu_fname_fn)(struct mg_connection *nc, > + struct mg_str fname); > + > +/* > + * File upload handler. > + * This handler can be used to implement file uploads with minimum code. > + * This handler will process MG_EV_HTTP_PART_* events and store file data into > + * a local file. > + * `local_name_fn` will be invoked with whatever name was provided by the client > + * and will expect the name of the local file to open. A return value of NULL > + * will abort file upload (client will get a "403 Forbidden" response). If > + * non-null, the returned string must be heap-allocated and will be freed by > + * the caller. > + * Exception: it is ok to return the same string verbatim. > + * > + * Example: > + * > + * ```c > + * struct mg_str upload_fname(struct mg_connection *nc, struct mg_str fname) { > + * // Just return the same filename. Do not actually do this except in test! > + * // fname is user-controlled and needs to be sanitized. > + * return fname; > + * } > + * void ev_handler(struct mg_connection *nc, int ev, void *ev_data) { > + * switch (ev) { > + * ... > + * case MG_EV_HTTP_PART_BEGIN: > + * case MG_EV_HTTP_PART_DATA: > + * case MG_EV_HTTP_PART_END: > + * mg_file_upload_handler(nc, ev, ev_data, upload_fname); > + * break; > + * } > + * } > + * ``` > + */ > +void mg_file_upload_handler(struct mg_connection *nc, int ev, void *ev_data, > + mg_fu_fname_fn local_name_fn > + MG_UD_ARG(void *user_data)); > +#endif /* MG_ENABLE_HTTP_STREAMING_MULTIPART */ > +#endif /* MG_ENABLE_FILESYSTEM */ > + > +/* > + * Registers a callback for a specified http endpoint > + * Note: if callback is registered it is called instead of the > + * callback provided in mg_bind > + * > + * Example code snippet: > + * > + * ```c > + * static void handle_hello1(struct mg_connection *nc, int ev, void *ev_data) { > + * (void) ev; (void) ev_data; > + * mg_printf(nc, "HTTP/1.0 200 OK\r\n\r\n[I am Hello1]"); > + * nc->flags |= MG_F_SEND_AND_CLOSE; > + * } > + * > + * static void handle_hello2(struct mg_connection *nc, int ev, void *ev_data) { > + * (void) ev; (void) ev_data; > + * mg_printf(nc, "HTTP/1.0 200 OK\r\n\r\n[I am Hello2]"); > + * nc->flags |= MG_F_SEND_AND_CLOSE; > + * } > + * > + * void init() { > + * nc = mg_bind(&mgr, local_addr, cb1); > + * mg_register_http_endpoint(nc, "/hello1", handle_hello1); > + * mg_register_http_endpoint(nc, "/hello1/hello2", handle_hello2); > + * } > + * ``` > + */ > +void mg_register_http_endpoint(struct mg_connection *nc, const char *uri_path, > + MG_CB(mg_event_handler_t handler, > + void *user_data)); > + > +struct mg_http_endpoint_opts { > + void *user_data; > + /* Authorization domain (realm) */ > + const char *auth_domain; > + const char *auth_file; > +}; > + > +void mg_register_http_endpoint_opt(struct mg_connection *nc, > + const char *uri_path, > + mg_event_handler_t handler, > + struct mg_http_endpoint_opts opts); > + > +/* > + * Authenticates a HTTP request against an opened password file. > + * Returns 1 if authenticated, 0 otherwise. > + */ > +int mg_http_check_digest_auth(struct http_message *hm, const char *auth_domain, > + FILE *fp); > + > +/* > + * Authenticates given response params against an opened password file. > + * Returns 1 if authenticated, 0 otherwise. > + * > + * It's used by mg_http_check_digest_auth(). > + */ > +int mg_check_digest_auth(struct mg_str method, struct mg_str uri, > + struct mg_str username, struct mg_str cnonce, > + struct mg_str response, struct mg_str qop, > + struct mg_str nc, struct mg_str nonce, > + struct mg_str auth_domain, FILE *fp); > + > +/* > + * Sends buffer `buf` of size `len` to the client using chunked HTTP encoding. > + * This function sends the buffer size as hex number + newline first, then > + * the buffer itself, then the newline. For example, > + * `mg_send_http_chunk(nc, "foo", 3)` will append the `3\r\nfoo\r\n` string > + * to the `nc->send_mbuf` output IO buffer. > + * > + * NOTE: The HTTP header "Transfer-Encoding: chunked" should be sent prior to > + * using this function. > + * > + * NOTE: do not forget to send an empty chunk at the end of the response, > + * to tell the client that everything was sent. Example: > + * > + * ``` > + * mg_printf_http_chunk(nc, "%s", "my response!"); > + * mg_send_http_chunk(nc, "", 0); // Tell the client we're finished > + * ``` > + */ > +void mg_send_http_chunk(struct mg_connection *nc, const char *buf, size_t len); > + > +/* > + * Sends a printf-formatted HTTP chunk. > + * Functionality is similar to `mg_send_http_chunk()`. > + */ > +void mg_printf_http_chunk(struct mg_connection *nc, const char *fmt, ...); > + > +/* > + * Sends the response status line. > + * If `extra_headers` is not NULL, then `extra_headers` are also sent > + * after the response line. `extra_headers` must NOT end end with new line. > + * Example: > + * > + * mg_send_response_line(nc, 200, "Access-Control-Allow-Origin: *"); > + * > + * Will result in: > + * > + * HTTP/1.1 200 OK\r\n > + * Access-Control-Allow-Origin: *\r\n > + */ > +void mg_send_response_line(struct mg_connection *nc, int status_code, > + const char *extra_headers); > + > +/* > + * Sends an error response. If reason is NULL, the message will be inferred > + * from the error code (if supported). > + */ > +void mg_http_send_error(struct mg_connection *nc, int code, const char *reason); > + > +/* > + * Sends a redirect response. > + * `status_code` should be either 301 or 302 and `location` point to the > + * new location. > + * If `extra_headers` is not empty, then `extra_headers` are also sent > + * after the response line. `extra_headers` must NOT end end with new line. > + * > + * Example: > + * > + * mg_http_send_redirect(nc, 302, mg_mk_str("/login"), mg_mk_str(NULL)); > + */ > +void mg_http_send_redirect(struct mg_connection *nc, int status_code, > + const struct mg_str location, > + const struct mg_str extra_headers); > + > +/* > + * Sends the response line and headers. > + * This function sends the response line with the `status_code`, and > + * automatically > + * sends one header: either "Content-Length" or "Transfer-Encoding". > + * If `content_length` is negative, then "Transfer-Encoding: chunked" header > + * is sent, otherwise, "Content-Length" header is sent. > + * > + * NOTE: If `Transfer-Encoding` is `chunked`, then message body must be sent > + * using `mg_send_http_chunk()` or `mg_printf_http_chunk()` functions. > + * Otherwise, `mg_send()` or `mg_printf()` must be used. > + * Extra headers could be set through `extra_headers`. Note `extra_headers` > + * must NOT be terminated by a new line. > + */ > +void mg_send_head(struct mg_connection *n, int status_code, > + int64_t content_length, const char *extra_headers); > + > +/* > + * Sends a printf-formatted HTTP chunk, escaping HTML tags. > + */ > +void mg_printf_html_escape(struct mg_connection *nc, const char *fmt, ...); > + > +#if MG_ENABLE_HTTP_URL_REWRITES > +/* > + * Proxies a given request to a given upstream http server. The path prefix > + * in `mount` will be stripped of the path requested to the upstream server, > + * e.g. if mount is /api and upstream is http://localhost:8001/foo > + * then an incoming request to /api/bar will cause a request to > + * http://localhost:8001/foo/bar > + * > + * EXPERIMENTAL API. Please use http_serve_http + url_rewrites if a static > + * mapping is good enough. > + */ > +void mg_http_reverse_proxy(struct mg_connection *nc, > + const struct http_message *hm, struct mg_str mount, > + struct mg_str upstream); > +#endif > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* MG_ENABLE_HTTP */ > + > +#endif /* CS_MONGOOSE_SRC_HTTP_SERVER_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/http_client.h" > +#endif > +/* > + * === Client API reference > + */ > + > +#ifndef CS_MONGOOSE_SRC_HTTP_CLIENT_H_ > +#define CS_MONGOOSE_SRC_HTTP_CLIENT_H_ > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +/* > + * Helper function that creates an outbound HTTP connection. > + * > + * `url` is the URL to fetch. It must be properly URL-encoded, e.g. have > + * no spaces, etc. By default, `mg_connect_http()` sends the Connection and > + * Host headers. `extra_headers` is an extra HTTP header to send, e.g. > + * `"User-Agent: my-app\r\n"`. > + * If `post_data` is NULL, then a GET request is created. Otherwise, a POST > + * request is created with the specified POST data. Note that if the data being > + * posted is a form submission, the `Content-Type` header should be set > + * accordingly (see example below). > + * > + * Examples: > + * > + * ```c > + * nc1 = mg_connect_http(mgr, ev_handler_1, "http://www.google.com", NULL, > + * NULL); > + * nc2 = mg_connect_http(mgr, ev_handler_1, "https://github.com", NULL, NULL); > + * nc3 = mg_connect_http( > + * mgr, ev_handler_1, "my_server:8000/form_submit/", > + * "Content-Type: application/x-www-form-urlencoded\r\n", > + * "var_1=value_1&var_2=value_2"); > + * ``` > + */ > +struct mg_connection *mg_connect_http( > + struct mg_mgr *mgr, > + MG_CB(mg_event_handler_t event_handler, void *user_data), const char *url, > + const char *extra_headers, const char *post_data); > + > +/* > + * Helper function that creates an outbound HTTP connection. > + * > + * Mostly identical to mg_connect_http, but allows you to provide extra > + *parameters > + * (for example, SSL parameters) > + */ > +struct mg_connection *mg_connect_http_opt( > + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), > + struct mg_connect_opts opts, const char *url, const char *extra_headers, > + const char *post_data); > + > +/* Creates digest authentication header for a client request. */ > +int mg_http_create_digest_auth_header(char *buf, size_t buf_len, > + const char *method, const char *uri, > + const char *auth_domain, const char *user, > + const char *passwd); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > +#endif /* CS_MONGOOSE_SRC_HTTP_CLIENT_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/mqtt.h" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + * This software is dual-licensed: you can redistribute it and/or modify > + * it under the terms of the GNU General Public License version 2 as > + * published by the Free Software Foundation. For the terms of this > + * license, see <http://www.gnu.org/licenses/>. > + * > + * You are free to use this software under the terms of the GNU General > + * Public License, but WITHOUT ANY WARRANTY; without even the implied > + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. > + * See the GNU General Public License for more details. > + * > + * Alternatively, you can license this software under a commercial > + * license, as set out in <https://www.cesanta.com/license>. > + */ > + > +/* > + * === MQTT API reference > + */ > + > +#ifndef CS_MONGOOSE_SRC_MQTT_H_ > +#define CS_MONGOOSE_SRC_MQTT_H_ > + > +/* Amalgamated: #include "mongoose/src/net.h" */ > + > +struct mg_mqtt_message { > + int cmd; > + int qos; > + int len; /* message length in the IO buffer */ > + struct mg_str topic; > + struct mg_str payload; > + > + uint8_t connack_ret_code; /* connack */ > + uint16_t message_id; /* puback */ > + > + /* connect */ > + uint8_t protocol_version; > + uint8_t connect_flags; > + uint16_t keep_alive_timer; > + struct mg_str protocol_name; > + struct mg_str client_id; > + struct mg_str will_topic; > + struct mg_str will_message; > + struct mg_str user_name; > + struct mg_str password; > +}; > + > +struct mg_mqtt_topic_expression { > + const char *topic; > + uint8_t qos; > +}; > + > +struct mg_send_mqtt_handshake_opts { > + unsigned char flags; /* connection flags */ > + uint16_t keep_alive; > + const char *will_topic; > + const char *will_message; > + const char *user_name; > + const char *password; > +}; > + > +/* mg_mqtt_proto_data should be in header to allow external access to it */ > +struct mg_mqtt_proto_data { > + uint16_t keep_alive; > + double last_control_time; > +}; > + > +/* Message types */ > +#define MG_MQTT_CMD_CONNECT 1 > +#define MG_MQTT_CMD_CONNACK 2 > +#define MG_MQTT_CMD_PUBLISH 3 > +#define MG_MQTT_CMD_PUBACK 4 > +#define MG_MQTT_CMD_PUBREC 5 > +#define MG_MQTT_CMD_PUBREL 6 > +#define MG_MQTT_CMD_PUBCOMP 7 > +#define MG_MQTT_CMD_SUBSCRIBE 8 > +#define MG_MQTT_CMD_SUBACK 9 > +#define MG_MQTT_CMD_UNSUBSCRIBE 10 > +#define MG_MQTT_CMD_UNSUBACK 11 > +#define MG_MQTT_CMD_PINGREQ 12 > +#define MG_MQTT_CMD_PINGRESP 13 > +#define MG_MQTT_CMD_DISCONNECT 14 > + > +/* MQTT event types */ > +#define MG_MQTT_EVENT_BASE 200 > +#define MG_EV_MQTT_CONNECT (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_CONNECT) > +#define MG_EV_MQTT_CONNACK (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_CONNACK) > +#define MG_EV_MQTT_PUBLISH (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PUBLISH) > +#define MG_EV_MQTT_PUBACK (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PUBACK) > +#define MG_EV_MQTT_PUBREC (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PUBREC) > +#define MG_EV_MQTT_PUBREL (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PUBREL) > +#define MG_EV_MQTT_PUBCOMP (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PUBCOMP) > +#define MG_EV_MQTT_SUBSCRIBE (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_SUBSCRIBE) > +#define MG_EV_MQTT_SUBACK (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_SUBACK) > +#define MG_EV_MQTT_UNSUBSCRIBE (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_UNSUBSCRIBE) > +#define MG_EV_MQTT_UNSUBACK (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_UNSUBACK) > +#define MG_EV_MQTT_PINGREQ (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PINGREQ) > +#define MG_EV_MQTT_PINGRESP (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PINGRESP) > +#define MG_EV_MQTT_DISCONNECT (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_DISCONNECT) > + > +/* Message flags */ > +#define MG_MQTT_RETAIN 0x1 > +#define MG_MQTT_DUP 0x4 > +#define MG_MQTT_QOS(qos) ((qos) << 1) > +#define MG_MQTT_GET_QOS(flags) (((flags) &0x6) >> 1) > +#define MG_MQTT_SET_QOS(flags, qos) (flags) = ((flags) & ~0x6) | ((qos) << 1) > + > +/* Connection flags */ > +#define MG_MQTT_CLEAN_SESSION 0x02 > +#define MG_MQTT_HAS_WILL 0x04 > +#define MG_MQTT_WILL_RETAIN 0x20 > +#define MG_MQTT_HAS_PASSWORD 0x40 > +#define MG_MQTT_HAS_USER_NAME 0x80 > +#define MG_MQTT_GET_WILL_QOS(flags) (((flags) &0x18) >> 3) > +#define MG_MQTT_SET_WILL_QOS(flags, qos) \ > + (flags) = ((flags) & ~0x18) | ((qos) << 3) > + > +/* CONNACK return codes */ > +#define MG_EV_MQTT_CONNACK_ACCEPTED 0 > +#define MG_EV_MQTT_CONNACK_UNACCEPTABLE_VERSION 1 > +#define MG_EV_MQTT_CONNACK_IDENTIFIER_REJECTED 2 > +#define MG_EV_MQTT_CONNACK_SERVER_UNAVAILABLE 3 > +#define MG_EV_MQTT_CONNACK_BAD_AUTH 4 > +#define MG_EV_MQTT_CONNACK_NOT_AUTHORIZED 5 > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +/* > + * Attaches a built-in MQTT event handler to the given connection. > + * > + * The user-defined event handler will receive following extra events: > + * > + * - MG_EV_MQTT_CONNACK > + * - MG_EV_MQTT_PUBLISH > + * - MG_EV_MQTT_PUBACK > + * - MG_EV_MQTT_PUBREC > + * - MG_EV_MQTT_PUBREL > + * - MG_EV_MQTT_PUBCOMP > + * - MG_EV_MQTT_SUBACK > + */ > +void mg_set_protocol_mqtt(struct mg_connection *nc); > + > +/* Sends an MQTT handshake. */ > +void mg_send_mqtt_handshake(struct mg_connection *nc, const char *client_id); > + > +/* Sends an MQTT handshake with optional parameters. */ > +void mg_send_mqtt_handshake_opt(struct mg_connection *nc, const char *client_id, > + struct mg_send_mqtt_handshake_opts); > + > +/* Publishes a message to a given topic. */ > +void mg_mqtt_publish(struct mg_connection *nc, const char *topic, > + uint16_t message_id, int flags, const void *data, > + size_t len); > + > +/* Subscribes to a bunch of topics. */ > +void mg_mqtt_subscribe(struct mg_connection *nc, > + const struct mg_mqtt_topic_expression *topics, > + size_t topics_len, uint16_t message_id); > + > +/* Unsubscribes from a bunch of topics. */ > +void mg_mqtt_unsubscribe(struct mg_connection *nc, char **topics, > + size_t topics_len, uint16_t message_id); > + > +/* Sends a DISCONNECT command. */ > +void mg_mqtt_disconnect(struct mg_connection *nc); > + > +/* Sends a CONNACK command with a given `return_code`. */ > +void mg_mqtt_connack(struct mg_connection *nc, uint8_t return_code); > + > +/* Sends a PUBACK command with a given `message_id`. */ > +void mg_mqtt_puback(struct mg_connection *nc, uint16_t message_id); > + > +/* Sends a PUBREC command with a given `message_id`. */ > +void mg_mqtt_pubrec(struct mg_connection *nc, uint16_t message_id); > + > +/* Sends a PUBREL command with a given `message_id`. */ > +void mg_mqtt_pubrel(struct mg_connection *nc, uint16_t message_id); > + > +/* Sends a PUBCOMP command with a given `message_id`. */ > +void mg_mqtt_pubcomp(struct mg_connection *nc, uint16_t message_id); > + > +/* > + * Sends a SUBACK command with a given `message_id` > + * and a sequence of granted QoSs. > + */ > +void mg_mqtt_suback(struct mg_connection *nc, uint8_t *qoss, size_t qoss_len, > + uint16_t message_id); > + > +/* Sends a UNSUBACK command with a given `message_id`. */ > +void mg_mqtt_unsuback(struct mg_connection *nc, uint16_t message_id); > + > +/* Sends a PINGREQ command. */ > +void mg_mqtt_ping(struct mg_connection *nc); > + > +/* Sends a PINGRESP command. */ > +void mg_mqtt_pong(struct mg_connection *nc); > + > +/* > + * Extracts the next topic expression from a SUBSCRIBE command payload. > + * > + * The topic expression name will point to a string in the payload buffer. > + * Returns the pos of the next topic expression or -1 when the list > + * of topics is exhausted. > + */ > +int mg_mqtt_next_subscribe_topic(struct mg_mqtt_message *msg, > + struct mg_str *topic, uint8_t *qos, int pos); > + > +/* > + * Matches a topic against a topic expression > + * > + * Returns 1 if it matches; 0 otherwise. > + */ > +int mg_mqtt_match_topic_expression(struct mg_str exp, struct mg_str topic); > + > +/* > + * Same as `mg_mqtt_match_topic_expression()`, but takes `exp` as a > + * NULL-terminated string. > + */ > +int mg_mqtt_vmatch_topic_expression(const char *exp, struct mg_str topic); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* CS_MONGOOSE_SRC_MQTT_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/mqtt_server.h" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + * This software is dual-licensed: you can redistribute it and/or modify > + * it under the terms of the GNU General Public License version 2 as > + * published by the Free Software Foundation. For the terms of this > + * license, see <http://www.gnu.org/licenses/>. > + * > + * You are free to use this software under the terms of the GNU General > + * Public License, but WITHOUT ANY WARRANTY; without even the implied > + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. > + * See the GNU General Public License for more details. > + * > + * Alternatively, you can license this software under a commercial > + * license, as set out in <https://www.cesanta.com/license>. > + */ > + > +/* > + * === MQTT Server API reference > + */ > + > +#ifndef CS_MONGOOSE_SRC_MQTT_BROKER_H_ > +#define CS_MONGOOSE_SRC_MQTT_BROKER_H_ > + > +#if MG_ENABLE_MQTT_BROKER > + > +/* Amalgamated: #include "common/queue.h" */ > +/* Amalgamated: #include "mongoose/src/mqtt.h" */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +#ifndef MG_MQTT_MAX_SESSION_SUBSCRIPTIONS > +#define MG_MQTT_MAX_SESSION_SUBSCRIPTIONS 512 > +#endif > + > +struct mg_mqtt_broker; > + > +/* MQTT session (Broker side). */ > +struct mg_mqtt_session { > + struct mg_mqtt_broker *brk; /* Broker */ > + LIST_ENTRY(mg_mqtt_session) link; /* mg_mqtt_broker::sessions linkage */ > + struct mg_connection *nc; /* Connection with the client */ > + size_t num_subscriptions; /* Size of `subscriptions` array */ > + void *user_data; /* User data */ > + struct mg_mqtt_topic_expression *subscriptions; > +}; > + > +/* MQTT broker. */ > +struct mg_mqtt_broker { > + LIST_HEAD(_mg_sesshead, mg_mqtt_session) sessions; /* Session list */ > + void *user_data; /* User data */ > +}; > + > +/* Initialises a MQTT broker. */ > +void mg_mqtt_broker_init(struct mg_mqtt_broker *brk, void *user_data); > + > +/* > + * Processes a MQTT broker message. > + * > + * The listening connection expects a pointer to an initialised > + * `mg_mqtt_broker` structure in the `user_data` field. > + * > + * Basic usage: > + * > + * ```c > + * mg_mqtt_broker_init(&brk, NULL); > + * > + * if ((nc = mg_bind(&mgr, address, mg_mqtt_broker)) == NULL) { > + * // fail; > + * } > + * nc->user_data = &brk; > + * ``` > + * > + * New incoming connections will receive a `mg_mqtt_session` structure > + * in the connection `user_data`. The original `user_data` will be stored > + * in the `user_data` field of the session structure. This allows the user > + * handler to store user data before `mg_mqtt_broker` creates the session. > + * > + * Since only the MG_EV_ACCEPT message is processed by the listening socket, > + * for most events the `user_data` will thus point to a `mg_mqtt_session`. > + */ > +void mg_mqtt_broker(struct mg_connection *brk, int ev, void *data); > + > +/* > + * Iterates over all MQTT session connections. Example: > + * > + * ```c > + * struct mg_mqtt_session *s; > + * for (s = mg_mqtt_next(brk, NULL); s != NULL; s = mg_mqtt_next(brk, s)) { > + * // Do something > + * } > + * ``` > + */ > +struct mg_mqtt_session *mg_mqtt_next(struct mg_mqtt_broker *brk, > + struct mg_mqtt_session *s); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* MG_ENABLE_MQTT_BROKER */ > +#endif /* CS_MONGOOSE_SRC_MQTT_BROKER_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/dns.h" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +/* > + * === DNS API reference > + */ > + > +#ifndef CS_MONGOOSE_SRC_DNS_H_ > +#define CS_MONGOOSE_SRC_DNS_H_ > + > +/* Amalgamated: #include "mongoose/src/net.h" */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +#define MG_DNS_A_RECORD 0x01 /* Lookup IP address */ > +#define MG_DNS_CNAME_RECORD 0x05 /* Lookup CNAME */ > +#define MG_DNS_PTR_RECORD 0x0c /* Lookup PTR */ > +#define MG_DNS_TXT_RECORD 0x10 /* Lookup TXT */ > +#define MG_DNS_AAAA_RECORD 0x1c /* Lookup IPv6 address */ > +#define MG_DNS_SRV_RECORD 0x21 /* Lookup SRV */ > +#define MG_DNS_MX_RECORD 0x0f /* Lookup mail server for domain */ > +#define MG_DNS_ANY_RECORD 0xff > +#define MG_DNS_NSEC_RECORD 0x2f > + > +#define MG_MAX_DNS_QUESTIONS 32 > +#define MG_MAX_DNS_ANSWERS 32 > + > +#define MG_DNS_MESSAGE 100 /* High-level DNS message event */ > + > +enum mg_dns_resource_record_kind { > + MG_DNS_INVALID_RECORD = 0, > + MG_DNS_QUESTION, > + MG_DNS_ANSWER > +}; > + > +/* DNS resource record. */ > +struct mg_dns_resource_record { > + struct mg_str name; /* buffer with compressed name */ > + int rtype; > + int rclass; > + int ttl; > + enum mg_dns_resource_record_kind kind; > + struct mg_str rdata; /* protocol data (can be a compressed name) */ > +}; > + > +/* DNS message (request and response). */ > +struct mg_dns_message { > + struct mg_str pkt; /* packet body */ > + uint16_t flags; > + uint16_t transaction_id; > + int num_questions; > + int num_answers; > + struct mg_dns_resource_record questions[MG_MAX_DNS_QUESTIONS]; > + struct mg_dns_resource_record answers[MG_MAX_DNS_ANSWERS]; > +}; > + > +struct mg_dns_resource_record *mg_dns_next_record( > + struct mg_dns_message *msg, int query, struct mg_dns_resource_record *prev); > + > +/* > + * Parses the record data from a DNS resource record. > + * > + * - A: struct in_addr *ina > + * - AAAA: struct in6_addr *ina > + * - CNAME: char buffer > + * > + * Returns -1 on error. > + * > + * TODO(mkm): MX > + */ > +int mg_dns_parse_record_data(struct mg_dns_message *msg, > + struct mg_dns_resource_record *rr, void *data, > + size_t data_len); > + > +/* > + * Sends a DNS query to the remote end. > + */ > +void mg_send_dns_query(struct mg_connection *nc, const char *name, > + int query_type); > + > +/* > + * Inserts a DNS header to an IO buffer. > + * > + * Returns the number of bytes inserted. > + */ > +int mg_dns_insert_header(struct mbuf *io, size_t pos, > + struct mg_dns_message *msg); > + > +/* > + * Appends already encoded questions from an existing message. > + * > + * This is useful when generating a DNS reply message which includes > + * all question records. > + * > + * Returns the number of appended bytes. > + */ > +int mg_dns_copy_questions(struct mbuf *io, struct mg_dns_message *msg); > + > +/* > + * Encodes and appends a DNS resource record to an IO buffer. > + * > + * The record metadata is taken from the `rr` parameter, while the name and data > + * are taken from the parameters, encoded in the appropriate format depending on > + * record type and stored in the IO buffer. The encoded values might contain > + * offsets within the IO buffer. It's thus important that the IO buffer doesn't > + * get trimmed while a sequence of records are encoded while preparing a DNS > + * reply. > + * > + * This function doesn't update the `name` and `rdata` pointers in the `rr` > + * struct because they might be invalidated as soon as the IO buffer grows > + * again. > + * > + * Returns the number of bytes appended or -1 in case of error. > + */ > +int mg_dns_encode_record(struct mbuf *io, struct mg_dns_resource_record *rr, > + const char *name, size_t nlen, const void *rdata, > + size_t rlen); > + > +/* > + * Encodes a DNS name. > + */ > +int mg_dns_encode_name(struct mbuf *io, const char *name, size_t len); > + > +/* Low-level: parses a DNS response. */ > +int mg_parse_dns(const char *buf, int len, struct mg_dns_message *msg); > + > +/* > + * Uncompresses a DNS compressed name. > + * > + * The containing DNS message is required because of the compressed encoding > + * and reference suffixes present elsewhere in the packet. > + * > + * If the name is less than `dst_len` characters long, the remainder > + * of `dst` is terminated with `\0` characters. Otherwise, `dst` is not > + * terminated. > + * > + * If `dst_len` is 0 `dst` can be NULL. > + * Returns the uncompressed name length. > + */ > +size_t mg_dns_uncompress_name(struct mg_dns_message *msg, struct mg_str *name, > + char *dst, int dst_len); > + > +/* > + * Attaches a built-in DNS event handler to the given listening connection. > + * > + * The DNS event handler parses the incoming UDP packets, treating them as DNS > + * requests. If an incoming packet gets successfully parsed by the DNS event > + * handler, a user event handler will receive an `MG_DNS_REQUEST` event, with > + * `ev_data` pointing to the parsed `struct mg_dns_message`. > + * > + * See > + * [captive_dns_server](https://github.com/cesanta/mongoose/tree/master/examples/captive_dns_server) > + * example on how to handle DNS request and send DNS reply. > + */ > +void mg_set_protocol_dns(struct mg_connection *nc); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > +#endif /* CS_MONGOOSE_SRC_DNS_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/dns_server.h" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +/* > + * === DNS server API reference > + * > + * Disabled by default; enable with `-DMG_ENABLE_DNS_SERVER`. > + */ > + > +#ifndef CS_MONGOOSE_SRC_DNS_SERVER_H_ > +#define CS_MONGOOSE_SRC_DNS_SERVER_H_ > + > +#if MG_ENABLE_DNS_SERVER > + > +/* Amalgamated: #include "mongoose/src/dns.h" */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +#define MG_DNS_SERVER_DEFAULT_TTL 3600 > + > +struct mg_dns_reply { > + struct mg_dns_message *msg; > + struct mbuf *io; > + size_t start; > +}; > + > +/* > + * Creates a DNS reply. > + * > + * The reply will be based on an existing query message `msg`. > + * The query body will be appended to the output buffer. > + * "reply + recursion allowed" will be added to the message flags and the > + * message's num_answers will be set to 0. > + * > + * Answer records can be appended with `mg_dns_send_reply` or by lower > + * level function defined in the DNS API. > + * > + * In order to send a reply use `mg_dns_send_reply`. > + * It's possible to use a connection's send buffer as reply buffer, > + * and it will work for both UDP and TCP connections. > + * > + * Example: > + * > + * ```c > + * reply = mg_dns_create_reply(&nc->send_mbuf, msg); > + * for (i = 0; i < msg->num_questions; i++) { > + * rr = &msg->questions[i]; > + * if (rr->rtype == MG_DNS_A_RECORD) { > + * mg_dns_reply_record(&reply, rr, 3600, &dummy_ip_addr, 4); > + * } > + * } > + * mg_dns_send_reply(nc, &reply); > + * ``` > + */ > +struct mg_dns_reply mg_dns_create_reply(struct mbuf *io, > + struct mg_dns_message *msg); > + > +/* > + * Appends a DNS reply record to the IO buffer and to the DNS message. > + * > + * The message's num_answers field will be incremented. It's the caller's duty > + * to ensure num_answers is properly initialised. > + * > + * Returns -1 on error. > + */ > +int mg_dns_reply_record(struct mg_dns_reply *reply, > + struct mg_dns_resource_record *question, > + const char *name, int rtype, int ttl, const void *rdata, > + size_t rdata_len); > + > +/* > + * Sends a DNS reply through a connection. > + * > + * The DNS data is stored in an IO buffer pointed by reply structure in `r`. > + * This function mutates the content of that buffer in order to ensure that > + * the DNS header reflects the size and flags of the message, that might have > + * been updated either with `mg_dns_reply_record` or by direct manipulation of > + * `r->message`. > + * > + * Once sent, the IO buffer will be trimmed unless the reply IO buffer > + * is the connection's send buffer and the connection is not in UDP mode. > + */ > +void mg_dns_send_reply(struct mg_connection *nc, struct mg_dns_reply *r); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* MG_ENABLE_DNS_SERVER */ > +#endif /* CS_MONGOOSE_SRC_DNS_SERVER_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/resolv.h" > +#endif > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > + > +/* > + * === API reference > + */ > + > +#ifndef CS_MONGOOSE_SRC_RESOLV_H_ > +#define CS_MONGOOSE_SRC_RESOLV_H_ > + > +/* Amalgamated: #include "mongoose/src/dns.h" */ > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +enum mg_resolve_err { > + MG_RESOLVE_OK = 0, > + MG_RESOLVE_NO_ANSWERS = 1, > + MG_RESOLVE_EXCEEDED_RETRY_COUNT = 2, > + MG_RESOLVE_TIMEOUT = 3 > +}; > + > +typedef void (*mg_resolve_callback_t)(struct mg_dns_message *dns_message, > + void *user_data, enum mg_resolve_err); > + > +/* Options for `mg_resolve_async_opt`. */ > +struct mg_resolve_async_opts { > + const char *nameserver; > + int max_retries; /* defaults to 2 if zero */ > + int timeout; /* in seconds; defaults to 5 if zero */ > + int accept_literal; /* pseudo-resolve literal ipv4 and ipv6 addrs */ > + int only_literal; /* only resolves literal addrs; sync cb invocation */ > + struct mg_connection **dns_conn; /* return DNS connection */ > +}; > + > +/* See `mg_resolve_async_opt()` */ > +int mg_resolve_async(struct mg_mgr *mgr, const char *name, int query, > + mg_resolve_callback_t cb, void *data); > + > +/* Set default DNS server */ > +void mg_set_nameserver(struct mg_mgr *mgr, const char *nameserver); > + > +/* > + * Resolved a DNS name asynchronously. > + * > + * Upon successful resolution, the user callback will be invoked > + * with the full DNS response message and a pointer to the user's > + * context `data`. > + * > + * In case of timeout while performing the resolution the callback > + * will receive a NULL `msg`. > + * > + * The DNS answers can be extracted with `mg_next_record` and > + * `mg_dns_parse_record_data`: > + * > + * [source,c] > + * ---- > + * struct in_addr ina; > + * struct mg_dns_resource_record *rr = mg_next_record(msg, MG_DNS_A_RECORD, > + * NULL); > + * mg_dns_parse_record_data(msg, rr, &ina, sizeof(ina)); > + * ---- > + */ > +int mg_resolve_async_opt(struct mg_mgr *mgr, const char *name, int query, > + mg_resolve_callback_t cb, void *data, > + struct mg_resolve_async_opts opts); > + > +/* > + * Resolve a name from `/etc/hosts`. > + * > + * Returns 0 on success, -1 on failure. > + */ > +int mg_resolve_from_hosts_file(const char *host, union socket_address *usa); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > +#endif /* CS_MONGOOSE_SRC_RESOLV_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/coap.h" > +#endif > +/* > + * Copyright (c) 2015 Cesanta Software Limited > + * All rights reserved > + * This software is dual-licensed: you can redistribute it and/or modify > + * it under the terms of the GNU General Public License version 2 as > + * published by the Free Software Foundation. For the terms of this > + * license, see <http://www.gnu.org/licenses/>. > + * > + * You are free to use this software under the terms of the GNU General > + * Public License, but WITHOUT ANY WARRANTY; without even the implied > + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. > + * See the GNU General Public License for more details. > + * > + * Alternatively, you can license this software under a commercial > + * license, as set out in <https://www.cesanta.com/license>. > + */ > + > +/* > + * === CoAP API reference > + * > + * CoAP message format: > + * > + * ``` > + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- > + * |Ver| T | TKL | Code | Message ID | Token (if any, TKL bytes) ... > + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- > + * | Options (if any) ... |1 1 1 1 1 1 1 1| Payload (if any) ... > + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- > + * ``` > + */ > + > +#ifndef CS_MONGOOSE_SRC_COAP_H_ > +#define CS_MONGOOSE_SRC_COAP_H_ > + > +#if MG_ENABLE_COAP > + > +#define MG_COAP_MSG_TYPE_FIELD 0x2 > +#define MG_COAP_CODE_CLASS_FIELD 0x4 > +#define MG_COAP_CODE_DETAIL_FIELD 0x8 > +#define MG_COAP_MSG_ID_FIELD 0x10 > +#define MG_COAP_TOKEN_FIELD 0x20 > +#define MG_COAP_OPTIOMG_FIELD 0x40 > +#define MG_COAP_PAYLOAD_FIELD 0x80 > + > +#define MG_COAP_ERROR 0x10000 > +#define MG_COAP_FORMAT_ERROR (MG_COAP_ERROR | 0x20000) > +#define MG_COAP_IGNORE (MG_COAP_ERROR | 0x40000) > +#define MG_COAP_NOT_ENOUGH_DATA (MG_COAP_ERROR | 0x80000) > +#define MG_COAP_NETWORK_ERROR (MG_COAP_ERROR | 0x100000) > + > +#define MG_COAP_MSG_CON 0 > +#define MG_COAP_MSG_NOC 1 > +#define MG_COAP_MSG_ACK 2 > +#define MG_COAP_MSG_RST 3 > +#define MG_COAP_MSG_MAX 3 > + > +#define MG_COAP_CODECLASS_REQUEST 0 > +#define MG_COAP_CODECLASS_RESP_OK 2 > +#define MG_COAP_CODECLASS_CLIENT_ERR 4 > +#define MG_COAP_CODECLASS_SRV_ERR 5 > + > +#define MG_COAP_EVENT_BASE 300 > +#define MG_EV_COAP_CON (MG_COAP_EVENT_BASE + MG_COAP_MSG_CON) > +#define MG_EV_COAP_NOC (MG_COAP_EVENT_BASE + MG_COAP_MSG_NOC) > +#define MG_EV_COAP_ACK (MG_COAP_EVENT_BASE + MG_COAP_MSG_ACK) > +#define MG_EV_COAP_RST (MG_COAP_EVENT_BASE + MG_COAP_MSG_RST) > + > +/* > + * CoAP options. > + * Use mg_coap_add_option and mg_coap_free_options > + * for creation and destruction. > + */ > +struct mg_coap_option { > + struct mg_coap_option *next; > + uint32_t number; > + struct mg_str value; > +}; > + > +/* CoAP message. See RFC 7252 for details. */ > +struct mg_coap_message { > + uint32_t flags; > + uint8_t msg_type; > + uint8_t code_class; > + uint8_t code_detail; > + uint16_t msg_id; > + struct mg_str token; > + struct mg_coap_option *options; > + struct mg_str payload; > + struct mg_coap_option *optiomg_tail; > +}; > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +/* Sets CoAP protocol handler - triggers CoAP specific events. */ > +int mg_set_protocol_coap(struct mg_connection *nc); > + > +/* > + * Adds a new option to mg_coap_message structure. > + * Returns pointer to the newly created option. > + * Note: options must be freed by using mg_coap_free_options > + */ > +struct mg_coap_option *mg_coap_add_option(struct mg_coap_message *cm, > + uint32_t number, char *value, > + size_t len); > + > +/* > + * Frees the memory allocated for options. > + * If the cm parameter doesn't contain any option it does nothing. > + */ > +void mg_coap_free_options(struct mg_coap_message *cm); > + > +/* > + * Composes a CoAP message from `mg_coap_message` > + * and sends it into `nc` connection. > + * Returns 0 on success. On error, it is a bitmask: > + * > + * - `#define MG_COAP_ERROR 0x10000` > + * - `#define MG_COAP_FORMAT_ERROR (MG_COAP_ERROR | 0x20000)` > + * - `#define MG_COAP_IGNORE (MG_COAP_ERROR | 0x40000)` > + * - `#define MG_COAP_NOT_ENOUGH_DATA (MG_COAP_ERROR | 0x80000)` > + * - `#define MG_COAP_NETWORK_ERROR (MG_COAP_ERROR | 0x100000)` > + */ > +uint32_t mg_coap_send_message(struct mg_connection *nc, > + struct mg_coap_message *cm); > + > +/* > + * Composes CoAP acknowledgement from `mg_coap_message` > + * and sends it into `nc` connection. > + * Return value: see `mg_coap_send_message()` > + */ > +uint32_t mg_coap_send_ack(struct mg_connection *nc, uint16_t msg_id); > + > +/* > + * Parses CoAP message and fills mg_coap_message and returns cm->flags. > + * This is a helper function. > + * > + * NOTE: usually CoAP works over UDP, so lack of data means format error. > + * But, in theory, it is possible to use CoAP over TCP (according to RFC) > + * > + * The caller has to check results and treat COAP_NOT_ENOUGH_DATA according to > + * underlying protocol: > + * > + * - in case of UDP COAP_NOT_ENOUGH_DATA means COAP_FORMAT_ERROR, > + * - in case of TCP client can try to receive more data > + * > + * Return value: see `mg_coap_send_message()` > + */ > +uint32_t mg_coap_parse(struct mbuf *io, struct mg_coap_message *cm); > + > +/* > + * Composes CoAP message from mg_coap_message structure. > + * This is a helper function. > + * Return value: see `mg_coap_send_message()` > + */ > +uint32_t mg_coap_compose(struct mg_coap_message *cm, struct mbuf *io); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif /* MG_ENABLE_COAP */ > + > +#endif /* CS_MONGOOSE_SRC_COAP_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/sntp.h" > +#endif > +/* > + * Copyright (c) 2016 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_MONGOOSE_SRC_SNTP_H_ > +#define CS_MONGOOSE_SRC_SNTP_H_ > + > +#if MG_ENABLE_SNTP > + > +#define MG_SNTP_EVENT_BASE 500 > + > +/* > + * Received reply from time server. Event handler parameter contains > + * pointer to mg_sntp_message structure > + */ > +#define MG_SNTP_REPLY (MG_SNTP_EVENT_BASE + 1) > + > +/* Received malformed SNTP packet */ > +#define MG_SNTP_MALFORMED_REPLY (MG_SNTP_EVENT_BASE + 2) > + > +/* Failed to get time from server (timeout etc) */ > +#define MG_SNTP_FAILED (MG_SNTP_EVENT_BASE + 3) > + > +struct mg_sntp_message { > + /* if server sends this flags, user should not send requests to it */ > + int kiss_of_death; > + /* usual mg_time */ > + double time; > +}; > + > +/* Establishes connection to given sntp server */ > +struct mg_connection *mg_sntp_connect(struct mg_mgr *mgr, > + MG_CB(mg_event_handler_t event_handler, > + void *user_data), > + const char *sntp_server_name); > + > +/* Sends time request to given connection */ > +void mg_sntp_send_request(struct mg_connection *c); > + > +/* > + * Helper function > + * Establishes connection to time server, tries to send request > + * repeats sending SNTP_ATTEMPTS times every SNTP_TIMEOUT sec > + * (if needed) > + * See sntp_client example > + */ > +struct mg_connection *mg_sntp_get_time(struct mg_mgr *mgr, > + mg_event_handler_t event_handler, > + const char *sntp_server_name); > + > +#endif > + > +#endif /* CS_MONGOOSE_SRC_SNTP_H_ */ > +#ifdef MG_MODULE_LINES > +#line 1 "mongoose/src/socks.h" > +#endif > +/* > + * Copyright (c) 2017 Cesanta Software Limited > + * All rights reserved > + */ > + > +#ifndef CS_MONGOOSE_SRC_SOCKS_H_ > +#define CS_MONGOOSE_SRC_SOCKS_H_ > + > +#if MG_ENABLE_SOCKS > + > +#define MG_SOCKS_VERSION 5 > + > +#define MG_SOCKS_HANDSHAKE_DONE MG_F_USER_1 > +#define MG_SOCKS_CONNECT_DONE MG_F_USER_2 > + > +/* SOCKS5 handshake methods */ > +enum mg_socks_handshake_method { > + MG_SOCKS_HANDSHAKE_NOAUTH = 0, /* Handshake method - no authentication */ > + MG_SOCKS_HANDSHAKE_GSSAPI = 1, /* Handshake method - GSSAPI auth */ > + MG_SOCKS_HANDSHAKE_USERPASS = 2, /* Handshake method - user/password auth */ > + MG_SOCKS_HANDSHAKE_FAILURE = 0xff, /* Handshake method - failure */ > +}; > + > +/* SOCKS5 commands */ > +enum mg_socks_command { > + MG_SOCKS_CMD_CONNECT = 1, /* Command: CONNECT */ > + MG_SOCKS_CMD_BIND = 2, /* Command: BIND */ > + MG_SOCKS_CMD_UDP_ASSOCIATE = 3, /* Command: UDP ASSOCIATE */ > +}; > + > +/* SOCKS5 address types */ > +enum mg_socks_address_type { > + MG_SOCKS_ADDR_IPV4 = 1, /* Address type: IPv4 */ > + MG_SOCKS_ADDR_DOMAIN = 3, /* Address type: Domain name */ > + MG_SOCKS_ADDR_IPV6 = 4, /* Address type: IPv6 */ > +}; > + > +/* SOCKS5 response codes */ > +enum mg_socks_response { > + MG_SOCKS_SUCCESS = 0, /* Response: success */ > + MG_SOCKS_FAILURE = 1, /* Response: failure */ > + MG_SOCKS_NOT_ALLOWED = 2, /* Response: connection not allowed */ > + MG_SOCKS_NET_UNREACHABLE = 3, /* Response: network unreachable */ > + MG_SOCKS_HOST_UNREACHABLE = 4, /* Response: network unreachable */ > + MG_SOCKS_CONN_REFUSED = 5, /* Response: network unreachable */ > + MG_SOCKS_TTL_EXPIRED = 6, /* Response: network unreachable */ > + MG_SOCKS_CMD_NOT_SUPPORTED = 7, /* Response: network unreachable */ > + MG_SOCKS_ADDR_NOT_SUPPORTED = 8, /* Response: network unreachable */ > +}; > + > +#ifdef __cplusplus > +extern "C" { > +#endif /* __cplusplus */ > + > +/* Turn the connection into the SOCKS server */ > +void mg_set_protocol_socks(struct mg_connection *c); > + > +/* Create socks tunnel for the client connection */ > +struct mg_iface *mg_socks_mk_iface(struct mg_mgr *, const char *proxy_addr); > + > +#ifdef __cplusplus > +} > +#endif /* __cplusplus */ > + > +#endif > +#endif > diff --git a/mongoose/mongoose_interface.c b/mongoose/mongoose_interface.c > index 53b9937..929a689 100644 > --- a/mongoose/mongoose_interface.c > +++ b/mongoose/mongoose_interface.c > @@ -1,4 +1,7 @@ > // > +// Copyright (C) 2017 Weidmüller Interface GmbH & Co. KG > +// Stefan Herbrechtsmeier <stefan.herbrechtsmeier@weidmueller.com> > +// > // (C) Copyright 2013 > // Stefano Babic, DENX Software Engineering, sbabic@denx.de. > // > @@ -24,307 +27,196 @@ > > #define _XOPEN_SOURCE 600 // For PATH_MAX on linux > > -#include <sys/stat.h> > +#include <stddef.h> > #include <stdio.h> > #include <stdlib.h> > -#include <signal.h> > -#include <string.h> > -#include <errno.h> > -#include <limits.h> > -#include <stddef.h> > -#include <stdarg.h> > - > #include <string.h> > - > -#include <ctype.h> > -#include <sys/wait.h> > #include <unistd.h> > -#include <assert.h> > > -#include "mongoose.h" > -#include "mongoose_interface.h" > -#include "network_ipc.h" > -#include "parselib.h" > -#include "util.h" > -#include "swupdate_settings.h" > - > -#ifdef USE_LUA > -#include <lua.h> > -#include <lauxlib.h> > -#endif > - > -#define DIRSEP '/' > -#define MAX_CONF_FILE_LINE_SIZE (8 * 1024) > -#define BUF_LEN 8192 > - > -static char server_name[40]; // Set by init_server_name() > -static struct mg_context *ctx; // Set by start_mongoose() > - > -#if !defined(CONFIG_FILE) > -#define CONFIG_FILE "mongoose.conf" > -#endif /* !CONFIG_FILE */ > - > -static void upload_handler(struct mg_connection *conn, > - const char __attribute__ ((__unused__)) *path) { > - mg_printf(conn, "%s", "HTTP/1.1 200 OK\r\n\r\n"); > - mg_printf(conn, "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Transitional//EN\"\n" > - "\"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd\">\n" > - "<html xmlns=\"http://www.w3.org/1999/xhtml\">"); > - mg_printf(conn, "<head><meta http-equiv=\"refresh\" content=\"0; url=./update.html\" />" > - "</head></html>"); > -} > +#include <getopt.h> > > -static void die(const char *fmt, ...) { > - va_list ap; > - char msg[200]; > +#include <network_ipc.h> > +#include <mongoose_interface.h> > +#include <parselib.h> > +#include <progress_ipc.h> > +#include <swupdate_settings.h> > > - va_start(ap, fmt); > - vsnprintf(msg, sizeof(msg), fmt, ap); > - va_end(ap); > - > - fprintf(stderr, "%s\n", msg); > +#include "mongoose.h" > > - exit(EXIT_FAILURE); > +#define MG_LISTING "no" > +#define MG_PORT "8080" > +#define MG_ROOT "." > + > +struct mongoose_options { > + char *root; > + char *listing; > + char *port; > +#if MG_ENABLE_SSL > + char *ssl_cert; > + char *ssl_key; > +#endif > +}; > + > +struct file_upload_state { > + size_t len; > + int fd; > +}; > + > +static struct mg_serve_http_opts s_http_server_opts; > + > +#ifndef CONFIG_MONGOOSE_API_DEPRECATED > +#define enum_string(x) [x] = #x > +static const char *get_status_string(unsigned int status) { > + const char * const str[] = { > + enum_string(IDLE), > + enum_string(START), > + enum_string(RUN), > + enum_string(SUCCESS), > + enum_string(FAILURE), > + enum_string(DOWNLOAD), > + enum_string(DONE), > + enum_string(SUBPROCESS) > + }; > + > + if (status >= ARRAY_SIZE(str)) > + return "UNKNOWN"; > + > + return str[status]; > } > > -static void verify_document_root(const char *root) { > - const char *p, *path; > - char buf[PATH_MAX]; > - struct stat st; > +#define enum_source_string(x) [SOURCE_##x] = #x > +static const char *get_source_string(unsigned int source) { > + const char * const str[] = { > + enum_source_string(UNKNOWN), > + enum_source_string(WEBSERVER), > + enum_source_string(SURICATTA), > + enum_source_string(DOWNLOADER), > + enum_source_string(LOCAL) > + }; > > - path = root; > - if ((p = strchr(root, ',')) != NULL && (size_t) (p - root) < sizeof(buf)) { > - memcpy(buf, root, p - root); > - buf[p - root] = '\0'; > - path = buf; > - } > + if (source >= ARRAY_SIZE(str)) > + return "UNKNOWN"; > > - if (stat(path, &st) != 0 || !S_ISDIR(st.st_mode)) { > - die("Invalid root directory: [%s]: %s", root, strerror(errno)); > - } > + return str[source]; > } > +#endif > > -static void set_option(char **options, const char *name, const char *value) { > - int i; > +static void upload_handler(struct mg_connection *nc, int ev, void *p) { > + struct mg_http_multipart_part *mp; > + struct file_upload_state *fus; > +#ifdef CONFIG_MONGOOSE_API_DEPRECATED > + struct mg_str *filename, *data; > + struct http_message *hm; > + size_t length; > + char buf[16]; > + int fd; > +#endif > > - if (!strcmp(name, "document_root") || !(strcmp(name, "r"))) { > - verify_document_root(value); > - } > + switch (ev) { > +#ifdef CONFIG_MONGOOSE_API_DEPRECATED > + case MG_EV_HTTP_REQUEST: > + hm = (struct http_message *) p; > > - for (i = 0; i < MAX_OPTIONS - 3; i++) { > - if (options[i] == NULL) { > - options[i] = sdup(name); > - options[i + 1] = sdup(value); > - options[i + 2] = NULL; > - break; > + filename = mg_get_http_header(hm, "X_FILENAME"); > + if (filename == NULL) { > + mg_http_send_error(nc, 403, NULL); > + return; > } > - } > - > - if (i == MAX_OPTIONS - 3) { > - die("%s", "Too many options specified"); > - } > -} > - > -static int mongoose_settings(void *elem, void *data) > -{ > - char **options = (char **)data; > - const char **names = mg_get_valid_option_names(); > - int i; > - char tmp[128]; > > - for (i = 0; names[i] != NULL; i += 2) { > - tmp[0] = '\0'; > - GET_FIELD_STRING(LIBCFG_PARSER, elem, > - names[i], tmp); > - if (strlen(tmp)) { > - set_option(options, names[i], tmp); > - fprintf(stdout, "Setting %s --> %s\n", names[i], tmp); > + data = mg_get_http_header(hm, "Content-length"); > + if (data == NULL || data->len >= ARRAY_SIZE(buf)) { > + mg_http_send_error(nc, 403, NULL); > + return; > } > > - } > - > - return 0; > - > -} > - > -static void process_command_line_arguments(const char *filename, int argc, char *argv[], char **options) { > - size_t i, cmd_line_opts_start = 1; > + memcpy(buf, data->p, data->len); > + buf[data->len] = '\0'; > + length = strtoul(data->p, NULL, 10); > + if (length == 0) { > + mg_http_send_error(nc, 403, NULL); > + return; > + } > > - options[0] = NULL; > + fd = ipc_inst_start(); > + ipc_send_data(fd, (char *) hm->body.p, hm->body.len); > + ipc_end(fd); > > - if (filename) > - read_module_settings(filename, "webserver", mongoose_settings, options); > + mg_send_response_line(nc, 200, > + "Content-Type: text/plain\r\n" > + "Connection: close"); > + mg_send(nc, "\r\n", 2); > + mg_printf(nc, "Ok, %.*s - %d bytes.\r\n", (int) filename->len, filename->p, (int) length); > + nc->flags |= MG_F_SEND_AND_CLOSE; > > - if (!argc) > - return; > + break; > +#endif > + case MG_EV_HTTP_PART_BEGIN: > + mp = (struct mg_http_multipart_part *) p; > > - // Handle command line flags. > - // They override config file and default settings. > - for (i = cmd_line_opts_start; argv[i] != NULL && i < argc - 1; i += 2) { > - if (argv[i][0] != '-' || argv[i + 1] == NULL) { > - // show_usage_and_exit(); > + fus = (struct file_upload_state *) calloc(1, sizeof(*fus)); > + if (fus == NULL) { > + mg_http_send_error(nc, 500, "Out of memory"); > + break; > } > - set_option(options, &argv[i][1], argv[i + 1]); > - } > -} > > -static void init_server_name(void) { > - snprintf(server_name, sizeof(server_name), "Mongoose web server v. %s", > - mg_version()); > -} > + fus->fd = ipc_inst_start(); > + if (fus->fd < 0) { > + mg_http_send_error(nc, 500, "Failed to queue command"); > + free(fus); > + break; > + } > > -static int log_message(const struct mg_connection *conn, const char *message) { > - (void) conn; > - printf("%s\n", message); > - return 0; > -} > + mp->user_data = fus; > > -static int recovery_upload(struct mg_connection *conn) { > - const char *content_type_header, *boundary_start; > - char buf[BUF_LEN], path[PATH_MAX], fname[1024], boundary[100]; > - int bl = 0, n, i, j, headers_len = 0, boundary_len = 0, len = 0, num_uploaded_files = 0; > - int instfd; > - int file_length; > - int nbytes = 0; > - int XHTTPRequest = 0; > - > - // Request looks like this: > - // > - // POST /upload HTTP/1.1 > - // Host: 127.0.0.1:8080 > - // Content-Length: 244894 > - // Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryRVr > - // > - // ------WebKitFormBoundaryRVr > - // Content-Disposition: form-data; name="file"; filename="accum.png" > - // Content-Type: image/png > - // > - // <89>PNG > - // <PNG DATA> > - // ------WebKitFormBoundaryRVr > - > - fname[0] = '\0'; > - // Extract boundary string from the Content-Type header > - if ((content_type_header = mg_get_header(conn, "Content-Type")) == NULL || > - (boundary_start = mg_strcasestr(content_type_header, > - "boundary=")) == NULL || > - (sscanf(boundary_start, "boundary=\"%99[^\"]\"", boundary) == 0 && > - sscanf(boundary_start, "boundary=%99s", boundary) == 0) || > - boundary[0] == '\0') { > - > - if ((content_type_header = mg_get_header(conn, "X_FILENAME")) == NULL) > - return num_uploaded_files; > - strncpy(fname, content_type_header, sizeof(fname)); > - if ((content_type_header = mg_get_header(conn, "Content-length")) == NULL) > - return num_uploaded_files; > - file_length = strtoul(content_type_header, NULL, 10); > - printf("X_FILENAME: %s length: %d\n", fname, file_length); > - XHTTPRequest = 1; > - } > + break; > > - /* > - * if it is not a HTTPRequest(), get boundary to retrieve > - * position of the file and the filename > - */ > - if (!XHTTPRequest) { > - boundary_len = strlen(boundary); > - bl = boundary_len + 4; // \r\n--<boundary> > - > - // Pull in headers > - assert(len >= 0 && len <= (int) sizeof(buf)); > - while ((n = mg_read(conn, buf + len, sizeof(buf) - len)) > 0) { > - len += n; > - } > - if ((headers_len = get_request_len(buf, len)) <= 0) { > - //break; > - return num_uploaded_files; > - } > + case MG_EV_HTTP_PART_DATA: > + mp = (struct mg_http_multipart_part *) p; > + fus = (struct file_upload_state *) mp->user_data; > > - // Fetch file name. > - fname[0] = '\0'; > - for (i = j = 0; i < headers_len; i++) { > - if (buf[i] == '\r' && buf[i + 1] == '\n') { > - buf[i] = buf[i + 1] = '\0'; > - // TODO(lsm): don't expect filename to be the 3rd field, > - // parse the header properly instead. > - sscanf(&buf[j], "Content-Disposition: %*s %*s filename=\"%1023[^\"]", > - fname); > - j = i + 2; > - } > - } > - } else { > - while ((n = mg_read(conn, buf + len, sizeof(buf) - len)) > 0) { > - len += n; > - } > - } > + if (!fus) > + break; > > - // Give up if the headers are not what we expect > - if (fname[0] == '\0') { > - //break; > - return num_uploaded_files; > - } > + ipc_send_data(fus->fd, (char *) mp->data.p, mp->data.len); > + fus->len += mp->data.len; > > + break; > > - instfd = ipc_inst_start(); > - if (instfd < 0) { > - return num_uploaded_files; > - } > + case MG_EV_HTTP_PART_END: > + mp = (struct mg_http_multipart_part *) p; > + fus = (struct file_upload_state *) mp->user_data; > > - // Move data to the beginning of the buffer > - assert(len >= headers_len); > - memmove(buf, &buf[headers_len], len - headers_len); > - len -= headers_len; > - > - // Read POST data, write into file until boundary is found. > - n = 0; > - nbytes = len; > - do { > - len += n; > - nbytes+=n; > - if (!XHTTPRequest) { > - for (i = 0; i < len - bl; i++) { > - if (!memcmp(&buf[i], "\r\n--", 4) && > - !memcmp(&buf[i + 4], boundary, boundary_len)) { > - // Found boundary, that's the end of file data. > - > - ipc_send_data(instfd, buf, i); > - num_uploaded_files++; > - upload_handler(conn, path); > - > - memmove(buf, &buf[i + bl], len - (i + bl)); > - len -= i + bl; > - break; > - } > - } > - } else { > - if (nbytes >= file_length) { > - ipc_send_data(instfd, buf, len); > - num_uploaded_files++; > - upload_handler(conn, path); > - break; > - } > + if (!fus) > + break; > > - } > - if (len > bl) { > - ipc_send_data(instfd, buf, len - bl); > - memmove(buf, &buf[len - bl], bl); > - len = bl; > - } > - } while ((n = mg_read(conn, buf + len, sizeof(buf) - len)) > 0); > - ipc_end(instfd); > + ipc_end(fus->fd); > > - return num_uploaded_files; > + mg_send_response_line(nc, 200, > + "Content-Type: text/plain\r\n" > + "Connection: close"); > + mg_send(nc, "\r\n", 2); > + mg_printf(nc, "Ok, %s - %d bytes.\r\n", mp->file_name, (int) fus->len); > + nc->flags |= MG_F_SEND_AND_CLOSE; > + > + mp->user_data = NULL; > + free(fus); > + break; > + } > } > > -static void recovery_status(struct mg_connection *conn) { > +#ifdef CONFIG_MONGOOSE_API_DEPRECATED > +static void recovery_status(struct mg_connection *nc, int ev, void *ev_data) { > ipc_message ipc; > int ret; > char buf[4096]; > > + (void)ev; > + (void)ev_data; > + > ret = ipc_get_status(&ipc); > > if (ret) { > - mg_printf(conn, "%s", "HTTP/1.0 500 Internal Server Error\r\n\r\n"); > + mg_http_send_error(nc, 500, NULL); > return; > } > > @@ -338,53 +230,56 @@ static void recovery_status(struct mg_connection *conn) { > ipc.data.status.current, > strlen(ipc.data.status.desc) ? ipc.data.status.desc : "", > ipc.data.status.error, > - ipc.data.status.last_result > - ); > + ipc.data.status.last_result); > > - mg_printf(conn, > - "HTTP/1.1 200 OK\r\n" > + mg_send_head(nc, 200, strlen(buf), > "Cache: no-cache\r\n" > - "Content-Type: text/plain\r\n" > - "Content-Length: %u\r\n" > - "\r\n", (unsigned int)strlen(buf)); > - mg_write(conn, buf, strlen(buf)); > + "Content-Type: text/plain"); > + > + mg_send(nc, buf, strlen(buf)); > + > + nc->flags |= MG_F_SEND_AND_CLOSE; > } > > -static void reboot_target(struct mg_connection *conn) { > - const struct mg_request_info * reqInfo = mg_get_request_info(conn); > +static void reboot_target(struct mg_connection *nc, int ev, void *ev_data) { > + struct http_message *hm = (struct http_message *) ev_data; > int ret; > > - if(!strcmp(reqInfo->request_method,"POST")) { > - mg_printf(conn, > - "HTTP/1.1 200 OK\r\n" > - "Content-Type: text/plain\r\n" > - "\r\n" > - "Device will reboot now."); > - ret = system("reboot"); > + (void)ev; > + > + if(mg_vcasecmp(&hm->method, "POST") == 0) { > + ret = system("echo"); > if (ret) { > - mg_printf(conn, > - "HTTP/1.1 200 OK\r\n" > - "Content-Type: text/plain\r\n" > - "\r\n" > + mg_http_send_error(nc, 500, > "Device cannot be reboot, internal fault."); > + return; > } > + > + mg_http_send_error(nc, 200, "Device will reboot now."); > } > else { > - mg_printf(conn, > - "HTTP/1.1 200 OK\r\n" > + mg_send_response_line(nc, 200, > "Content-Type: text/html\r\n" > - "\r\n" > - "<form method='POST' action=''><input type='submit' value='Reboot'></form>"); > + "Connection: close"); > + mg_send(nc, "\r\n", 2); > + mg_printf(nc, > + "<form method='POST' action=''>" > + "<input type='submit' value='Reboot'>" > + "</form>"); > + nc->flags |= MG_F_SEND_AND_CLOSE; > } > } > > -static void post_update_cmd(struct mg_connection *conn) { > +static void post_update_cmd(struct mg_connection *nc, int ev, void *ev_data) { > ipc_message msg; > + > + (void)ev; > + (void)ev_data; > + > int ret = ipc_postupdate(&msg); > - mg_printf(conn, > - "HTTP/1.1 200 OK\r\n" > - "Content-Type: application/json\r\n" > - "\r\n" > + mg_send_response_line(nc, 200, "Content-Type: application/json"); > + mg_send(nc, "\r\n", 2); > + mg_printf(nc, > "{\r\n" > "\t\"code\": %d,\r\n" > "\t\"error\": \"%s\",\r\n" > @@ -393,70 +288,311 @@ static void post_update_cmd(struct mg_connection *conn) { > (ret == 0) ? 200 : 501, > (ret == 0) ? "" : "Internal server error", > (ret == 0) ? "" : "Failed to queue command"); > + > + nc->flags |= MG_F_SEND_AND_CLOSE; > } > +#else > +static void restart_handler(struct mg_connection *nc, int ev, void *ev_data) { > + struct http_message *hm = (struct http_message *) ev_data; > + ipc_message msg; > + > + (void)ev; > > -static int begin_request_handler(struct mg_connection *conn) { > - if (!strcmp(mg_get_request_info(conn)->uri, "/handle_post_request")) { > - recovery_upload(conn); > - return 1; > + if(mg_vcasecmp(&hm->method, "POST") != 0) { > + mg_http_send_error(nc, 405, "Method Not Allowed"); > + return; > } > - if (!strcmp(mg_get_request_info(conn)->uri, "/getstatus.json")) { > - recovery_status(conn); > - return 1; > + > + int ret = ipc_postupdate(&msg); > + if (ret) { > + mg_http_send_error(nc, 500, "Failed to queue command"); > + return; > } > - if (!strcmp(mg_get_request_info(conn)->uri, "/rebootTarget")) { > - reboot_target(conn); > - return 1; > + > + mg_http_send_error(nc, 201, "Device will reboot now."); > +} > + > +static void broadcast(struct mg_mgr *mgr, char *str) { > + struct mg_connection *nc; > + > + for (nc = mg_next(mgr, NULL); nc != NULL; nc = mg_next(mgr, nc)) { > + if (nc->flags & MG_F_IS_WEBSOCKET) { > + mg_send_websocket_frame(nc, WEBSOCKET_OP_TEXT, str, strlen(str)); > + } > } > - if (!strcmp(mg_get_request_info(conn)->uri, "/postUpdateCommand") > - && !strcmp(mg_get_request_info(conn)->request_method,"POST")) { > - post_update_cmd(conn); > - return 1; > +} > + > +static void broadcast_message(struct mg_mgr *mgr) { > + ipc_message msg; > + int ret; > + char buf[4096]; > + > + if (mg_next(mgr, NULL) == NULL) > + return; > + > + ret = ipc_get_status(&msg); > + if (ret) { > + return; > + } > + > + if (strlen(msg.data.status.desc) == 0) > + return; > + > + snprintf(buf, sizeof(buf), > + "{\r\n" > + "\t\"type\": \"message\",\r\n" > + "\t\"level\": \"%d\",\r\n" > + "\t\"text\": \"%s\"\r\n" > + "}\r\n", > + (msg.data.status.error) ? 3 : 6, /* RFC 5424 */ > + msg.data.status.desc); > + > + broadcast(mgr, buf); > +} > + > +static void broadcast_progress(struct mg_mgr *mgr) { > + struct progress_msg msg; > + static int status = IDLE; > + static int source = SOURCE_UNKNOWN; > + static int step = 0; > + static int percent = 0; > + static int fd = -1; > + long flags; > + char buf[4096]; > + int ret; > + > + if (mg_next(mgr, NULL) == NULL) > + return; > + > + if (fd < 0) { > + fd = progress_ipc_connect(true); > + flags = fcntl(fd, F_GETFL); > + flags |= O_NONBLOCK; > + fcntl(fd, F_SETFL, flags); > + } > + > + ret = progress_ipc_receive(&fd, &msg); > + if (ret != sizeof(msg)) > + return; > + > + > + if (msg.status != status || msg.status == FAILURE) { > + status = msg.status; > + snprintf(buf, sizeof(buf), > + "{\r\n" > + "\t\"type\": \"status\",\r\n" > + "\t\"status\": \"%s\"\r\n" > + "}\r\n", > + get_status_string(msg.status)); > + broadcast(mgr, buf); > + } > + > + if (msg.source != source) { > + source = msg.source; > + snprintf(buf, sizeof(buf), > + "{\r\n" > + "\t\"type\": \"source\",\r\n" > + "\t\"source\": \"%s\"\r\n" > + "}\r\n", > + get_source_string(msg.source)); > + broadcast(mgr, buf); > + } > + > + if (msg.infolen) { > + snprintf(buf, sizeof(buf), > + "{\r\n" > + "\t\"type\": \"info\",\r\n" > + "\t\"source\": \"%s\"\r\n" > + "}\r\n", > + msg.info); > + broadcast(mgr, buf); > + } > + > + if ((msg.cur_step != step || msg.cur_percent != percent) && > + msg.cur_step) { > + snprintf(buf, sizeof(buf), > + "{\r\n" > + "\t\"type\": \"step\",\r\n" > + "\t\"number\": \"%d\",\r\n" > + "\t\"step\": \"%d\",\r\n" > + "\t\"name\": \"%s\",\r\n" > + "\t\"percent\": \"%d\"\r\n" > + "}\r\n", > + msg.nsteps, > + msg.cur_step, > + msg.cur_step ? msg.cur_image: "", > + msg.cur_percent); > + step = msg.cur_step; > + percent = msg.cur_percent; > + broadcast(mgr, buf); > } > - return 0; > } > +#endif > > -static void start_mongoose_server(char **options) { > - struct mg_callbacks callbacks; > - int i; > +static void ev_handler(struct mg_connection *nc, int ev, void *ev_data) { > + if (ev == MG_EV_HTTP_REQUEST) { > + mg_serve_http(nc, ev_data, s_http_server_opts); > + } > > - init_server_name(); > +} > > - /* Start Mongoose */ > - memset(&callbacks, 0, sizeof(callbacks)); > - callbacks.log_message = &log_message; > +static int mongoose_settings(void *elem, void __attribute__ ((__unused__)) *data) > +{ > + struct mongoose_options *opts = (struct mongoose_options *)data; > + char tmp[128]; > > - callbacks.begin_request = begin_request_handler; > - callbacks.upload = upload_handler; > + GET_FIELD_STRING(LIBCFG_PARSER, elem, "document_root", tmp); > + if (strlen(tmp)) { > + opts->root = strdup(tmp); > + } > > - ctx = mg_start(&callbacks, NULL, (const char **) options); > - for (i = 0; options[i] != NULL; i++) { > - free(options[i]); > + GET_FIELD_STRING(LIBCFG_PARSER, elem, "enable_directory_listing", tmp); > + if (strlen(tmp)) { > + opts->listing = strdup(tmp); > } > > - if (ctx == NULL) { > - die("%s", "Failed to start Mongoose."); > + GET_FIELD_STRING(LIBCFG_PARSER, elem, "listening_ports", tmp); > + if (strlen(tmp)) { > + opts->port = strdup(tmp); > } > > - printf("%s with pid %d started on port(s) %s with web root [%s]\n", > - server_name, getpid(), mg_get_option(ctx, "listening_ports"), > - mg_get_option(ctx, "document_root")); > + GET_FIELD_STRING(LIBCFG_PARSER, elem, "ssl_certificate", tmp); > + if (strlen(tmp)) { > + opts->ssl_cert = strdup(tmp); > + } > + > + GET_FIELD_STRING(LIBCFG_PARSER, elem, "ssl_certificate_key", tmp); > + if (strlen(tmp)) { > + opts->ssl_key = strdup(tmp); > + } > > + return 0; > +} > + > + > +static struct option long_options[] = { > + {"listing", no_argument, NULL, 'l'}, > + {"port", required_argument, NULL, 'p'}, > + {"ssl", no_argument, NULL, 's'}, > + {"ssl-cert", required_argument, NULL, 'C'}, > + {"ssl-key", required_argument, NULL, 'K'}, > + {"document-root", required_argument, NULL, 'r'}, > + {NULL, 0, NULL, 0} > +}; > + > +void mongoose_print_help(void) > +{ > + fprintf( > + stdout, > + "\tmongoose arguments:\n" > + "\t -l, --listing <port> : enable directory listing (default: %s)\n" > + "\t -p, --port <port> : server port number (default: %s)\n" > + "\t -s, --ssl : enable ssl support\n" > + "\t -C, --ssl-cert <cert> : ssl certificate to present to clients\n" > + "\t -K, --ssl-key <key> : key corresponding to the ssl certificate\n" > + "\t -r, --document-root <path> : path to document root directory (default: %s)\n", > + MG_LISTING, MG_PORT, MG_ROOT); > } > > int start_mongoose(const char *cfgfname, int argc, char *argv[]) > { > + struct mongoose_options opts; > + struct mg_mgr mgr; > + struct mg_connection *nc; > + struct mg_bind_opts bind_opts; > + const char *s_http_port = NULL; > + const char *err_str; > +#if MG_ENABLE_SSL > + bool ssl = false; > +#endif > + int choice = 0; > + > + memset(&opts, 0, sizeof(opts)); > + if (cfgfname) { > + read_module_settings(cfgfname, "webserver", mongoose_settings, &opts); > + } > + > + optind = 1; > + while ((choice = getopt_long(argc, argv, "lp:sC:K:r:", > + long_options, NULL)) != -1) { > + switch (choice) { > + case 'l': > + free(opts.listing); > + opts.listing = strdup(optarg); > + break; > + case 'p': > + free(opts.port); > + opts.port = strdup(optarg); > + break; > +#if MG_ENABLE_SSL > + case 's': > + ssl = true; > + break; > + case 'C': > + free(opts.ssl_cert); > + opts.ssl_cert = strdup(optarg); > + break; > + case 'K': > + free(opts.ssl_key); > + opts.ssl_key = strdup(optarg); > + break; > +#endif > + case 'r': > + free(opts.root); > + opts.root = strdup(optarg); > + break; > + case '?': > + default: > + return -EINVAL; > + } > + } > > - char *options[MAX_OPTIONS]; > + s_http_server_opts.document_root = > + opts.root ? opts.root : MG_ROOT; > + s_http_server_opts.enable_directory_listing = > + opts.listing ? opts.listing : MG_LISTING; > + s_http_port = opts.port ? opts.port : MG_PORT; > + > + memset(&bind_opts, 0, sizeof(bind_opts)); > + bind_opts.error_string = &err_str; > +#if MG_ENABLE_SSL > + if (ssl) { > + bind_opts.ssl_cert = opts.ssl_cert; > + bind_opts.ssl_key = opts.ssl_key; > + } > +#endif > > - /* Update config based on command line arguments */ > - process_command_line_arguments(cfgfname, argc, argv, options); > + mg_mgr_init(&mgr, NULL); > > - start_mongoose_server(options); > + nc = mg_bind_opt(&mgr, s_http_port, ev_handler, bind_opts); > + if (nc == NULL) { > + fprintf(stderr, "Failed to start Mongoose: %s\n", *bind_opts.error_string); > + exit(EXIT_FAILURE); > + } > > - while (1) { > - sleep(1000); > +#ifdef CONFIG_MONGOOSE_API_DEPRECATED > + mg_register_http_endpoint(nc, "/handle_post_request", MG_CB(upload_handler, NULL)); > + mg_register_http_endpoint(nc, "/getstatus.json", MG_CB(recovery_status, NULL)); > + mg_register_http_endpoint(nc, "/rebootTarget", MG_CB(reboot_target, NULL)); > + mg_register_http_endpoint(nc, "/postUpdateCommand", MG_CB(post_update_cmd, NULL)); > +#else > + mg_register_http_endpoint(nc, "/restart", restart_handler); > +#endif > + mg_register_http_endpoint(nc, "/upload", MG_CB(upload_handler, NULL)); > + mg_set_protocol_http_websocket(nc); > + > + printf("Mongoose web server version %s with pid %d started on port(s) %s with web root [%s]\n", > + MG_VERSION, getpid(), s_http_port, > + s_http_server_opts.document_root); > + > + for (;;) { > + mg_mgr_poll(&mgr, 100); > +#ifndef CONFIG_MONGOOSE_API_DEPRECATED > + broadcast_message(&mgr); > + broadcast_progress(&mgr); > +#endif > } > + mg_mgr_free(&mgr); > > return 0; > } >
Hi Stefano, > -----Ursprüngliche Nachricht----- > Von: Stefano Babic [mailto:sbabic@denx.de] > Gesendet: Donnerstag, 11. Januar 2018 09:59 > An: stefan@herbrechtsmeier.net; swupdate@googlegroups.com > Cc: Herbrechtsmeier Dr.-Ing. , Stefan > <Stefan.Herbrechtsmeier@weidmueller.com> > Betreff: Re: [swupdate] [PATCH 2/3] Update mongoose web server > > On 08/01/2018 11:48, stefan@herbrechtsmeier.net wrote: > > From: Stefan Herbrechtsmeier > <stefan.herbrechtsmeier@weidmueller.com> > > > > Signed-off-by: Stefan Herbrechtsmeier > <stefan.herbrechtsmeier@weidmueller.com> > > I cannot follow the patch because, as expected, the difference with old > mongoose version are heavy. I agree to maintain the changes in a single > patch to avoid breakages. > > Anyway, add some information to the commit message, that which version > of mongoose you have taken, better with commit-id. Okay > I guess it is better (for now) that MONGOOSE_API_DEPRECATED is set as > default. This should maintain compatibility with the past, as most users > have their own version of website / defconfig. If it is not set, I am > expecting a flow of compliants here :-). Sure > Is "-document_root .." still working ? I get running with "-r ./www2", > but document_root is not recognized. Is it was intentional ? This was intentional because mongoose no longer support parameter parsing and getopt use two hyphens for long parameters Should I iterate over the args and replace the old long args with the news if MONGOOSE_API_DEPRECATED is enabled? <snip> > > diff --git a/README.md b/README.md > > index 53dc4d9..1c1b2e0 100644 > > --- a/README.md > > +++ b/README.md > > @@ -41,7 +41,9 @@ Here a short list of the main features: > > - Power-Off safe > > - Hardware / Software compatibility. > > > > -This software is licensed under GPL Version 2.0+ > > +Different components of this software are under different licenses (a mix > > +of MIT, GPLv2 and GPLv2+). License information for any file is either > explicitly stated > > +or defaults to GPL version 2.0+. > > > > Please check inside doc directory for documentation or > > the online documentation (generated from doc/) at: Is this okay for you because mongoose is GPLv2 only. <snip> Best regards Stefan Herbrechtsmeier Software Developer Embedded Systems Weidmüller – Your partner in Industrial Connectivity We look forward to sharing ideas with you – Let’s connect. Weidmueller Interface GmbH & Co. KG Klingenbergstraße 16, 32758 Detmold, Germany Email: Stefan.Herbrechtsmeier@weidmueller.com – Web: www.weidmueller.com
Hi Stefan, On 11/01/2018 10:26, Stefan.Herbrechtsmeier@weidmueller.com wrote: > Hi Stefano, > >> -----Ursprüngliche Nachricht----- >> Von: Stefano Babic [mailto:sbabic@denx.de] >> Gesendet: Donnerstag, 11. Januar 2018 09:59 >> An: stefan@herbrechtsmeier.net; swupdate@googlegroups.com >> Cc: Herbrechtsmeier Dr.-Ing. , Stefan >> <Stefan.Herbrechtsmeier@weidmueller.com> >> Betreff: Re: [swupdate] [PATCH 2/3] Update mongoose web server >> >> On 08/01/2018 11:48, stefan@herbrechtsmeier.net wrote: >>> From: Stefan Herbrechtsmeier >> <stefan.herbrechtsmeier@weidmueller.com> >>> >>> Signed-off-by: Stefan Herbrechtsmeier >> <stefan.herbrechtsmeier@weidmueller.com> >> >> I cannot follow the patch because, as expected, the difference with old >> mongoose version are heavy. I agree to maintain the changes in a single >> patch to avoid breakages. >> >> Anyway, add some information to the commit message, that which version >> of mongoose you have taken, better with commit-id. > > Okay > >> I guess it is better (for now) that MONGOOSE_API_DEPRECATED is set as >> default. This should maintain compatibility with the past, as most users >> have their own version of website / defconfig. If it is not set, I am >> expecting a flow of compliants here :-). > > Sure > >> Is "-document_root .." still working ? I get running with "-r ./www2", >> but document_root is not recognized. Is it was intentional ? > > This was intentional because mongoose no longer support parameter parsing and getopt use two hyphens for long parameters ok, got it. > > Should I iterate over the args and replace the old long args with the news if MONGOOSE_API_DEPRECATED is enabled? mmhh...no, this is nasty. We will have a mix of old and new parameters in future. And two hyphens is standard for long parameters. We just should document this somewhere. > > <snip> > >>> diff --git a/README.md b/README.md >>> index 53dc4d9..1c1b2e0 100644 >>> --- a/README.md >>> +++ b/README.md >>> @@ -41,7 +41,9 @@ Here a short list of the main features: >>> - Power-Off safe >>> - Hardware / Software compatibility. >>> >>> -This software is licensed under GPL Version 2.0+ >>> +Different components of this software are under different licenses (a mix >>> +of MIT, GPLv2 and GPLv2+). License information for any file is either >> explicitly stated >>> +or defaults to GPL version 2.0+. I do not know if we need this - MIT is compatible with GPLv2, and license is automatically GPlv2. I am also thinking (different issue) to move to SPDX to simplify licensing. >>> >>> Please check inside doc directory for documentation or >>> the online documentation (generated from doc/) at: > > Is this okay for you because mongoose is GPLv2 only. I do not see conflicts after we have clarified Mongoose License some time ago. Best regards, Stefano
Hi Stefano, > -----Ursprüngliche Nachricht----- > Von: Stefano Babic [mailto:sbabic@denx.de] > Gesendet: Donnerstag, 11. Januar 2018 10:42 > An: Herbrechtsmeier Dr.-Ing. , Stefan > <Stefan.Herbrechtsmeier@weidmueller.com>; sbabic@denx.de; > stefan@herbrechtsmeier.net; swupdate@googlegroups.com > Betreff: Re: AW: [swupdate] [PATCH 2/3] Update mongoose web server > > On 11/01/2018 10:26, Stefan.Herbrechtsmeier@weidmueller.com wrote: > > > >> -----Ursprüngliche Nachricht----- > >> Von: Stefano Babic [mailto:sbabic@denx.de] > >> Gesendet: Donnerstag, 11. Januar 2018 09:59 > >> An: stefan@herbrechtsmeier.net; swupdate@googlegroups.com > >> Cc: Herbrechtsmeier Dr.-Ing. , Stefan > >> <Stefan.Herbrechtsmeier@weidmueller.com> > >> Betreff: Re: [swupdate] [PATCH 2/3] Update mongoose web server > >> > >> On 08/01/2018 11:48, stefan@herbrechtsmeier.net wrote: <snip> > >> Is "-document_root .." still working ? I get running with "-r > >> ./www2", but document_root is not recognized. Is it was intentional ? > > > > This was intentional because mongoose no longer support parameter > > parsing and getopt use two hyphens for long parameters > > ok, got it. > > > > > Should I iterate over the args and replace the old long args with the news if > MONGOOSE_API_DEPRECATED is enabled? > > mmhh...no, this is nasty. We will have a mix of old and new parameters in > future. And two hyphens is standard for long parameters. We just should > document this somewhere. Okay > > <snip> > > > >>> diff --git a/README.md b/README.md > >>> index 53dc4d9..1c1b2e0 100644 > >>> --- a/README.md > >>> +++ b/README.md > >>> @@ -41,7 +41,9 @@ Here a short list of the main features: > >>> - Power-Off safe > >>> - Hardware / Software compatibility. > >>> > >>> -This software is licensed under GPL Version 2.0+ > >>> +Different components of this software are under different licenses > >>> +(a mix of MIT, GPLv2 and GPLv2+). License information for any file > >>> +is either > >> explicitly stated > >>> +or defaults to GPL version 2.0+. > > I do not know if we need this - MIT is compatible with GPLv2, and license is > automatically GPlv2. > > I am also thinking (different issue) to move to SPDX to simplify licensing. That would be nice. > >>> Please check inside doc directory for documentation or the online > >>> documentation (generated from doc/) at: > > > > Is this okay for you because mongoose is GPLv2 only. > > I do not see conflicts after we have clarified Mongoose License some time > ago. Okay Best regards Stefan Herbrechtsmeier Software Developer Embedded Systems Weidmüller – Your partner in Industrial Connectivity We look forward to sharing ideas with you – Let’s connect. Weidmueller Interface GmbH & Co. KG Klingenbergstraße 16, 32758 Detmold, Germany Email: Stefan.Herbrechtsmeier@weidmueller.com – Web: www.weidmueller.com
Hello Stefan Herbrechtsmeier, On Monday, January 8, 2018 at 11:49:24 AM UTC+1, ste...@herbrechtsmeier.net wrote: > > From: Stefan Herbrechtsmeier <stefan.herb...@weidmueller.com <javascript:>> > > > Signed-off-by: Stefan Herbrechtsmeier <stefan.herb...@weidmueller.com > <javascript:>> > -- > [snip] > > -This software is licensed under GPL Version 2.0+ > +Different components of this software are under different licenses (a mix > +of MIT, GPLv2 and GPLv2+). License information for any file is either > explicitly stated > +or defaults to GPL version 2.0+. > [snip] > index 75bca06..7f2ef6e 100644 > --- a/mongoose/mongoose.c > +++ b/mongoose/mongoose.c > @@ -1,5402 +1,16324 @@ > -// Copyright (c) 2004-2013 Sergey Lyubka > -// > -// Permission is hereby granted, free of charge, to any person obtaining > a copy > -// of this software and associated documentation files (the "Software"), > to deal > -// in the Software without restriction, including without limitation the > rights > -// to use, copy, modify, merge, publish, distribute, sublicense, and/or > sell > -// copies of the Software, and to permit persons to whom the Software is > -// furnished to do so, subject to the following conditions: > -// > -// The above copyright notice and this permission notice shall be > included in > -// all copies or substantial portions of the Software. > -// > -// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, > EXPRESS OR > -// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF > MERCHANTABILITY, > -// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT > SHALL THE > -// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER > -// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, > ARISING FROM, > -// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS > IN > -// THE SOFTWARE. > [snip] > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > So the license is changed from MIT to what? I am not a lawyer, but doesn't "All rights reserved" mean that NO permissions are given? Best regards Jörg Krause
Hi Jörg, Stefan, On 11/01/2018 16:28, Jörg Krause wrote: > Hello Stefan Herbrechtsmeier, > > On Monday, January 8, 2018 at 11:49:24 AM UTC+1, > ste...@herbrechtsmeier.net wrote: > > From: Stefan Herbrechtsmeier <stefan.herb...@weidmueller.com > <javascript:>> > > Signed-off-by: Stefan Herbrechtsmeier > <stefan.herb...@weidmueller.com <javascript:>> > -- > > > [snip] >  > >  > -This software is licensed under GPL Version 2.0+ > +Different components of this software are under different licenses > (a mix > +of MIT, GPLv2 and GPLv2+). License information for any file is > either explicitly stated > +or defaults to GPL version 2.0+. > > > [snip] >  > > index 75bca06..7f2ef6e 100644 > --- a/mongoose/mongoose.c > +++ b/mongoose/mongoose.c > @@ -1,5402 +1,16324 @@ > -// Copyright (c) 2004-2013 Sergey Lyubka > -// > -// Permission is hereby granted, free of charge, to any person > obtaining a copy > -// of this software and associated documentation files (the > "Software"), to deal > -// in the Software without restriction, including without > limitation the rights > -// to use, copy, modify, merge, publish, distribute, sublicense, > and/or sell > -// copies of the Software, and to permit persons to whom the > Software is > -// furnished to do so, subject to the following conditions: > -// > -// The above copyright notice and this permission notice shall be > included in > -// all copies or substantial portions of the Software. > -// > -// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, > EXPRESS OR > -// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF > MERCHANTABILITY, > -// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO > EVENT SHALL THE > -// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR > OTHER > -// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, > ARISING FROM, > -// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER > DEALINGS IN > -// THE SOFTWARE. > > > [snip] >  > > +/* > + * Copyright (c) 2014 Cesanta Software Limited > + * All rights reserved > + */ > > >  So the license is changed from MIT to what? I am not a lawyer, but > doesn't "All rights reserved" mean that NO permissions are given? Thanks for pointing this - I was not yet so deep to check this. This is the crazy thing with mongoose and the main reason why it was not yet updated. I am quite confused about the license. Checking here: https://github.com/cesanta/mongoose/blob/master/LICENSE This looks ok. Yes, they provide commercial license, too, but "Alternatively". Then I am expecting that all files have a GPL header, as usual. But on the main page of the project: "Licensing --------- Mongoose is released under Commercial and GNU GPL v.2 open source licenses. Commercial Projects: Contact us for commercial license." Commercial projects ? In any case, I am not allowed to put headers as "All rights reserved" inside a FOSS projects. We need at least, if we are allowed, to change those header, letting of course the Copyright, but adding a GPLv2. Cesanta's forum is mostly for Mongoose-OS, and it does not explain the issue. Stefan, you reported you have contacted Cesanta for this issue. We need from them that the permission to change the "All rights reserved" with the FOSS license they allow (GPLv2). Best regards, Stefano
Hi Stefano, > -----Ursprüngliche Nachricht----- > Von: Stefano Babic [mailto:sbabic@denx.de] > Gesendet: Freitag, 12. Januar 2018 12:44 > An: Jörg Krause <joerg.krause@embedded.rocks>; swupdate > <swupdate@googlegroups.com>; Herbrechtsmeier Dr.-Ing. , Stefan > <Stefan.Herbrechtsmeier@weidmueller.com> > Betreff: Re: [swupdate] Re: [PATCH 2/3] Update mongoose web server > > On 11/01/2018 16:28, Jörg Krause wrote: > > Hello Stefan Herbrechtsmeier, > > > > On Monday, January 8, 2018 at 11:49:24 AM UTC+1, > > ste...@herbrechtsmeier.net wrote: [snip] > > +/* > > + * Copyright (c) 2014 Cesanta Software Limited > > + * All rights reserved > > + */ > > > > > > So the license is changed from MIT to what? I am not a lawyer, but > > doesn't "All rights reserved" mean that NO permissions are given? > > Thanks for pointing this - I was not yet so deep to check this. > > This is the crazy thing with mongoose and the main reason why it was not yet > updated. I am quite confused about the license. > > Checking here: > > https://github.com/cesanta/mongoose/blob/master/LICENSE > > This looks ok. Yes, they provide commercial license, too, but "Alternatively". > Then I am expecting that all files have a GPL header, as usual. > > But on the main page of the project: > > "Licensing > --------- > Mongoose is released under Commercial and GNU GPL v.2 open source > licenses. > > Commercial Projects: Contact us for commercial license." > > Commercial projects ? > > In any case, I am not allowed to put headers as "All rights reserved" > inside a FOSS projects. We need at least, if we are allowed, to change those > header, letting of course the Copyright, but adding a GPLv2. > Cesanta's forum is mostly for Mongoose-OS, and it does not explain the > issue. > > Stefan, you reported you have contacted Cesanta for this issue. We need > from them that the permission to change the "All rights reserved" with the > FOSS license they allow (GPLv2). Why you are not allowed to use the "All rights reserved" phrase? It is a common phrase and used in the kernel and u-boot sources. Regarding https://lists.debian.org/debian-legal/2007/06/msg00252.html (https://en.wikipedia.org/wiki/Buenos_Aires_Convention) is has pretty much no legal effect. As the LICENSE file stated the software could be redistribute and/or modify under the terms of the GNU General Public License version 2. Additional Cesanta wrote me that the "Mongoose Web Server is available under GPLv2". Does the GPLv2 requires a header in every file? I don't think so because otherwise you couldn't use a SPDX header only. But we could add a GPLv2 or SPDX header without changing the license. Best regards Stefan Herbrechtsmeier Software Developer Embedded Systems Weidmüller – Your partner in Industrial Connectivity We look forward to sharing ideas with you – Let’s connect. Weidmueller Interface GmbH & Co. KG Klingenbergstraße 16, 32758 Detmold, Germany Email: Stefan.Herbrechtsmeier@weidmueller.com – Web: www.weidmueller.com
Hi Stefan, On 12/01/2018 15:39, Stefan.Herbrechtsmeier@weidmueller.com wrote: > Hi Stefano, > >> -----Ursprüngliche Nachricht----- >> Von: Stefano Babic [mailto:sbabic@denx.de] >> Gesendet: Freitag, 12. Januar 2018 12:44 >> An: Jörg Krause <joerg.krause@embedded.rocks>; swupdate >> <swupdate@googlegroups.com>; Herbrechtsmeier Dr.-Ing. , Stefan >> <Stefan.Herbrechtsmeier@weidmueller.com> >> Betreff: Re: [swupdate] Re: [PATCH 2/3] Update mongoose web server >> >> On 11/01/2018 16:28, Jörg Krause wrote: >>> Hello Stefan Herbrechtsmeier, >>> >>> On Monday, January 8, 2018 at 11:49:24 AM UTC+1, >>> ste...@herbrechtsmeier.net wrote: > > [snip] > >>> +/* >>> + * Copyright (c) 2014 Cesanta Software Limited >>> + * All rights reserved >>> + */ >>> >>> >>> So the license is changed from MIT to what? I am not a lawyer, but >>> doesn't "All rights reserved" mean that NO permissions are given? >> >> Thanks for pointing this - I was not yet so deep to check this. >> >> This is the crazy thing with mongoose and the main reason why it was not yet >> updated. I am quite confused about the license. >> >> Checking here: >> >> https://github.com/cesanta/mongoose/blob/master/LICENSE >> >> This looks ok. Yes, they provide commercial license, too, but "Alternatively". >> Then I am expecting that all files have a GPL header, as usual. >> >> But on the main page of the project: >> >> "Licensing >> --------- >> Mongoose is released under Commercial and GNU GPL v.2 open source >> licenses. >> >> Commercial Projects: Contact us for commercial license." >> >> Commercial projects ? >> >> In any case, I am not allowed to put headers as "All rights reserved" >> inside a FOSS projects. We need at least, if we are allowed, to change those >> header, letting of course the Copyright, but adding a GPLv2. >> Cesanta's forum is mostly for Mongoose-OS, and it does not explain the >> issue. >> >> Stefan, you reported you have contacted Cesanta for this issue. We need >> from them that the permission to change the "All rights reserved" with the >> FOSS license they allow (GPLv2). > > Why you are not allowed to use the "All rights reserved" phrase? It is a common phrase and used in the kernel and u-boot sources. You are right, I have found it myself, too. >Regarding https://lists.debian.org/debian-legal/2007/06/msg00252.html (https://en.wikipedia.org/wiki/Buenos_Aires_Convention) is has pretty much no legal effect. > > As the LICENSE file stated the software could be redistribute and/or modify under the terms of the GNU General Public License version 2. Additional Cesanta wrote me that the "Mongoose Web Server is available under GPLv2". Good - I have also found some additional information explaining this. > Does the GPLv2 requires a header in every file? In SWUpdate there are already multiple licenses, for example LUA, some BSD code. Of course, all of them is compatible to GPLv2 and the project is GPLv2. The cleanest way is to add in all files a SPDX header and move to it, exactly as was done a couple of years ago in U-Boot. But this is another story. In the meantime, I would prefer that mongoose.* contain a GPLv2 header, so that it is marked and it will be clear enough in future. > I don't think so because otherwise you couldn't use a SPDX header only. But we could add a GPLv2 or SPDX header without changing the license. I think it will be nicer, thanks ! Best regards, Stefano
Hi Stefano, Stefan, On Friday, January 12, 2018 at 3:48:17 PM UTC+1, Stefano Babic wrote: > > Hi Stefan, > > On 12/01/2018 15:39, Stefan.Herb...@weidmueller.com <javascript:> wrote: > > Hi Stefano, > > > >> -----Ursprüngliche Nachricht----- > >> Von: Stefano Babic [mailto:sba...@denx.de <javascript:>] > >> Gesendet: Freitag, 12. Januar 2018 12:44 > >> An: Jörg Krause <joerg.krause@embedded.rocks>; swupdate > >> <swup...@googlegroups.com <javascript:>>; Herbrechtsmeier Dr.-Ing. , > Stefan > >> <Stefan.Herb...@weidmueller.com <javascript:>> > >> Betreff: Re: [swupdate] Re: [PATCH 2/3] Update mongoose web server > >> > >> On 11/01/2018 16:28, Jörg Krause wrote: > >>> Hello Stefan Herbrechtsmeier, > >>> > >>> On Monday, January 8, 2018 at 11:49:24 AM UTC+1, > >>> ste...@herbrechtsmeier.net wrote: > > > > [snip] > > > >>> +/* > >>> + * Copyright (c) 2014 Cesanta Software Limited > >>> + * All rights reserved > >>> + */ > >>> > >>> > >>> So the license is changed from MIT to what? I am not a lawyer, but > >>> doesn't "All rights reserved" mean that NO permissions are given? > >> > >> Thanks for pointing this - I was not yet so deep to check this. > >> > >> This is the crazy thing with mongoose and the main reason why it was > not yet > >> updated. I am quite confused about the license. > >> > >> Checking here: > >> > >> https://github.com/cesanta/mongoose/blob/master/LICENSE > >> > >> This looks ok. Yes, they provide commercial license, too, but > "Alternatively". > >> Then I am expecting that all files have a GPL header, as usual. > >> > >> But on the main page of the project: > >> > >> "Licensing > >> --------- > >> Mongoose is released under Commercial and GNU GPL v.2 open source > >> licenses. > >> > >> Commercial Projects: Contact us for commercial license." > >> > >> Commercial projects ? > >> > >> In any case, I am not allowed to put headers as "All rights reserved" > >> inside a FOSS projects. We need at least, if we are allowed, to change > those > >> header, letting of course the Copyright, but adding a GPLv2. > >> Cesanta's forum is mostly for Mongoose-OS, and it does not explain the > >> issue. > >> > >> Stefan, you reported you have contacted Cesanta for this issue. We need > >> from them that the permission to change the "All rights reserved" with > the > >> FOSS license they allow (GPLv2). > > > > Why you are not allowed to use the "All rights reserved" phrase? It is a > common phrase and used in the kernel and u-boot sources. > > You are right, I have found it myself, too. > > >Regarding https://lists.debian.org/debian-legal/2007/06/msg00252.html ( > https://en.wikipedia.org/wiki/Buenos_Aires_Convention) is has pretty much > no legal effect. > > > > As the LICENSE file stated the software could be redistribute and/or > modify under the terms of the GNU General Public License version 2. > Additional Cesanta wrote me that the "Mongoose Web Server is available > under GPLv2". > > Good - I have also found some additional information explaining this. > > > Does the GPLv2 requires a header in every file? > > In SWUpdate there are already multiple licenses, for example LUA, some > BSD code. Of course, all of them is compatible to GPLv2 and the project > is GPLv2. The cleanest way is to add in all files a SPDX header and move > to it, exactly as was done a couple of years ago in U-Boot. But this is > another story. > > In the meantime, I would prefer that mongoose.* contain a GPLv2 header, > so that it is marked and it will be clear enough in future. > The question is if commercial projects are allowed to use the GPLv2 licensed mongoose code from SWUpdate under the term of the GPLv2? > > I don't think so because otherwise you couldn't use a SPDX header only. > But we could add a GPLv2 or SPDX header without changing the license. > > I think it will be nicer, thanks ! > > Best regards, > Stefano > > -- > ===================================================================== > DENX Software Engineering GmbH, Managing Director: Wolfgang Denk > HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany > Phone: +49-8142-66989-53 Fax: +49-8142-66989-80 Email: sba...@denx.de > <javascript:> > ===================================================================== > Best regards, Jörg Krause
Hi Jörg, On 14/01/2018 19:05, Jörg Krause wrote: > Hi Stefano, Stefan, > > On Friday, January 12, 2018 at 3:48:17 PM UTC+1, Stefano Babic wrote: > > Hi Stefan, > > On 12/01/2018 15:39, Stefan.Herb...@weidmueller.com <javascript:> > wrote: > > Hi Stefano, > > > >> -----Ursprüngliche Nachricht----- > >> Von: Stefano Babic [mailto:sba...@denx.de <javascript:>] > >> Gesendet: Freitag, 12. Januar 2018 12:44 > >> An: Jörg Krause <joerg.krause@embedded.rocks>; swupdate > >> <swup...@googlegroups.com <javascript:>>; Herbrechtsmeier > Dr.-Ing. , Stefan > >> <Stefan.Herb...@weidmueller.com <javascript:>> > >> Betreff: Re: [swupdate] Re: [PATCH 2/3] Update mongoose web server > >> > >> On 11/01/2018 16:28, Jörg Krause wrote: > >>> Hello Stefan Herbrechtsmeier, > >>> > >>> On Monday, January 8, 2018 at 11:49:24 AM UTC+1, > >>> ste...@herbrechtsmeier.net wrote: > > > > [snip] > > > >>>   +/* > >>>   + * Copyright (c) 2014 Cesanta Software Limited > >>>   + * All rights reserved > >>>   + */ > >>> > >>> > >>>  So the license is changed from MIT to what? I am not a lawyer, but > >>> doesn't "All rights reserved" mean that NO permissions are given? > >> > >> Thanks for pointing this - I was not yet so deep to check this. > >> > >> This is the crazy thing with mongoose and the main reason why it > was not yet > >> updated. I am quite confused about the license. > >> > >> Checking here: > >> > >>    https://github.com/cesanta/mongoose/blob/master/LICENSE > <https://github.com/cesanta/mongoose/blob/master/LICENSE> > >> > >> This looks ok. Yes, they provide commercial license, too, but > "Alternatively". > >> Then I am expecting that all files have a GPL header, as usual. > >> > >> But on the main page of the project: > >> > >> "Licensing > >> --------- > >> Mongoose is released under Commercial and GNU GPL v.2 open source > >> licenses. > >> > >> Commercial Projects: Contact us for commercial license." > >> > >> Commercial projects ? > >> > >> In any case, I am not allowed to put headers as "All rights > reserved" > >> inside a FOSS projects. We need at least, if we are allowed, to > change those > >> header, letting of course the Copyright, but adding a GPLv2. > >> Cesanta's forum is mostly for Mongoose-OS, and it does not > explain the > >> issue. > >> > >> Stefan, you reported you have contacted Cesanta for this issue. > We need > >> from them that the permission to change the "All rights reserved" > with the > >> FOSS license they allow (GPLv2). > > > > Why you are not allowed to use the "All rights reserved" phrase? > It is a common phrase and used in the kernel and u-boot sources. > > You are right, I have found it myself, too. > > >Regarding > https://lists.debian.org/debian-legal/2007/06/msg00252.html > <https://lists.debian.org/debian-legal/2007/06/msg00252.html> > (https://en.wikipedia.org/wiki/Buenos_Aires_Convention > <https://en.wikipedia.org/wiki/Buenos_Aires_Convention>) is has > pretty much no legal effect. > > > > As the LICENSE file stated the software could be redistribute > and/or modify under the terms of the GNU General Public License > version 2. Additional Cesanta wrote me that the "Mongoose Web Server > is available under GPLv2". > > Good - I have also found some additional information explaining this. > > > Does the GPLv2 requires a header in every file? > > In SWUpdate there are already multiple licenses, for example LUA, some > BSD code. Of course, all of them is compatible to GPLv2 and the project > is GPLv2. The cleanest way is to add in all files a SPDX header and > move > to it, exactly as was done a couple of years ago in U-Boot. But this is > another story. > > In the meantime, I would prefer that mongoose.* contain a GPLv2 header, > so that it is marked and it will be clear enough in future. > > > The question is if commercial projects are allowed to use the GPLv2 > licensed mongoose code from SWUpdate under the term of the GPLv2? The LICENSE file inside the mongoose project states that it is released under GPLv2, or alternatively, with a commercial license: https://github.com/cesanta/mongoose/blob/master/LICENSE This gives us the right to redistribute software under the terms of GPLv2. The word "Alternatively" has worth if we are not choosing GplV2. What raises confusion is the README file. But looking into LICENSE, it looks like that we have the right to integrate it into SWUpdate as GPLv2. By the way, is there a way to be absolutely sure about it ? Jörg, what do you propose ? I am far away to be a lawyer. Stefan, you got an answer from Cesanta. Can you share it or how can we ask them to take a position ? I have seen there is a forum, but it is for Mongoose-OS and not for Mongoose Webserver. Best regards, Stefano
Hi Jörg, Stefan, On 15/01/2018 09:43, Stefano Babic wrote: > Hi Jörg, > > On 14/01/2018 19:05, Jörg Krause wrote: >> Hi Stefano, Stefan, >> >> On Friday, January 12, 2018 at 3:48:17 PM UTC+1, Stefano Babic wrote: >> >> Hi Stefan, >> >> On 12/01/2018 15:39, Stefan.Herb...@weidmueller.com <javascript:> >> wrote: >> > Hi Stefano, >> > >> >> -----Ursprüngliche Nachricht----- >> >> Von: Stefano Babic [mailto:sba...@denx.de <javascript:>] >> >> Gesendet: Freitag, 12. Januar 2018 12:44 >> >> An: Jörg Krause <joerg.krause@embedded.rocks>; swupdate >> >> <swup...@googlegroups.com <javascript:>>; Herbrechtsmeier >> Dr.-Ing. , Stefan >> >> <Stefan.Herb...@weidmueller.com <javascript:>> >> >> Betreff: Re: [swupdate] Re: [PATCH 2/3] Update mongoose web server >> >> >> >> On 11/01/2018 16:28, Jörg Krause wrote: >> >>> Hello Stefan Herbrechtsmeier, >> >>> >> >>> On Monday, January 8, 2018 at 11:49:24 AM UTC+1, >> >>> ste...@herbrechtsmeier.net wrote: >> > >> > [snip] >> > >> >>>   +/* >> >>>   + * Copyright (c) 2014 Cesanta Software Limited >> >>>   + * All rights reserved >> >>>   + */ >> >>> >> >>> >> >>>  So the license is changed from MIT to what? I am not a lawyer, but >> >>> doesn't "All rights reserved" mean that NO permissions are given? >> >> >> >> Thanks for pointing this - I was not yet so deep to check this. >> >> >> >> This is the crazy thing with mongoose and the main reason why it >> was not yet >> >> updated. I am quite confused about the license. >> >> >> >> Checking here: >> >> >> >>    https://github.com/cesanta/mongoose/blob/master/LICENSE >> <https://github.com/cesanta/mongoose/blob/master/LICENSE> >> >> >> >> This looks ok. Yes, they provide commercial license, too, but >> "Alternatively". >> >> Then I am expecting that all files have a GPL header, as usual. >> >> >> >> But on the main page of the project: >> >> >> >> "Licensing >> >> --------- >> >> Mongoose is released under Commercial and GNU GPL v.2 open source >> >> licenses. >> >> >> >> Commercial Projects: Contact us for commercial license." >> >> >> >> Commercial projects ? >> >> >> >> In any case, I am not allowed to put headers as "All rights >> reserved" >> >> inside a FOSS projects. We need at least, if we are allowed, to >> change those >> >> header, letting of course the Copyright, but adding a GPLv2. >> >> Cesanta's forum is mostly for Mongoose-OS, and it does not >> explain the >> >> issue. >> >> >> >> Stefan, you reported you have contacted Cesanta for this issue. >> We need >> >> from them that the permission to change the "All rights reserved" >> with the >> >> FOSS license they allow (GPLv2). >> > >> > Why you are not allowed to use the "All rights reserved" phrase? >> It is a common phrase and used in the kernel and u-boot sources. >> >> You are right, I have found it myself, too. >> >> >Regarding >> https://lists.debian.org/debian-legal/2007/06/msg00252.html >> <https://lists.debian.org/debian-legal/2007/06/msg00252.html> >> (https://en.wikipedia.org/wiki/Buenos_Aires_Convention >> <https://en.wikipedia.org/wiki/Buenos_Aires_Convention>) is has >> pretty much no legal effect. >> > >> > As the LICENSE file stated the software could be redistribute >> and/or modify under the terms of the GNU General Public License >> version 2. Additional Cesanta wrote me that the "Mongoose Web Server >> is available under GPLv2". >> >> Good - I have also found some additional information explaining this. >> >> > Does the GPLv2 requires a header in every file? >> >> In SWUpdate there are already multiple licenses, for example LUA, some >> BSD code. Of course, all of them is compatible to GPLv2 and the project >> is GPLv2. The cleanest way is to add in all files a SPDX header and >> move >> to it, exactly as was done a couple of years ago in U-Boot. But this is >> another story. >> >> In the meantime, I would prefer that mongoose.* contain a GPLv2 header, >> so that it is marked and it will be clear enough in future. >> >> >> The question is if commercial projects are allowed to use the GPLv2 >> licensed mongoose code from SWUpdate under the term of the GPLv2? > > The LICENSE file inside the mongoose project states that it is released > under GPLv2, or alternatively, with a commercial license: > > https://github.com/cesanta/mongoose/blob/master/LICENSE > > This gives us the right to redistribute software under the terms of > GPLv2. The word "Alternatively" has worth if we are not choosing GplV2. > > What raises confusion is the README file. But looking into LICENSE, it > looks like that we have the right to integrate it into SWUpdate as GPLv2. > > By the way, is there a way to be absolutely sure about it ? Jörg, what > do you propose ? I am far away to be a lawyer. Stefan, you got an answer > from Cesanta. Can you share it or how can we ask them to take a position > ? I have seen there is a forum, but it is for Mongoose-OS and not for > Mongoose Webserver. > There are some issues in Mongoose's github about the license change that do not make a clear statement. It looks to me that there is an own interpretation of GPLv2. From MIT to GPLv2: https://github.com/cesanta/mongoose/issues/223 https://github.com/cesanta/mongoose/issues/222 GPLv2 vs commercial: https://github.com/cesanta/mongoose/issues/457 "That means that if your project is not commercial (open source), then GPLv2 covers it perfectly, and the usage is free. But : open source does not mean it is not commercial. "On the other hand, if mongoose is used commercially (e.g. in a paid product that ships to customers) then a license fee should be paid to us (Cesanta Software)." Who can help ? Best regards, Stefano
On 15/01/2018 10:02, Stefano Babic wrote: > Hi Jörg, Stefan, > > On 15/01/2018 09:43, Stefano Babic wrote: >> Hi Jörg, >> >> On 14/01/2018 19:05, Jörg Krause wrote: >>> Hi Stefano, Stefan, >>> >>> On Friday, January 12, 2018 at 3:48:17 PM UTC+1, Stefano Babic wrote: >>> >>> Hi Stefan, >>> >>> On 12/01/2018 15:39, Stefan.Herb...@weidmueller.com <javascript:> >>> wrote: >>> > Hi Stefano, >>> > >>> >> -----Ursprüngliche Nachricht----- >>> >> Von: Stefano Babic [mailto:sba...@denx.de <javascript:>] >>> >> Gesendet: Freitag, 12. Januar 2018 12:44 >>> >> An: Jörg Krause <joerg.krause@embedded.rocks>; swupdate >>> >> <swup...@googlegroups.com <javascript:>>; Herbrechtsmeier >>> Dr.-Ing. , Stefan >>> >> <Stefan.Herb...@weidmueller.com <javascript:>> >>> >> Betreff: Re: [swupdate] Re: [PATCH 2/3] Update mongoose web server >>> >> >>> >> On 11/01/2018 16:28, Jörg Krause wrote: >>> >>> Hello Stefan Herbrechtsmeier, >>> >>> >>> >>> On Monday, January 8, 2018 at 11:49:24 AM UTC+1, >>> >>> ste...@herbrechtsmeier.net wrote: >>> > >>> > [snip] >>> > >>> >>>   +/* >>> >>>   + * Copyright (c) 2014 Cesanta Software Limited >>> >>>   + * All rights reserved >>> >>>   + */ >>> >>> >>> >>> >>> >>>  So the license is changed from MIT to what? I am not a lawyer, but >>> >>> doesn't "All rights reserved" mean that NO permissions are given? >>> >> >>> >> Thanks for pointing this - I was not yet so deep to check this. >>> >> >>> >> This is the crazy thing with mongoose and the main reason why it >>> was not yet >>> >> updated. I am quite confused about the license. >>> >> >>> >> Checking here: >>> >> >>> >>    https://github.com/cesanta/mongoose/blob/master/LICENSE >>> <https://github.com/cesanta/mongoose/blob/master/LICENSE> >>> >> >>> >> This looks ok. Yes, they provide commercial license, too, but >>> "Alternatively". >>> >> Then I am expecting that all files have a GPL header, as usual. >>> >> >>> >> But on the main page of the project: >>> >> >>> >> "Licensing >>> >> --------- >>> >> Mongoose is released under Commercial and GNU GPL v.2 open source >>> >> licenses. >>> >> >>> >> Commercial Projects: Contact us for commercial license." >>> >> >>> >> Commercial projects ? >>> >> >>> >> In any case, I am not allowed to put headers as "All rights >>> reserved" >>> >> inside a FOSS projects. We need at least, if we are allowed, to >>> change those >>> >> header, letting of course the Copyright, but adding a GPLv2. >>> >> Cesanta's forum is mostly for Mongoose-OS, and it does not >>> explain the >>> >> issue. >>> >> >>> >> Stefan, you reported you have contacted Cesanta for this issue. >>> We need >>> >> from them that the permission to change the "All rights reserved" >>> with the >>> >> FOSS license they allow (GPLv2). >>> > >>> > Why you are not allowed to use the "All rights reserved" phrase? >>> It is a common phrase and used in the kernel and u-boot sources. >>> >>> You are right, I have found it myself, too. >>> >>> >Regarding >>> https://lists.debian.org/debian-legal/2007/06/msg00252.html >>> <https://lists.debian.org/debian-legal/2007/06/msg00252.html> >>> (https://en.wikipedia.org/wiki/Buenos_Aires_Convention >>> <https://en.wikipedia.org/wiki/Buenos_Aires_Convention>) is has >>> pretty much no legal effect. >>> > >>> > As the LICENSE file stated the software could be redistribute >>> and/or modify under the terms of the GNU General Public License >>> version 2. Additional Cesanta wrote me that the "Mongoose Web Server >>> is available under GPLv2". >>> >>> Good - I have also found some additional information explaining this. >>> >>> > Does the GPLv2 requires a header in every file? >>> >>> In SWUpdate there are already multiple licenses, for example LUA, some >>> BSD code. Of course, all of them is compatible to GPLv2 and the project >>> is GPLv2. The cleanest way is to add in all files a SPDX header and >>> move >>> to it, exactly as was done a couple of years ago in U-Boot. But this is >>> another story. >>> >>> In the meantime, I would prefer that mongoose.* contain a GPLv2 header, >>> so that it is marked and it will be clear enough in future. >>> >>> >>> The question is if commercial projects are allowed to use the GPLv2 >>> licensed mongoose code from SWUpdate under the term of the GPLv2? >> >> The LICENSE file inside the mongoose project states that it is released >> under GPLv2, or alternatively, with a commercial license: >> >> https://github.com/cesanta/mongoose/blob/master/LICENSE >> >> This gives us the right to redistribute software under the terms of >> GPLv2. The word "Alternatively" has worth if we are not choosing GplV2. >> >> What raises confusion is the README file. But looking into LICENSE, it >> looks like that we have the right to integrate it into SWUpdate as GPLv2. >> >> By the way, is there a way to be absolutely sure about it ? Jörg, what >> do you propose ? I am far away to be a lawyer. Stefan, you got an answer >> from Cesanta. Can you share it or how can we ask them to take a position >> ? I have seen there is a forum, but it is for Mongoose-OS and not for >> Mongoose Webserver. >> > > > There are some issues in Mongoose's github about the license change that > do not make a clear statement. It looks to me that there is an own > interpretation of GPLv2. > > From MIT to GPLv2: > https://github.com/cesanta/mongoose/issues/223 > https://github.com/cesanta/mongoose/issues/222 > > GPLv2 vs commercial: > https://github.com/cesanta/mongoose/issues/457 > > "That means that if your project is not commercial (open source), then > GPLv2 covers it perfectly, and the usage is free. > > But : open source does not mean it is not commercial. > > "On the other hand, if mongoose is used commercially (e.g. in a paid > product that ships to customers) then a license fee should be paid to us > (Cesanta Software)." > > Who can help ? FYI: I raised an issue on Mongoose's github and I ask to clarify this point: https://github.com/cesanta/mongoose/issues/885 Best regards, Stefano
Hi everybody, On 15/01/2018 12:18, Stefano Babic wrote: > On 15/01/2018 10:02, Stefano Babic wrote: >> Hi Jörg, Stefan, >> >> On 15/01/2018 09:43, Stefano Babic wrote: >>> Hi Jörg, >>> >>> On 14/01/2018 19:05, Jörg Krause wrote: >>>> Hi Stefano, Stefan, >>>> >>>> On Friday, January 12, 2018 at 3:48:17 PM UTC+1, Stefano Babic wrote: >>>> >>>> Hi Stefan, >>>> >>>> On 12/01/2018 15:39, Stefan.Herb...@weidmueller.com <javascript:> >>>> wrote: >>>> > Hi Stefano, >>>> > >>>> >> -----Ursprüngliche Nachricht----- >>>> >> Von: Stefano Babic [mailto:sba...@denx.de <javascript:>] >>>> >> Gesendet: Freitag, 12. Januar 2018 12:44 >>>> >> An: Jörg Krause <joerg.krause@embedded.rocks>; swupdate >>>> >> <swup...@googlegroups.com <javascript:>>; Herbrechtsmeier >>>> Dr.-Ing. , Stefan >>>> >> <Stefan.Herb...@weidmueller.com <javascript:>> >>>> >> Betreff: Re: [swupdate] Re: [PATCH 2/3] Update mongoose web server >>>> >> >>>> >> On 11/01/2018 16:28, Jörg Krause wrote: >>>> >>> Hello Stefan Herbrechtsmeier, >>>> >>> >>>> >>> On Monday, January 8, 2018 at 11:49:24 AM UTC+1, >>>> >>> ste...@herbrechtsmeier.net wrote: >>>> > >>>> > [snip] >>>> > >>>> >>>   +/* >>>> >>>   + * Copyright (c) 2014 Cesanta Software Limited >>>> >>>   + * All rights reserved >>>> >>>   + */ >>>> >>> >>>> >>> >>>> >>>  So the license is changed from MIT to what? I am not a lawyer, but >>>> >>> doesn't "All rights reserved" mean that NO permissions are given? >>>> >> >>>> >> Thanks for pointing this - I was not yet so deep to check this. >>>> >> >>>> >> This is the crazy thing with mongoose and the main reason why it >>>> was not yet >>>> >> updated. I am quite confused about the license. >>>> >> >>>> >> Checking here: >>>> >> >>>> >>    https://github.com/cesanta/mongoose/blob/master/LICENSE >>>> <https://github.com/cesanta/mongoose/blob/master/LICENSE> >>>> >> >>>> >> This looks ok. Yes, they provide commercial license, too, but >>>> "Alternatively". >>>> >> Then I am expecting that all files have a GPL header, as usual. >>>> >> >>>> >> But on the main page of the project: >>>> >> >>>> >> "Licensing >>>> >> --------- >>>> >> Mongoose is released under Commercial and GNU GPL v.2 open source >>>> >> licenses. >>>> >> >>>> >> Commercial Projects: Contact us for commercial license." >>>> >> >>>> >> Commercial projects ? >>>> >> >>>> >> In any case, I am not allowed to put headers as "All rights >>>> reserved" >>>> >> inside a FOSS projects. We need at least, if we are allowed, to >>>> change those >>>> >> header, letting of course the Copyright, but adding a GPLv2. >>>> >> Cesanta's forum is mostly for Mongoose-OS, and it does not >>>> explain the >>>> >> issue. >>>> >> >>>> >> Stefan, you reported you have contacted Cesanta for this issue. >>>> We need >>>> >> from them that the permission to change the "All rights reserved" >>>> with the >>>> >> FOSS license they allow (GPLv2). >>>> > >>>> > Why you are not allowed to use the "All rights reserved" phrase? >>>> It is a common phrase and used in the kernel and u-boot sources. >>>> >>>> You are right, I have found it myself, too. >>>> >>>> >Regarding >>>> https://lists.debian.org/debian-legal/2007/06/msg00252.html >>>> <https://lists.debian.org/debian-legal/2007/06/msg00252.html> >>>> (https://en.wikipedia.org/wiki/Buenos_Aires_Convention >>>> <https://en.wikipedia.org/wiki/Buenos_Aires_Convention>) is has >>>> pretty much no legal effect. >>>> > >>>> > As the LICENSE file stated the software could be redistribute >>>> and/or modify under the terms of the GNU General Public License >>>> version 2. Additional Cesanta wrote me that the "Mongoose Web Server >>>> is available under GPLv2". >>>> >>>> Good - I have also found some additional information explaining this. >>>> >>>> > Does the GPLv2 requires a header in every file? >>>> >>>> In SWUpdate there are already multiple licenses, for example LUA, some >>>> BSD code. Of course, all of them is compatible to GPLv2 and the project >>>> is GPLv2. The cleanest way is to add in all files a SPDX header and >>>> move >>>> to it, exactly as was done a couple of years ago in U-Boot. But this is >>>> another story. >>>> >>>> In the meantime, I would prefer that mongoose.* contain a GPLv2 header, >>>> so that it is marked and it will be clear enough in future. >>>> >>>> >>>> The question is if commercial projects are allowed to use the GPLv2 >>>> licensed mongoose code from SWUpdate under the term of the GPLv2? >>> >>> The LICENSE file inside the mongoose project states that it is released >>> under GPLv2, or alternatively, with a commercial license: >>> >>> https://github.com/cesanta/mongoose/blob/master/LICENSE >>> >>> This gives us the right to redistribute software under the terms of >>> GPLv2. The word "Alternatively" has worth if we are not choosing GplV2. >>> >>> What raises confusion is the README file. But looking into LICENSE, it >>> looks like that we have the right to integrate it into SWUpdate as GPLv2. >>> >>> By the way, is there a way to be absolutely sure about it ? Jörg, what >>> do you propose ? I am far away to be a lawyer. Stefan, you got an answer >>> from Cesanta. Can you share it or how can we ask them to take a position >>> ? I have seen there is a forum, but it is for Mongoose-OS and not for >>> Mongoose Webserver. >>> >> >> >> There are some issues in Mongoose's github about the license change that >> do not make a clear statement. It looks to me that there is an own >> interpretation of GPLv2. >> >> From MIT to GPLv2: >> https://github.com/cesanta/mongoose/issues/223 >> https://github.com/cesanta/mongoose/issues/222 >> >> GPLv2 vs commercial: >> https://github.com/cesanta/mongoose/issues/457 >> >> "That means that if your project is not commercial (open source), then >> GPLv2 covers it perfectly, and the usage is free. >> >> But : open source does not mean it is not commercial. >> >> "On the other hand, if mongoose is used commercially (e.g. in a paid >> product that ships to customers) then a license fee should be paid to us >> (Cesanta Software)." >> >> Who can help ? > > FYI: I raised an issue on Mongoose's github and I ask to clarify this point: > > https://github.com/cesanta/mongoose/issues/885 After Sergey's answer and after raising the question internally to someone else with more accurate lawyer knowledge as I can, the license for mongoose is ruled just by the License file. Because SWUpdate is GPLv2, we are allowed to integrate its code if we maintain their GPLv2 license - sure we do it. The README file does not exclude in any case the licensing under GPLv2. IMHO the license issue is explained and solved and we are allowed to integrate Stefan's patches after review. Best regards, Stefano
Hi Stefano, On Mon, 2018-01-15 at 13:49 +0100, Stefano Babic wrote: > Hi everybody, > > On 15/01/2018 12:18, Stefano Babic wrote: > > On 15/01/2018 10:02, Stefano Babic wrote: > > > Hi Jörg, Stefan, > > > > > > On 15/01/2018 09:43, Stefano Babic wrote: > > > > Hi Jörg, > > > > > > > > On 14/01/2018 19:05, Jörg Krause wrote: > > > > > Hi Stefano, Stefan, > > > > > > > > > > On Friday, January 12, 2018 at 3:48:17 PM UTC+1, Stefano > > > > > Babic wrote: > > > > > > > > > > Hi Stefan, > > > > > > > > > > On 12/01/2018 15:39, Stefan.Herb...@weidmueller.com > > > > > <javascript:> > > > > > wrote: > > > > > > Hi Stefano, > > > > > > > > > > > >> -----Ursprüngliche Nachricht----- > > > > > >> Von: Stefano Babic [mailto:sba...@denx.de > > > > > <javascript:>] > > > > > >> Gesendet: Freitag, 12. Januar 2018 12:44 > > > > > >> An: Jörg Krause <joerg.krause@embedded.rocks>; > > > > > swupdate > > > > > >> <swup...@googlegroups.com <javascript:>>; > > > > > Herbrechtsmeier > > > > > Dr.-Ing. , Stefan > > > > > >> <Stefan.Herb...@weidmueller.com <javascript:>> > > > > > >> Betreff: Re: [swupdate] Re: [PATCH 2/3] Update > > > > > mongoose web server > > > > > >> > > > > > >> On 11/01/2018 16:28, Jörg Krause wrote: > > > > > >>> Hello Stefan Herbrechtsmeier, > > > > > >>> > > > > > >>> On Monday, January 8, 2018 at 11:49:24 AM UTC+1, > > > > > >>> ste...@herbrechtsmeier.net wrote: > > > > > > > > > > > > [snip] > > > > > > > > > > > >>> +/* > > > > > >>> + * Copyright (c) 2014 Cesanta Software Limited > > > > > >>> + * All rights reserved > > > > > >>> + */ > > > > > >>> > > > > > >>> > > > > > >>> So the license is changed from MIT to what? I am not > > > > > a lawyer, but > > > > > >>> doesn't "All rights reserved" mean that NO > > > > > permissions are given? > > > > > >> > > > > > >> Thanks for pointing this - I was not yet so deep to > > > > > check this. > > > > > >> > > > > > >> This is the crazy thing with mongoose and the main > > > > > reason why it > > > > > was not yet > > > > > >> updated. I am quite confused about the license. > > > > > >> > > > > > >> Checking here: > > > > > >> > > > > > >> https://github.com/cesanta/mongoose/blob/master/ > > > > > LICENSE > > > > > <https://github.com/cesanta/mongoose/blob/master/LICENSE> > > > > > >> > > > > > >> This looks ok. Yes, they provide commercial license, > > > > > too, but > > > > > "Alternatively". > > > > > >> Then I am expecting that all files have a GPL header, > > > > > as usual. > > > > > >> > > > > > >> But on the main page of the project: > > > > > >> > > > > > >> "Licensing > > > > > >> --------- > > > > > >> Mongoose is released under Commercial and GNU GPL v.2 > > > > > open source > > > > > >> licenses. > > > > > >> > > > > > >> Commercial Projects: Contact us for commercial > > > > > license." > > > > > >> > > > > > >> Commercial projects ? > > > > > >> > > > > > >> In any case, I am not allowed to put headers as "All > > > > > rights > > > > > reserved" > > > > > >> inside a FOSS projects. We need at least, if we are > > > > > allowed, to > > > > > change those > > > > > >> header, letting of course the Copyright, but adding a > > > > > GPLv2. > > > > > >> Cesanta's forum is mostly for Mongoose-OS, and it does > > > > > not > > > > > explain the > > > > > >> issue. > > > > > >> > > > > > >> Stefan, you reported you have contacted Cesanta for > > > > > this issue. > > > > > We need > > > > > >> from them that the permission to change the "All > > > > > rights reserved" > > > > > with the > > > > > >> FOSS license they allow (GPLv2). > > > > > > > > > > > > Why you are not allowed to use the "All rights > > > > > reserved" phrase? > > > > > It is a common phrase and used in the kernel and u-boot > > > > > sources. > > > > > > > > > > You are right, I have found it myself, too. > > > > > > > > > > >Regarding > > > > > https://lists.debian.org/debian-legal/2007/06/msg00252.ht > > > > > ml > > > > > <https://lists.debian.org/debian-legal/2007/06/msg00252.h > > > > > tml> > > > > > (https://en.wikipedia.org/wiki/Buenos_Aires_Convention > > > > > <https://en.wikipedia.org/wiki/Buenos_Aires_Convention>) > > > > > is has > > > > > pretty much no legal effect. > > > > > > > > > > > > As the LICENSE file stated the software could be > > > > > redistribute > > > > > and/or modify under the terms of the GNU General Public > > > > > License > > > > > version 2. Additional Cesanta wrote me that the "Mongoose > > > > > Web Server > > > > > is available under GPLv2". > > > > > > > > > > Good - I have also found some additional information > > > > > explaining this. > > > > > > > > > > > Does the GPLv2 requires a header in every file? > > > > > > > > > > In SWUpdate there are already multiple licenses, for > > > > > example LUA, some > > > > > BSD code. Of course, all of them is compatible to GPLv2 > > > > > and the project > > > > > is GPLv2. The cleanest way is to add in all files a SPDX > > > > > header and > > > > > move > > > > > to it, exactly as was done a couple of years ago in U- > > > > > Boot. But this is > > > > > another story. > > > > > > > > > > In the meantime, I would prefer that mongoose.* contain a > > > > > GPLv2 header, > > > > > so that it is marked and it will be clear enough in > > > > > future. > > > > > > > > > > > > > > > The question is if commercial projects are allowed to use the > > > > > GPLv2 > > > > > licensed mongoose code from SWUpdate under the term of the > > > > > GPLv2? > > > > > > > > The LICENSE file inside the mongoose project states that it is > > > > released > > > > under GPLv2, or alternatively, with a commercial license: > > > > > > > > https://github.com/cesanta/mongoose/blob/master/LICENSE > > > > > > > > This gives us the right to redistribute software under the > > > > terms of > > > > GPLv2. The word "Alternatively" has worth if we are not > > > > choosing GplV2. > > > > > > > > What raises confusion is the README file. But looking into > > > > LICENSE, it > > > > looks like that we have the right to integrate it into SWUpdate > > > > as GPLv2. > > > > > > > > By the way, is there a way to be absolutely sure about it ? > > > > Jörg, what > > > > do you propose ? I am far away to be a lawyer. Stefan, you got > > > > an answer > > > > from Cesanta. Can you share it or how can we ask them to take a > > > > position > > > > ? I have seen there is a forum, but it is for Mongoose-OS and > > > > not for > > > > Mongoose Webserver. > > > > > > > > > > > > > There are some issues in Mongoose's github about the license > > > change that > > > do not make a clear statement. It looks to me that there is an > > > own > > > interpretation of GPLv2. > > > > > > From MIT to GPLv2: > > > https://github.com/cesanta/mongoose/issues/223 > > > https://github.com/cesanta/mongoose/issues/222 > > > > > > GPLv2 vs commercial: > > > https://github.com/cesanta/mongoose/issues/457 > > > > > > "That means that if your project is not commercial (open source), > > > then > > > GPLv2 covers it perfectly, and the usage is free. > > > > > > But : open source does not mean it is not commercial. > > > > > > "On the other hand, if mongoose is used commercially (e.g. in a > > > paid > > > product that ships to customers) then a license fee should be > > > paid to us > > > (Cesanta Software)." > > > > > > Who can help ? > > > > FYI: I raised an issue on Mongoose's github and I ask to clarify > > this point: > > > > https://github.com/cesanta/mongoose/issues/885 > > After Sergey's answer and after raising the question internally to > someone else with more accurate lawyer knowledge as I can, the > license > for mongoose is ruled just by the License file. Because SWUpdate is > GPLv2, we are allowed to integrate its code if we maintain their > GPLv2 > license - sure we do it. > > The README file does not exclude in any case the licensing under > GPLv2. > IMHO the license issue is explained and solved and we are allowed to > integrate Stefan's patches after review. This is good news, thanks! Jörg
Hi Stefano, Am 15.01.2018 um 13:49 schrieb Stefano Babic: > On 15/01/2018 12:18, Stefano Babic wrote: >> On 15/01/2018 10:02, Stefano Babic wrote: >>> On 15/01/2018 09:43, Stefano Babic wrote: >>>> On 14/01/2018 19:05, Jörg Krause wrote: >>>>> On Friday, January 12, 2018 at 3:48:17 PM UTC+1, Stefano Babic wrote: >>>>> >>>>> On 12/01/2018 15:39, Stefan.Herb...@weidmueller.com <javascript:> >>>>> wrote: >>>>> > Hi Stefano, >>>>> > >>>>> >> -----Ursprüngliche Nachricht----- >>>>> >> Von: Stefano Babic [mailto:sba...@denx.de <javascript:>] >>>>> >> Gesendet: Freitag, 12. Januar 2018 12:44 >>>>> >> An: Jörg Krause <joerg.krause@embedded.rocks>; swupdate >>>>> >> <swup...@googlegroups.com <javascript:>>; Herbrechtsmeier >>>>> Dr.-Ing. , Stefan >>>>> >> <Stefan.Herb...@weidmueller.com <javascript:>> >>>>> >> Betreff: Re: [swupdate] Re: [PATCH 2/3] Update mongoose web server >>>>> >> >>>>> >> On 11/01/2018 16:28, Jörg Krause wrote: >>>>> >>> Hello Stefan Herbrechtsmeier, >>>>> >>> >>>>> >>> On Monday, January 8, 2018 at 11:49:24 AM UTC+1, >>>>> >>> ste...@herbrechtsmeier.net wrote: >>>>> > >>>>> > [snip] >>>>> > >>>>> >>>   +/* >>>>> >>>   + * Copyright (c) 2014 Cesanta Software Limited >>>>> >>>   + * All rights reserved >>>>> >>>   + */ >>>>> >>> >>>>> >>> >>>>> >>>  So the license is changed from MIT to what? I am not a lawyer, but >>>>> >>> doesn't "All rights reserved" mean that NO permissions are given? >>>>> >> >>>>> >> Thanks for pointing this - I was not yet so deep to check this. >>>>> >> >>>>> >> This is the crazy thing with mongoose and the main reason why it >>>>> was not yet >>>>> >> updated. I am quite confused about the license. >>>>> >> >>>>> >> Checking here: >>>>> >> >>>>> >>    https://github.com/cesanta/mongoose/blob/master/LICENSE >>>>> <https://github.com/cesanta/mongoose/blob/master/LICENSE> >>>>> >> >>>>> >> This looks ok. Yes, they provide commercial license, too, but >>>>> "Alternatively". >>>>> >> Then I am expecting that all files have a GPL header, as usual. >>>>> >> >>>>> >> But on the main page of the project: >>>>> >> >>>>> >> "Licensing >>>>> >> --------- >>>>> >> Mongoose is released under Commercial and GNU GPL v.2 open source >>>>> >> licenses. >>>>> >> >>>>> >> Commercial Projects: Contact us for commercial license." >>>>> >> >>>>> >> Commercial projects ? >>>>> >> >>>>> >> In any case, I am not allowed to put headers as "All rights >>>>> reserved" >>>>> >> inside a FOSS projects. We need at least, if we are allowed, to >>>>> change those >>>>> >> header, letting of course the Copyright, but adding a GPLv2. >>>>> >> Cesanta's forum is mostly for Mongoose-OS, and it does not >>>>> explain the >>>>> >> issue. >>>>> >> >>>>> >> Stefan, you reported you have contacted Cesanta for this issue. >>>>> We need >>>>> >> from them that the permission to change the "All rights reserved" >>>>> with the >>>>> >> FOSS license they allow (GPLv2). >>>>> > >>>>> > Why you are not allowed to use the "All rights reserved" phrase? >>>>> It is a common phrase and used in the kernel and u-boot sources. >>>>> >>>>> You are right, I have found it myself, too. >>>>> >>>>> >Regarding >>>>> https://lists.debian.org/debian-legal/2007/06/msg00252.html >>>>> <https://lists.debian.org/debian-legal/2007/06/msg00252.html> >>>>> (https://en.wikipedia.org/wiki/Buenos_Aires_Convention >>>>> <https://en.wikipedia.org/wiki/Buenos_Aires_Convention>) is has >>>>> pretty much no legal effect. >>>>> > >>>>> > As the LICENSE file stated the software could be redistribute >>>>> and/or modify under the terms of the GNU General Public License >>>>> version 2. Additional Cesanta wrote me that the "Mongoose Web Server >>>>> is available under GPLv2". >>>>> >>>>> Good - I have also found some additional information explaining this. >>>>> >>>>> > Does the GPLv2 requires a header in every file? >>>>> >>>>> In SWUpdate there are already multiple licenses, for example LUA, some >>>>> BSD code. Of course, all of them is compatible to GPLv2 and the project >>>>> is GPLv2. The cleanest way is to add in all files a SPDX header and >>>>> move >>>>> to it, exactly as was done a couple of years ago in U-Boot. But this is >>>>> another story. >>>>> >>>>> In the meantime, I would prefer that mongoose.* contain a GPLv2 header, >>>>> so that it is marked and it will be clear enough in future. >>>>> >>>>> >>>>> The question is if commercial projects are allowed to use the GPLv2 >>>>> licensed mongoose code from SWUpdate under the term of the GPLv2? >>>> The LICENSE file inside the mongoose project states that it is released >>>> under GPLv2, or alternatively, with a commercial license: >>>> >>>> https://github.com/cesanta/mongoose/blob/master/LICENSE >>>> >>>> This gives us the right to redistribute software under the terms of >>>> GPLv2. The word "Alternatively" has worth if we are not choosing GplV2. >>>> >>>> What raises confusion is the README file. But looking into LICENSE, it >>>> looks like that we have the right to integrate it into SWUpdate as GPLv2. >>>> >>>> By the way, is there a way to be absolutely sure about it ? Jörg, what >>>> do you propose ? I am far away to be a lawyer. Stefan, you got an answer >>>> from Cesanta. Can you share it or how can we ask them to take a position >>>> ? I have seen there is a forum, but it is for Mongoose-OS and not for >>>> Mongoose Webserver. >>>> >>> >>> There are some issues in Mongoose's github about the license change that >>> do not make a clear statement. It looks to me that there is an own >>> interpretation of GPLv2. >>> >>> From MIT to GPLv2: >>> https://github.com/cesanta/mongoose/issues/223 >>> https://github.com/cesanta/mongoose/issues/222 >>> >>> GPLv2 vs commercial: >>> https://github.com/cesanta/mongoose/issues/457 >>> >>> "That means that if your project is not commercial (open source), then >>> GPLv2 covers it perfectly, and the usage is free. >>> >>> But : open source does not mean it is not commercial. >>> >>> "On the other hand, if mongoose is used commercially (e.g. in a paid >>> product that ships to customers) then a license fee should be paid to us >>> (Cesanta Software)." >>> >>> Who can help ? >> FYI: I raised an issue on Mongoose's github and I ask to clarify this point: >> >> https://github.com/cesanta/mongoose/issues/885 > After Sergey's answer and after raising the question internally to > someone else with more accurate lawyer knowledge as I can, the license > for mongoose is ruled just by the License file. Because SWUpdate is > GPLv2, we are allowed to integrate its code if we maintain their GPLv2 > license - sure we do it. > > The README file does not exclude in any case the licensing under GPLv2. > IMHO the license issue is explained and solved and we are allowed to > integrate Stefan's patches after review. Thanks. I will send an updated version in the next days. Best regards  Stefan
diff --git a/Makefile.flags b/Makefile.flags index 041a08e..6c91a3b 100644 --- a/Makefile.flags +++ b/Makefile.flags @@ -145,16 +145,11 @@ endif # mongoose / webserver ifneq ($(CONFIG_WEBSERVER),) ifneq ($(CONFIG_MONGOOSESSL),) -KBUILD_CFLAGS += -DNO_SSL_DL +KBUILD_CFLAGS += -DMG_ENABLE_SSL LDLIBS += crypto ssl -else -KBUILD_CFLAGS += -DNO_SSL -endif -ifneq ($(CONFIG_MONGOOSELUA),) -KBUILD_CFLAGS += -DUSE_LUA endif ifneq ($(CONFIG_MONGOOSEIPV6),) -KBUILD_CFLAGS += -DUSE_IPV6 +KBUILD_CFLAGS += -DMG_ENABLE_IPV6 endif endif diff --git a/README.md b/README.md index 53dc4d9..1c1b2e0 100644 --- a/README.md +++ b/README.md @@ -41,7 +41,9 @@ Here a short list of the main features: - Power-Off safe - Hardware / Software compatibility. -This software is licensed under GPL Version 2.0+ +Different components of this software are under different licenses (a mix +of MIT, GPLv2 and GPLv2+). License information for any file is either explicitly stated +or defaults to GPL version 2.0+. Please check inside doc directory for documentation or the online documentation (generated from doc/) at: diff --git a/mongoose/Config.in b/mongoose/Config.in index 27c98f3..133467c 100644 --- a/mongoose/Config.in +++ b/mongoose/Config.in @@ -17,13 +17,6 @@ config MONGOOSE menu "Mongoose Feature" depends on MONGOOSE -config MONGOOSELUA - bool "Lua interpreter" - depends on LUA - default y - help - It allows to use Lua scripts as CGI interpreter. - config MONGOOSEIPV6 bool "ipv6" default y @@ -40,6 +33,13 @@ config MONGOOSESSL comment "SSL support needs libcrypto, libssl" depends on !HAVE_LIBSSL || !HAVE_LIBCRYPTO +config MONGOOSE_API_DEPRECATED + bool "old web api" + default n + help + Enable deprecated web api to support old web pages. + + endmenu endmenu diff --git a/mongoose/Makefile b/mongoose/Makefile index 7f7fea2..d3fba39 100644 --- a/mongoose/Makefile +++ b/mongoose/Makefile @@ -1,2 +1,6 @@ +KBUILD_CFLAGS += -DMG_ENABLE_HTTP_WEBSOCKET=1 -DMG_ENABLE_HTTP_STREAMING_MULTIPART=1 + lib-$(CONFIG_MONGOOSE) += mongoose.o \ mongoose_interface.o + +CFLAGS_REMOVE_mongoose.o := -Wstrict-prototypes -Wunused-parameter -Wmissing-prototypes -Wmissing-declarations -Wshadow -Wold-style-definition diff --git a/mongoose/mongoose.c b/mongoose/mongoose.c index 75bca06..7f2ef6e 100644 --- a/mongoose/mongoose.c +++ b/mongoose/mongoose.c @@ -1,5402 +1,16324 @@ -// Copyright (c) 2004-2013 Sergey Lyubka -// -// Permission is hereby granted, free of charge, to any person obtaining a copy -// of this software and associated documentation files (the "Software"), to deal -// in the Software without restriction, including without limitation the rights -// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -// copies of the Software, and to permit persons to whom the Software is -// furnished to do so, subject to the following conditions: -// -// The above copyright notice and this permission notice shall be included in -// all copies or substantial portions of the Software. -// -// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -// THE SOFTWARE. - -#if defined(_WIN32) -#define _CRT_SECURE_NO_WARNINGS // Disable deprecation warning in VS2005 -#else -#ifdef __linux__ -#define _XOPEN_SOURCE 600 // For flockfile() on Linux -#endif -#define _LARGEFILE_SOURCE // Enable 64-bit file offsets -#define __STDC_FORMAT_MACROS // <inttypes.h> wants this for C++ -#define __STDC_LIMIT_MACROS // C++ wants that for INT64_MAX +#include "mongoose.h" +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/internal.h" #endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_MONGOOSE_SRC_INTERNAL_H_ +#define CS_MONGOOSE_SRC_INTERNAL_H_ -#if defined (_MSC_VER) -// conditional expression is constant: introduced by FD_SET(..) -#pragma warning (disable : 4127) -// non-constant aggregate initializer: issued due to missing C99 support -#pragma warning (disable : 4204) +/* Amalgamated: #include "common/mg_mem.h" */ + +#ifndef MBUF_REALLOC +#define MBUF_REALLOC MG_REALLOC #endif -// Disable WIN32_LEAN_AND_MEAN. -// This makes windows.h always include winsock2.h -#ifdef WIN32_LEAN_AND_MEAN -#undef WIN32_LEAN_AND_MEAN +#ifndef MBUF_FREE +#define MBUF_FREE MG_FREE #endif -#if defined(__SYMBIAN32__) -#define NO_SSL // SSL is not supported -#define NO_CGI // CGI is not supported -#define PATH_MAX FILENAME_MAX -#endif // __SYMBIAN32__ +#define MG_SET_PTRPTR(_ptr, _v) \ + do { \ + if (_ptr) *(_ptr) = _v; \ + } while (0) -#ifndef _WIN32_WCE // Some ANSI #includes are not available on Windows CE -#include <sys/types.h> -#include <sys/stat.h> -#include <errno.h> -#include <signal.h> -#include <fcntl.h> -#endif // !_WIN32_WCE +#ifndef MG_INTERNAL +#define MG_INTERNAL static +#endif -#include <time.h> -#include <stdlib.h> -#include <stdarg.h> -#include <assert.h> -#include <string.h> -#include <ctype.h> -#include <limits.h> -#include <stddef.h> -#include <stdio.h> +#ifdef PICOTCP +#define NO_LIBC +#define MG_DISABLE_PFS +#endif -#if defined(_WIN32) && !defined(__SYMBIAN32__) // Windows specific -#undef _WIN32_WINNT -#define _WIN32_WINNT 0x0400 // To make it link in VS2005 -#include <windows.h> +/* Amalgamated: #include "common/cs_dbg.h" */ +/* Amalgamated: #include "mongoose/src/http.h" */ +/* Amalgamated: #include "mongoose/src/net.h" */ + +#define MG_CTL_MSG_MESSAGE_SIZE 8192 + +/* internals that need to be accessible in unit tests */ +MG_INTERNAL struct mg_connection *mg_do_connect(struct mg_connection *nc, + int proto, + union socket_address *sa); + +MG_INTERNAL int mg_parse_address(const char *str, union socket_address *sa, + int *proto, char *host, size_t host_len); +MG_INTERNAL void mg_call(struct mg_connection *nc, + mg_event_handler_t ev_handler, void *user_data, int ev, + void *ev_data); +void mg_forward(struct mg_connection *from, struct mg_connection *to); +MG_INTERNAL void mg_add_conn(struct mg_mgr *mgr, struct mg_connection *c); +MG_INTERNAL void mg_remove_conn(struct mg_connection *c); +MG_INTERNAL struct mg_connection *mg_create_connection( + struct mg_mgr *mgr, mg_event_handler_t callback, + struct mg_add_sock_opts opts); +#ifdef _WIN32 +/* Retur value is the same as for MultiByteToWideChar. */ +int to_wchar(const char *path, wchar_t *wbuf, size_t wbuf_len); +#endif -#ifndef PATH_MAX -#define PATH_MAX MAX_PATH -#endif - -#ifndef _WIN32_WCE -#include <process.h> -#include <direct.h> -#include <io.h> -#else // _WIN32_WCE -#define NO_CGI // WinCE has no pipes - -typedef long off_t; - -#define errno GetLastError() -#define strerror(x) _ultoa(x, (char *) _alloca(sizeof(x) *3 ), 10) -#endif // _WIN32_WCE - -#define MAKEUQUAD(lo, hi) ((uint64_t)(((uint32_t)(lo)) | \ - ((uint64_t)((uint32_t)(hi))) << 32)) -#define RATE_DIFF 10000000 // 100 nsecs -#define EPOCH_DIFF MAKEUQUAD(0xd53e8000, 0x019db1de) -#define SYS2UNIX_TIME(lo, hi) \ - (time_t) ((MAKEUQUAD((lo), (hi)) - EPOCH_DIFF) / RATE_DIFF) - -// Visual Studio 6 does not know __func__ or __FUNCTION__ -// The rest of MS compilers use __FUNCTION__, not C99 __func__ -// Also use _strtoui64 on modern M$ compilers -#if defined(_MSC_VER) && _MSC_VER < 1300 -#define STRX(x) #x -#define STR(x) STRX(x) -#define __func__ __FILE__ ":" STR(__LINE__) -#define strtoull(x, y, z) strtoul(x, y, z) -#define strtoll(x, y, z) strtol(x, y, z) -#else -#define __func__ __FUNCTION__ -#define strtoull(x, y, z) _strtoui64(x, y, z) -#define strtoll(x, y, z) _strtoi64(x, y, z) -#endif // _MSC_VER - -#define ERRNO GetLastError() -#define NO_SOCKLEN_T -#define SSL_LIB "ssleay32.dll" -#define CRYPTO_LIB "libeay32.dll" -#define O_NONBLOCK 0 -#if !defined(EWOULDBLOCK) -#define EWOULDBLOCK WSAEWOULDBLOCK -#endif // !EWOULDBLOCK -#define _POSIX_ -#define INT64_FMT "I64d" - -#define WINCDECL __cdecl -#define SHUT_WR 1 -#define snprintf _snprintf -#define vsnprintf _vsnprintf -#define mg_sleep(x) Sleep(x) - -#define pipe(x) _pipe(x, MG_BUF_LEN, _O_BINARY) -#ifndef popen -#define popen(x, y) _popen(x, y) -#endif -#ifndef pclose -#define pclose(x) _pclose(x) -#endif -#define close(x) _close(x) -#define dlsym(x,y) GetProcAddress((HINSTANCE) (x), (y)) -#define RTLD_LAZY 0 -#define fseeko(x, y, z) _lseeki64(_fileno(x), (y), (z)) -#define fdopen(x, y) _fdopen((x), (y)) -#define write(x, y, z) _write((x), (y), (unsigned) z) -#define read(x, y, z) _read((x), (y), (unsigned) z) -#define flockfile(x) EnterCriticalSection(&global_log_file_lock) -#define funlockfile(x) LeaveCriticalSection(&global_log_file_lock) -#define sleep(x) Sleep((x) * 1000) - -#if !defined(va_copy) -#define va_copy(x, y) x = y -#endif // !va_copy MINGW #defines va_copy - -#if !defined(fileno) -#define fileno(x) _fileno(x) -#endif // !fileno MINGW #defines fileno - -typedef HANDLE pthread_mutex_t; -typedef struct {HANDLE signal, broadcast;} pthread_cond_t; -typedef DWORD pthread_t; -#define pid_t HANDLE // MINGW typedefs pid_t to int. Using #define here. - -static int pthread_mutex_lock(pthread_mutex_t *); -static int pthread_mutex_unlock(pthread_mutex_t *); -static void to_unicode(const char *path, wchar_t *wbuf, size_t wbuf_len); -struct file; -static char *mg_fgets(char *buf, size_t size, struct file *filep, char **p); - -#if defined(HAVE_STDINT) -#include <stdint.h> -#else -typedef unsigned int uint32_t; -typedef unsigned short uint16_t; -typedef unsigned __int64 uint64_t; -typedef __int64 int64_t; -#define INT64_MAX 9223372036854775807 -#endif // HAVE_STDINT - -// POSIX dirent interface -struct dirent { - char d_name[PATH_MAX]; +struct ctl_msg { + mg_event_handler_t callback; + char message[MG_CTL_MSG_MESSAGE_SIZE]; }; -typedef struct DIR { - HANDLE handle; - WIN32_FIND_DATAW info; - struct dirent result; -} DIR; - -#ifndef HAS_POLL -struct pollfd { - int fd; - short events; - short revents; -}; -#define POLLIN 1 +#if MG_ENABLE_MQTT +struct mg_mqtt_message; +MG_INTERNAL int parse_mqtt(struct mbuf *io, struct mg_mqtt_message *mm); #endif +/* Forward declarations for testing. */ +extern void *(*test_malloc)(size_t size); +extern void *(*test_calloc)(size_t count, size_t size); -// Mark required libraries -#ifdef _MSC_VER -#pragma comment(lib, "Ws2_32.lib") +#ifndef MIN +#define MIN(a, b) ((a) < (b) ? (a) : (b)) #endif -#else // UNIX specific -#include <sys/wait.h> -#include <sys/socket.h> -#include <poll.h> -#include <netinet/in.h> -#include <arpa/inet.h> -#include <sys/time.h> -#include <stdint.h> -#include <inttypes.h> -#include <netdb.h> - -#include <pwd.h> -#include <unistd.h> -#include <dirent.h> -#if !defined(NO_SSL_DL) && !defined(NO_SSL) -#include <dlfcn.h> -#endif -#include <pthread.h> -#if defined(__MACH__) -#define SSL_LIB "libssl.dylib" -#define CRYPTO_LIB "libcrypto.dylib" -#else -#if !defined(SSL_LIB) -#define SSL_LIB "libssl.so" +#if MG_ENABLE_HTTP +struct mg_serve_http_opts; + +/* + * Reassemble the content of the buffer (buf, blen) which should be + * in the HTTP chunked encoding, by collapsing data chunks to the + * beginning of the buffer. + * + * If chunks get reassembled, modify hm->body to point to the reassembled + * body and fire MG_EV_HTTP_CHUNK event. If handler sets MG_F_DELETE_CHUNK + * in nc->flags, delete reassembled body from the mbuf. + * + * Return reassembled body size. + */ +MG_INTERNAL size_t mg_handle_chunked(struct mg_connection *nc, + struct http_message *hm, char *buf, + size_t blen); + +#if MG_ENABLE_FILESYSTEM +MG_INTERNAL int mg_uri_to_local_path(struct http_message *hm, + const struct mg_serve_http_opts *opts, + char **local_path, + struct mg_str *remainder); +MG_INTERNAL time_t mg_parse_date_string(const char *datetime); +MG_INTERNAL int mg_is_not_modified(struct http_message *hm, cs_stat_t *st); +#endif +#if MG_ENABLE_HTTP_CGI +MG_INTERNAL void mg_handle_cgi(struct mg_connection *nc, const char *prog, + const struct mg_str *path_info, + const struct http_message *hm, + const struct mg_serve_http_opts *opts); +struct mg_http_proto_data_cgi; +MG_INTERNAL void mg_http_free_proto_data_cgi(struct mg_http_proto_data_cgi *d); #endif -#if !defined(CRYPTO_LIB) -#define CRYPTO_LIB "libcrypto.so" +#if MG_ENABLE_HTTP_SSI +MG_INTERNAL void mg_handle_ssi_request(struct mg_connection *nc, + struct http_message *hm, + const char *path, + const struct mg_serve_http_opts *opts); #endif +#if MG_ENABLE_HTTP_WEBDAV +MG_INTERNAL int mg_is_dav_request(const struct mg_str *s); +MG_INTERNAL void mg_handle_propfind(struct mg_connection *nc, const char *path, + cs_stat_t *stp, struct http_message *hm, + struct mg_serve_http_opts *opts); +MG_INTERNAL void mg_handle_lock(struct mg_connection *nc, const char *path); +MG_INTERNAL void mg_handle_mkcol(struct mg_connection *nc, const char *path, + struct http_message *hm); +MG_INTERNAL void mg_handle_move(struct mg_connection *c, + const struct mg_serve_http_opts *opts, + const char *path, struct http_message *hm); +MG_INTERNAL void mg_handle_delete(struct mg_connection *nc, + const struct mg_serve_http_opts *opts, + const char *path); +MG_INTERNAL void mg_handle_put(struct mg_connection *nc, const char *path, + struct http_message *hm); #endif -#ifndef O_BINARY -#define O_BINARY 0 -#endif // O_BINARY -#define closesocket(a) close(a) -#define mg_mkdir(x, y) mkdir(x, y) -#define mg_remove(x) remove(x) -#define mg_sleep(x) usleep((x) * 1000) -#define ERRNO errno -#define INVALID_SOCKET (-1) -#define INT64_FMT PRId64 -typedef int SOCKET; -#define WINCDECL +#if MG_ENABLE_HTTP_WEBSOCKET +MG_INTERNAL void mg_ws_handler(struct mg_connection *nc, int ev, + void *ev_data MG_UD_ARG(void *user_data)); +MG_INTERNAL void mg_ws_handshake(struct mg_connection *nc, + const struct mg_str *key, + struct http_message *); +#endif +#endif /* MG_ENABLE_HTTP */ -#endif // End of Windows and UNIX specific includes +MG_INTERNAL int mg_get_errno(void); -#include "mongoose.h" -#include "mongoose_interface.h" +MG_INTERNAL void mg_close_conn(struct mg_connection *conn); -#ifdef USE_LUA -#include <lua.h> -#include <lauxlib.h> +#if MG_ENABLE_SNTP +MG_INTERNAL int mg_sntp_parse_reply(const char *buf, int len, + struct mg_sntp_message *msg); #endif -#define MONGOOSE_VERSION "3.8" -#define PASSWORDS_FILE_NAME ".htpasswd" -#define CGI_ENVIRONMENT_SIZE 4096 -#define MAX_CGI_ENVIR_VARS 64 -#define MG_BUF_LEN 8192 -#define MAX_REQUEST_SIZE 16384 -#define ARRAY_SIZE(array) (sizeof(array) / sizeof(array[0])) +#endif /* CS_MONGOOSE_SRC_INTERNAL_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/mg_mem.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ -#ifdef _WIN32 -static CRITICAL_SECTION global_log_file_lock; -static pthread_t pthread_self(void) { - return GetCurrentThreadId(); -} -#endif // _WIN32 +#ifndef CS_COMMON_MG_MEM_H_ +#define CS_COMMON_MG_MEM_H_ -#ifdef DEBUG_TRACE -#undef DEBUG_TRACE -#define DEBUG_TRACE(x) -#else -#if defined(DEBUG) -#define DEBUG_TRACE(x) do { \ - flockfile(stdout); \ - printf("*** %lu.%p.%s.%d: ", \ - (unsigned long) time(NULL), (void *) pthread_self(), \ - __func__, __LINE__); \ - printf x; \ - putchar('\n'); \ - fflush(stdout); \ - funlockfile(stdout); \ -} while (0) -#else -#define DEBUG_TRACE(x) -#endif // DEBUG -#endif // DEBUG_TRACE +#ifdef __cplusplus +extern "C" { +#endif -// Darwin prior to 7.0 and Win32 do not have socklen_t -#ifdef NO_SOCKLEN_T -typedef int socklen_t; -#endif // NO_SOCKLEN_T -#define _DARWIN_UNLIMITED_SELECT +#ifndef MG_MALLOC +#define MG_MALLOC malloc +#endif -#if !defined(MSG_NOSIGNAL) -#define MSG_NOSIGNAL 0 +#ifndef MG_CALLOC +#define MG_CALLOC calloc #endif -#if !defined(SOMAXCONN) -#define SOMAXCONN 100 +#ifndef MG_REALLOC +#define MG_REALLOC realloc #endif -#if !defined(PATH_MAX) -#define PATH_MAX 4096 +#ifndef MG_FREE +#define MG_FREE free #endif -static const char *http_500_error = "Internal Server Error"; +#ifdef __cplusplus +} +#endif -#if defined(NO_SSL_DL) -#include <openssl/ssl.h> -#include <openssl/err.h> -#else -// SSL loaded dynamically from DLL. -// I put the prototypes here to be independent from OpenSSL source installation. -typedef struct ssl_st SSL; -typedef struct ssl_method_st SSL_METHOD; -typedef struct ssl_ctx_st SSL_CTX; - -struct ssl_func { - const char *name; // SSL function name - void (*ptr)(void); // Function pointer -}; +#endif /* CS_COMMON_MG_MEM_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/cs_dbg.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ -#define SSL_free (* (void (*)(SSL *)) ssl_sw[0].ptr) -#define SSL_accept (* (int (*)(SSL *)) ssl_sw[1].ptr) -#define SSL_connect (* (int (*)(SSL *)) ssl_sw[2].ptr) -#define SSL_read (* (int (*)(SSL *, void *, int)) ssl_sw[3].ptr) -#define SSL_write (* (int (*)(SSL *, const void *,int)) ssl_sw[4].ptr) -#define SSL_get_error (* (int (*)(SSL *, int)) ssl_sw[5].ptr) -#define SSL_set_fd (* (int (*)(SSL *, SOCKET)) ssl_sw[6].ptr) -#define SSL_new (* (SSL * (*)(SSL_CTX *)) ssl_sw[7].ptr) -#define SSL_CTX_new (* (SSL_CTX * (*)(SSL_METHOD *)) ssl_sw[8].ptr) -#define SSLv23_server_method (* (SSL_METHOD * (*)(void)) ssl_sw[9].ptr) -#define SSL_library_init (* (int (*)(void)) ssl_sw[10].ptr) -#define SSL_CTX_use_PrivateKey_file (* (int (*)(SSL_CTX *, \ - const char *, int)) ssl_sw[11].ptr) -#define SSL_CTX_use_certificate_file (* (int (*)(SSL_CTX *, \ - const char *, int)) ssl_sw[12].ptr) -#define SSL_CTX_set_default_passwd_cb \ - (* (void (*)(SSL_CTX *, mg_callback_t)) ssl_sw[13].ptr) -#define SSL_CTX_free (* (void (*)(SSL_CTX *)) ssl_sw[14].ptr) -#define SSL_load_error_strings (* (void (*)(void)) ssl_sw[15].ptr) -#define SSL_CTX_use_certificate_chain_file \ - (* (int (*)(SSL_CTX *, const char *)) ssl_sw[16].ptr) -#define SSLv23_client_method (* (SSL_METHOD * (*)(void)) ssl_sw[17].ptr) -#define SSL_pending (* (int (*)(SSL *)) ssl_sw[18].ptr) -#define SSL_CTX_set_verify (* (void (*)(SSL_CTX *, int, int)) ssl_sw[19].ptr) - -#define CRYPTO_num_locks (* (int (*)(void)) crypto_sw[0].ptr) -#define CRYPTO_set_locking_callback \ - (* (void (*)(void (*)(int, int, const char *, int))) crypto_sw[1].ptr) -#define CRYPTO_set_id_callback \ - (* (void (*)(unsigned long (*)(void))) crypto_sw[2].ptr) -#define ERR_get_error (* (unsigned long (*)(void)) crypto_sw[3].ptr) -#define ERR_error_string (* (char * (*)(unsigned long,char *)) crypto_sw[4].ptr) - -// set_ssl_option() function updates this array. -// It loads SSL library dynamically and changes NULLs to the actual addresses -// of respective functions. The macros above (like SSL_connect()) are really -// just calling these functions indirectly via the pointer. -static struct ssl_func ssl_sw[] = { - {"SSL_free", NULL}, - {"SSL_accept", NULL}, - {"SSL_connect", NULL}, - {"SSL_read", NULL}, - {"SSL_write", NULL}, - {"SSL_get_error", NULL}, - {"SSL_set_fd", NULL}, - {"SSL_new", NULL}, - {"SSL_CTX_new", NULL}, - {"SSLv23_server_method", NULL}, - {"SSL_library_init", NULL}, - {"SSL_CTX_use_PrivateKey_file", NULL}, - {"SSL_CTX_use_certificate_file",NULL}, - {"SSL_CTX_set_default_passwd_cb",NULL}, - {"SSL_CTX_free", NULL}, - {"SSL_load_error_strings", NULL}, - {"SSL_CTX_use_certificate_chain_file", NULL}, - {"SSLv23_client_method", NULL}, - {"SSL_pending", NULL}, - {"SSL_CTX_set_verify", NULL}, - {NULL, NULL} -}; +#ifndef CS_COMMON_CS_DBG_H_ +#define CS_COMMON_CS_DBG_H_ -// Similar array as ssl_sw. These functions could be located in different lib. -#if !defined(NO_SSL) -static struct ssl_func crypto_sw[] = { - {"CRYPTO_num_locks", NULL}, - {"CRYPTO_set_locking_callback", NULL}, - {"CRYPTO_set_id_callback", NULL}, - {"ERR_get_error", NULL}, - {"ERR_error_string", NULL}, - {NULL, NULL} -}; -#endif // NO_SSL -#endif // NO_SSL_DL +/* Amalgamated: #include "common/platform.h" */ -static const char *month_names[] = { - "Jan", "Feb", "Mar", "Apr", "May", "Jun", - "Jul", "Aug", "Sep", "Oct", "Nov", "Dec" -}; +#if CS_ENABLE_STDIO +#include <stdio.h> +#endif -// Unified socket address. For IPv6 support, add IPv6 address structure -// in the union u. -union usa { - struct sockaddr sa; - struct sockaddr_in sin; -#if defined(USE_IPV6) - struct sockaddr_in6 sin6; +#ifndef CS_ENABLE_DEBUG +#define CS_ENABLE_DEBUG 0 #endif -}; -// Describes a string (chunk of memory). -struct vec { - const char *ptr; - size_t len; -}; +#ifndef CS_LOG_ENABLE_TS_DIFF +#define CS_LOG_ENABLE_TS_DIFF 0 +#endif -struct file { - int is_directory; - time_t modification_time; - int64_t size; - FILE *fp; - const char *membuf; // Non-NULL if file data is in memory -}; -#define STRUCT_FILE_INITIALIZER {0, 0, 0, NULL, NULL} - -// Describes listening socket, or socket which was accept()-ed by the master -// thread and queued for future handling by the worker thread. -struct socket { - SOCKET sock; // Listening socket - union usa lsa; // Local socket address - union usa rsa; // Remote socket address - unsigned is_ssl:1; // Is port SSL-ed - unsigned ssl_redir:1; // Is port supposed to redirect everything to SSL port -}; +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ -// NOTE(lsm): this enum shoulds be in sync with the config_options below. -enum { - CGI_EXTENSIONS, CGI_ENVIRONMENT, PUT_DELETE_PASSWORDS_FILE, CGI_INTERPRETER, - PROTECT_URI, AUTHENTICATION_DOMAIN, SSI_EXTENSIONS, THROTTLE, - ACCESS_LOG_FILE, ENABLE_DIRECTORY_LISTING, ERROR_LOG_FILE, - GLOBAL_PASSWORDS_FILE, INDEX_FILES, ENABLE_KEEP_ALIVE, ACCESS_CONTROL_LIST, - EXTRA_MIME_TYPES, LISTENING_PORTS, DOCUMENT_ROOT, SSL_CERTIFICATE, - NUM_THREADS, RUN_AS_USER, REWRITE, HIDE_FILES, REQUEST_TIMEOUT, - NUM_OPTIONS -}; +enum cs_log_level { + LL_NONE = -1, + LL_ERROR = 0, + LL_WARN = 1, + LL_INFO = 2, + LL_DEBUG = 3, + LL_VERBOSE_DEBUG = 4, -static const char *config_options[] = { - "cgi_pattern", "**.cgi$|**.pl$|**.php$", - "cgi_environment", NULL, - "put_delete_auth_file", NULL, - "cgi_interpreter", NULL, - "protect_uri", NULL, - "authentication_domain", "mydomain.com", - "ssi_pattern", "**.shtml$|**.shtm$", - "throttle", NULL, - "access_log_file", NULL, - "enable_directory_listing", "yes", - "error_log_file", NULL, - "global_auth_file", NULL, - "index_files", - "index.html,index.htm,index.cgi,index.shtml,index.php,index.lp", - "enable_keep_alive", "no", - "access_control_list", NULL, - "extra_mime_types", NULL, - "listening_ports", "8080", - "document_root", ".", - "ssl_certificate", NULL, - "num_threads", "50", - "run_as_user", NULL, - "url_rewrite_patterns", NULL, - "hide_files_patterns", NULL, - "request_timeout_ms", "30000", - NULL + _LL_MIN = -2, + _LL_MAX = 5, }; -void mongoose_print_help(void) -{ - int i; - - fprintf( - stdout, - "\tmongoose arguments:\n"); - - for (i = 0; config_options[i] != NULL; i += 2) { - fprintf(stdout, - "\t -%s %s %s %s\n", - config_options[i], - (config_options[i + 1] != NULL) ? "(default : " : "", - (config_options[i + 1] != NULL) ? config_options[i + 1] : "", - (config_options[i + 1] != NULL) ? ")" : "" - ); - } -} - -struct mg_context { - volatile int stop_flag; // Should we stop event loop - SSL_CTX *ssl_ctx; // SSL context - char *config[NUM_OPTIONS]; // Mongoose configuration parameters - struct mg_callbacks callbacks; // User-defined callback function - void *user_data; // User-defined data - - struct socket *listening_sockets; - int num_listening_sockets; - - volatile int num_threads; // Number of threads - pthread_mutex_t mutex; // Protects (max|num)_threads - pthread_cond_t cond; // Condvar for tracking workers terminations - - struct socket queue[20]; // Accepted sockets - volatile int sq_head; // Head of the socket queue - volatile int sq_tail; // Tail of the socket queue - pthread_cond_t sq_full; // Signaled when socket is produced - pthread_cond_t sq_empty; // Signaled when socket is consumed -}; +/* Set log level. */ +void cs_log_set_level(enum cs_log_level level); -struct mg_connection { - struct mg_request_info request_info; - struct mg_context *ctx; - SSL *ssl; // SSL descriptor - SSL_CTX *client_ssl_ctx; // SSL context for client connections - struct socket client; // Connected client - time_t birth_time; // Time when request was received - int64_t num_bytes_sent; // Total bytes sent to client - int64_t content_len; // Content-Length header value - int64_t consumed_content; // How many bytes of content have been read - char *buf; // Buffer for received data - char *path_info; // PATH_INFO part of the URL - int must_close; // 1 if connection must be closed - int buf_size; // Buffer size - int request_len; // Size of the request + headers in a buffer - int data_len; // Total size of data in a buffer - int status_code; // HTTP reply status code, e.g. 200 - int throttle; // Throttling, bytes/sec. <= 0 means no throttle - time_t last_throttle_time; // Last time throttled data was sent - int64_t last_throttle_bytes;// Bytes sent this second -}; +/* Set log filter. NULL (a default) logs everything. */ +void cs_log_set_filter(const char *source_file_name); -const char **mg_get_valid_option_names(void) { - return config_options; -} +int cs_log_print_prefix(enum cs_log_level level, const char *func, + const char *filename); -static int is_file_in_memory(struct mg_connection *conn, const char *path, - struct file *filep) { - size_t size = 0; - if ((filep->membuf = conn->ctx->callbacks.open_file == NULL ? NULL : - conn->ctx->callbacks.open_file(conn, path, &size)) != NULL) { - // NOTE: override filep->size only on success. Otherwise, it might break - // constructs like if (!mg_stat() || !mg_fopen()) ... - filep->size = size; - } - return filep->membuf != NULL; -} +extern enum cs_log_level cs_log_threshold; -static int is_file_opened(const struct file *filep) { - return filep->membuf != NULL || filep->fp != NULL; -} +#if CS_ENABLE_STDIO -static int mg_fopen(struct mg_connection *conn, const char *path, - const char *mode, struct file *filep) { - if (!is_file_in_memory(conn, path, filep)) { -#ifdef _WIN32 - wchar_t wbuf[PATH_MAX], wmode[20]; - to_unicode(path, wbuf, ARRAY_SIZE(wbuf)); - MultiByteToWideChar(CP_UTF8, 0, mode, -1, wmode, ARRAY_SIZE(wmode)); - filep->fp = _wfopen(wbuf, wmode); -#else - filep->fp = fopen(path, mode); +void cs_log_set_file(FILE *file); +void cs_log_printf(const char *fmt, ...) +#ifdef __GNUC__ + __attribute__((format(printf, 1, 2))) #endif - } + ; - return is_file_opened(filep); -} +#define LOG(l, x) \ + do { \ + if (cs_log_print_prefix(l, __func__, __FILE__)) cs_log_printf x; \ + } while (0) -static void mg_fclose(struct file *filep) { - if (filep != NULL && filep->fp != NULL) { - fclose(filep->fp); - } -} +#ifndef CS_NDEBUG -static int get_option_index(const char *name) { - int i; +#define DBG(x) LOG(LL_VERBOSE_DEBUG, x) - for (i = 0; config_options[i * 2] != NULL; i++) { - if (strcmp(config_options[i * 2], name) == 0) { - return i; - } - } - return -1; -} +#else /* NDEBUG */ -const char *mg_get_option(const struct mg_context *ctx, const char *name) { - int i; - if ((i = get_option_index(name)) == -1) { - return NULL; - } else if (ctx->config[i] == NULL) { - return ""; - } else { - return ctx->config[i]; - } -} +#define DBG(x) -static void sockaddr_to_string(char *buf, size_t len, - const union usa *usa) { - buf[0] = '\0'; -#if defined(USE_IPV6) - inet_ntop(usa->sa.sa_family, usa->sa.sa_family == AF_INET ? - (void *) &usa->sin.sin_addr : - (void *) &usa->sin6.sin6_addr, buf, len); -#elif defined(_WIN32) - // Only Windoze Vista (and newer) have inet_ntop() - strncpy(buf, inet_ntoa(usa->sin.sin_addr), len); -#else - inet_ntop(usa->sa.sa_family, (void *) &usa->sin.sin_addr, buf, len); #endif -} - -static void cry(struct mg_connection *conn, - PRINTF_FORMAT_STRING(const char *fmt), ...) PRINTF_ARGS(2, 3); - -// Print error message to the opened error log stream. -static void cry(struct mg_connection *conn, const char *fmt, ...) { - char buf[MG_BUF_LEN], src_addr[20]; - va_list ap; - FILE *fp; - time_t timestamp; - - va_start(ap, fmt); - (void) vsnprintf(buf, sizeof(buf), fmt, ap); - va_end(ap); - - // Do not lock when getting the callback value, here and below. - // I suppose this is fine, since function cannot disappear in the - // same way string option can. - if (conn->ctx->callbacks.log_message == NULL || - conn->ctx->callbacks.log_message(conn, buf) == 0) { - fp = conn->ctx == NULL || conn->ctx->config[ERROR_LOG_FILE] == NULL ? NULL : - fopen(conn->ctx->config[ERROR_LOG_FILE], "a+"); - if (fp != NULL) { - flockfile(fp); - timestamp = time(NULL); +#else /* CS_ENABLE_STDIO */ - sockaddr_to_string(src_addr, sizeof(src_addr), &conn->client.rsa); - fprintf(fp, "[%010lu] [error] [client %s] ", (unsigned long) timestamp, - src_addr); +#define LOG(l, x) +#define DBG(x) - if (conn->request_info.request_method != NULL) { - fprintf(fp, "%s %s: ", conn->request_info.request_method, - conn->request_info.uri); - } +#endif - fprintf(fp, "%s", buf); - fputc('\n', fp); - funlockfile(fp); - fclose(fp); - } - } +#ifdef __cplusplus } +#endif /* __cplusplus */ -// Return fake connection structure. Used for logging, if connection -// is not applicable at the moment of logging. -static struct mg_connection *fc(struct mg_context *ctx) { - static struct mg_connection fake_connection; - fake_connection.ctx = ctx; - return &fake_connection; -} +#endif /* CS_COMMON_CS_DBG_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/cs_dbg.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ -const char *mg_version(void) { - return MONGOOSE_VERSION; -} +/* Amalgamated: #include "common/cs_dbg.h" */ -struct mg_request_info *mg_get_request_info(struct mg_connection *conn) { - return &conn->request_info; -} +#include <stdarg.h> +#include <stdio.h> +#include <string.h> -static void mg_strlcpy(register char *dst, register const char *src, size_t n) { - for (; *src != '\0' && n > 1; n--) { - *dst++ = *src++; - } - *dst = '\0'; -} +/* Amalgamated: #include "common/cs_time.h" */ +/* Amalgamated: #include "common/str_util.h" */ -static int lowercase(const char *s) { - return tolower(* (const unsigned char *) s); -} +enum cs_log_level cs_log_threshold WEAK = +#if CS_ENABLE_DEBUG + LL_VERBOSE_DEBUG; +#else + LL_ERROR; +#endif -static int mg_strncasecmp(const char *s1, const char *s2, size_t len) { - int diff = 0; +static char *s_filter_pattern = NULL; +static size_t s_filter_pattern_len; - if (len > 0) - do { - diff = lowercase(s1++) - lowercase(s2++); - } while (diff == 0 && s1[-1] != '\0' && --len > 0); +#if CS_ENABLE_STDIO - return diff; -} +FILE *cs_log_file WEAK = NULL; -static int mg_strcasecmp(const char *s1, const char *s2) { - int diff; +#if CS_LOG_ENABLE_TS_DIFF +double cs_log_ts WEAK; +#endif - do { - diff = lowercase(s1++) - lowercase(s2++); - } while (diff == 0 && s1[-1] != '\0'); +enum cs_log_level cs_log_cur_msg_level WEAK = LL_NONE; - return diff; +void cs_log_set_filter(const char *str) WEAK; +void cs_log_set_filter(const char *str) { + free(s_filter_pattern); + if (str != NULL) { + s_filter_pattern = strdup(str); + s_filter_pattern_len = strlen(str); + } else { + s_filter_pattern = NULL; + s_filter_pattern_len = 0; + } } -static char * mg_strndup(const char *ptr, size_t len) { - char *p; +int cs_log_print_prefix(enum cs_log_level, const char *, const char *) WEAK; +int cs_log_print_prefix(enum cs_log_level level, const char *func, + const char *filename) { + char prefix[21]; - if ((p = (char *) malloc(len + 1)) != NULL) { - mg_strlcpy(p, ptr, len + 1); + if (level > cs_log_threshold) return 0; + if (s_filter_pattern != NULL && + mg_match_prefix(s_filter_pattern, s_filter_pattern_len, func) < 0 && + mg_match_prefix(s_filter_pattern, s_filter_pattern_len, filename) < 0) { + return 0; } - return p; + strncpy(prefix, func, 20); + prefix[20] = '\0'; + if (cs_log_file == NULL) cs_log_file = stderr; + cs_log_cur_msg_level = level; + fprintf(cs_log_file, "%-20s ", prefix); +#if CS_LOG_ENABLE_TS_DIFF + { + double now = cs_time(); + fprintf(cs_log_file, "%7u ", (unsigned int) ((now - cs_log_ts) * 1000000)); + cs_log_ts = now; + } +#endif + return 1; } -static char * mg_strdup(const char *str) { - return mg_strndup(str, strlen(str)); +void cs_log_printf(const char *fmt, ...) WEAK; +void cs_log_printf(const char *fmt, ...) { + va_list ap; + va_start(ap, fmt); + vfprintf(cs_log_file, fmt, ap); + va_end(ap); + fputc('\n', cs_log_file); + fflush(cs_log_file); + cs_log_cur_msg_level = LL_NONE; } -const char *mg_strcasestr(const char *big_str, const char *small_str) { - int i, big_len = strlen(big_str), small_len = strlen(small_str); +void cs_log_set_file(FILE *file) WEAK; +void cs_log_set_file(FILE *file) { + cs_log_file = file; +} - for (i = 0; i <= big_len - small_len; i++) { - if (mg_strncasecmp(big_str + i, small_str, small_len) == 0) { - return big_str + i; - } - } +#endif /* CS_ENABLE_STDIO */ - return NULL; +void cs_log_set_level(enum cs_log_level level) WEAK; +void cs_log_set_level(enum cs_log_level level) { + cs_log_threshold = level; +#if CS_LOG_ENABLE_TS_DIFF && CS_ENABLE_STDIO + cs_log_ts = cs_time(); +#endif } +#ifdef MG_MODULE_LINES +#line 1 "common/base64.c" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ -// Like snprintf(), but never returns negative value, or a value -// that is larger than a supplied buffer. -// Thanks to Adam Zeldis to pointing snprintf()-caused vulnerability -// in his audit report. -static int mg_vsnprintf(struct mg_connection *conn, char *buf, size_t buflen, - const char *fmt, va_list ap) { - int n; +#ifndef EXCLUDE_COMMON - if (buflen == 0) - return 0; +/* Amalgamated: #include "common/base64.h" */ - n = vsnprintf(buf, buflen, fmt, ap); +#include <string.h> - if (n < 0) { - cry(conn, "vsnprintf error"); - n = 0; - } else if (n >= (int) buflen) { - cry(conn, "truncating vsnprintf buffer: [%.*s]", - n > 200 ? 200 : n, buf); - n = (int) buflen - 1; +/* Amalgamated: #include "common/cs_dbg.h" */ + +/* ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/ */ + +#define NUM_UPPERCASES ('Z' - 'A' + 1) +#define NUM_LETTERS (NUM_UPPERCASES * 2) +#define NUM_DIGITS ('9' - '0' + 1) + +/* + * Emit a base64 code char. + * + * Doesn't use memory, thus it's safe to use to safely dump memory in crashdumps + */ +static void cs_base64_emit_code(struct cs_base64_ctx *ctx, int v) { + if (v < NUM_UPPERCASES) { + ctx->b64_putc(v + 'A', ctx->user_data); + } else if (v < (NUM_LETTERS)) { + ctx->b64_putc(v - NUM_UPPERCASES + 'a', ctx->user_data); + } else if (v < (NUM_LETTERS + NUM_DIGITS)) { + ctx->b64_putc(v - NUM_LETTERS + '0', ctx->user_data); + } else { + ctx->b64_putc(v - NUM_LETTERS - NUM_DIGITS == 0 ? '+' : '/', + ctx->user_data); } - buf[n] = '\0'; - - return n; } -static int mg_snprintf(struct mg_connection *conn, char *buf, size_t buflen, - PRINTF_FORMAT_STRING(const char *fmt), ...) - PRINTF_ARGS(4, 5); +static void cs_base64_emit_chunk(struct cs_base64_ctx *ctx) { + int a, b, c; -static int mg_snprintf(struct mg_connection *conn, char *buf, size_t buflen, - const char *fmt, ...) { - va_list ap; - int n; + a = ctx->chunk[0]; + b = ctx->chunk[1]; + c = ctx->chunk[2]; - va_start(ap, fmt); - n = mg_vsnprintf(conn, buf, buflen, fmt, ap); - va_end(ap); + cs_base64_emit_code(ctx, a >> 2); + cs_base64_emit_code(ctx, ((a & 3) << 4) | (b >> 4)); + if (ctx->chunk_size > 1) { + cs_base64_emit_code(ctx, (b & 15) << 2 | (c >> 6)); + } + if (ctx->chunk_size > 2) { + cs_base64_emit_code(ctx, c & 63); + } +} - return n; +void cs_base64_init(struct cs_base64_ctx *ctx, cs_base64_putc_t b64_putc, + void *user_data) { + ctx->chunk_size = 0; + ctx->b64_putc = b64_putc; + ctx->user_data = user_data; } -// Skip the characters until one of the delimiters characters found. -// 0-terminate resulting word. Skip the delimiter and following whitespaces. -// Advance pointer to buffer to the next word. Return found 0-terminated word. -// Delimiters can be quoted with quotechar. -static char *skip_quoted(char **buf, const char *delimiters, - const char *whitespace, char quotechar) { - char *p, *begin_word, *end_word, *end_whitespace; - - begin_word = *buf; - end_word = begin_word + strcspn(begin_word, delimiters); - - // Check for quotechar - if (end_word > begin_word) { - p = end_word - 1; - while (*p == quotechar) { - // If there is anything beyond end_word, copy it - if (*end_word == '\0') { - *p = '\0'; - break; - } else { - size_t end_off = strcspn(end_word + 1, delimiters); - memmove (p, end_word, end_off + 1); - p += end_off; // p must correspond to end_word - 1 - end_word += end_off + 1; - } +void cs_base64_update(struct cs_base64_ctx *ctx, const char *str, size_t len) { + const unsigned char *src = (const unsigned char *) str; + size_t i; + for (i = 0; i < len; i++) { + ctx->chunk[ctx->chunk_size++] = src[i]; + if (ctx->chunk_size == 3) { + cs_base64_emit_chunk(ctx); + ctx->chunk_size = 0; } - for (p++; p < end_word; p++) { - *p = '\0'; + } +} + +void cs_base64_finish(struct cs_base64_ctx *ctx) { + if (ctx->chunk_size > 0) { + int i; + memset(&ctx->chunk[ctx->chunk_size], 0, 3 - ctx->chunk_size); + cs_base64_emit_chunk(ctx); + for (i = 0; i < (3 - ctx->chunk_size); i++) { + ctx->b64_putc('=', ctx->user_data); } } +} - if (*end_word == '\0') { - *buf = end_word; - } else { - end_whitespace = end_word + 1 + strspn(end_word + 1, whitespace); +#define BASE64_ENCODE_BODY \ + static const char *b64 = \ + "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; \ + int i, j, a, b, c; \ + \ + for (i = j = 0; i < src_len; i += 3) { \ + a = src[i]; \ + b = i + 1 >= src_len ? 0 : src[i + 1]; \ + c = i + 2 >= src_len ? 0 : src[i + 2]; \ + \ + BASE64_OUT(b64[a >> 2]); \ + BASE64_OUT(b64[((a & 3) << 4) | (b >> 4)]); \ + if (i + 1 < src_len) { \ + BASE64_OUT(b64[(b & 15) << 2 | (c >> 6)]); \ + } \ + if (i + 2 < src_len) { \ + BASE64_OUT(b64[c & 63]); \ + } \ + } \ + \ + while (j % 4 != 0) { \ + BASE64_OUT('='); \ + } \ + BASE64_FLUSH() + +#define BASE64_OUT(ch) \ + do { \ + dst[j++] = (ch); \ + } while (0) + +#define BASE64_FLUSH() \ + do { \ + dst[j++] = '\0'; \ + } while (0) + +void cs_base64_encode(const unsigned char *src, int src_len, char *dst) { + BASE64_ENCODE_BODY; +} + +#undef BASE64_OUT +#undef BASE64_FLUSH + +#if CS_ENABLE_STDIO +#define BASE64_OUT(ch) \ + do { \ + fprintf(f, "%c", (ch)); \ + j++; \ + } while (0) + +#define BASE64_FLUSH() + +void cs_fprint_base64(FILE *f, const unsigned char *src, int src_len) { + BASE64_ENCODE_BODY; +} + +#undef BASE64_OUT +#undef BASE64_FLUSH +#endif /* CS_ENABLE_STDIO */ + +/* Convert one byte of encoded base64 input stream to 6-bit chunk */ +static unsigned char from_b64(unsigned char ch) { + /* Inverse lookup map */ + static const unsigned char tab[128] = { + 255, 255, 255, 255, + 255, 255, 255, 255, /* 0 */ + 255, 255, 255, 255, + 255, 255, 255, 255, /* 8 */ + 255, 255, 255, 255, + 255, 255, 255, 255, /* 16 */ + 255, 255, 255, 255, + 255, 255, 255, 255, /* 24 */ + 255, 255, 255, 255, + 255, 255, 255, 255, /* 32 */ + 255, 255, 255, 62, + 255, 255, 255, 63, /* 40 */ + 52, 53, 54, 55, + 56, 57, 58, 59, /* 48 */ + 60, 61, 255, 255, + 255, 200, 255, 255, /* 56 '=' is 200, on index 61 */ + 255, 0, 1, 2, + 3, 4, 5, 6, /* 64 */ + 7, 8, 9, 10, + 11, 12, 13, 14, /* 72 */ + 15, 16, 17, 18, + 19, 20, 21, 22, /* 80 */ + 23, 24, 25, 255, + 255, 255, 255, 255, /* 88 */ + 255, 26, 27, 28, + 29, 30, 31, 32, /* 96 */ + 33, 34, 35, 36, + 37, 38, 39, 40, /* 104 */ + 41, 42, 43, 44, + 45, 46, 47, 48, /* 112 */ + 49, 50, 51, 255, + 255, 255, 255, 255, /* 120 */ + }; + return tab[ch & 127]; +} + +int cs_base64_decode(const unsigned char *s, int len, char *dst, int *dec_len) { + unsigned char a, b, c, d; + int orig_len = len; + char *orig_dst = dst; + while (len >= 4 && (a = from_b64(s[0])) != 255 && + (b = from_b64(s[1])) != 255 && (c = from_b64(s[2])) != 255 && + (d = from_b64(s[3])) != 255) { + s += 4; + len -= 4; + if (a == 200 || b == 200) break; /* '=' can't be there */ + *dst++ = a << 2 | b >> 4; + if (c == 200) break; + *dst++ = b << 4 | c >> 2; + if (d == 200) break; + *dst++ = c << 6 | d; + } + *dst = 0; + if (dec_len != NULL) *dec_len = (dst - orig_dst); + return orig_len - len; +} + +#endif /* EXCLUDE_COMMON */ +#ifdef MG_MODULE_LINES +#line 1 "common/cs_dirent.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ - for (p = end_word; p < end_whitespace; p++) { - *p = '\0'; - } +#ifndef CS_COMMON_CS_DIRENT_H_ +#define CS_COMMON_CS_DIRENT_H_ - *buf = end_whitespace; - } +#include <limits.h> - return begin_word; -} +/* Amalgamated: #include "common/platform.h" */ -// Simplified version of skip_quoted without quote char -// and whitespace == delimiters -static char *skip(char **buf, const char *delimiters) { - return skip_quoted(buf, delimiters, delimiters, 0); -} +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ +#ifdef CS_DEFINE_DIRENT +typedef struct { int dummy; } DIR; -// Return HTTP header value, or NULL if not found. -static const char *get_header(const struct mg_request_info *ri, - const char *name) { - int i; +struct dirent { + int d_ino; +#ifdef _WIN32 + char d_name[MAX_PATH]; +#else + /* TODO(rojer): Use PATH_MAX but make sure it's sane on every platform */ + char d_name[256]; +#endif +}; - for (i = 0; i < ri->num_headers; i++) - if (!mg_strcasecmp(name, ri->http_headers[i].name)) - return ri->http_headers[i].value; +DIR *opendir(const char *dir_name); +int closedir(DIR *dir); +struct dirent *readdir(DIR *dir); +#endif /* CS_DEFINE_DIRENT */ - return NULL; +#ifdef __cplusplus } +#endif /* __cplusplus */ -const char *mg_get_header(const struct mg_connection *conn, const char *name) { - return get_header(&conn->request_info, name); -} +#endif /* CS_COMMON_CS_DIRENT_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/cs_dirent.c" +#endif +/* + * Copyright (c) 2015 Cesanta Software Limited + * All rights reserved + */ -// A helper function for traversing a comma separated list of values. -// It returns a list pointer shifted to the next value, or NULL if the end -// of the list found. -// Value is stored in val vector. If value has form "x=y", then eq_val -// vector is initialized to point to the "y" part, and val vector length -// is adjusted to point only to "x". -static const char *next_option(const char *list, struct vec *val, - struct vec *eq_val) { - if (list == NULL || *list == '\0') { - // End of the list - list = NULL; - } else { - val->ptr = list; - if ((list = strchr(val->ptr, ',')) != NULL) { - // Comma found. Store length and shift the list ptr - val->len = list - val->ptr; - list++; - } else { - // This value is the last one - list = val->ptr + strlen(val->ptr); - val->len = list - val->ptr; - } +#ifndef EXCLUDE_COMMON - if (eq_val != NULL) { - // Value has form "x=y", adjust pointers and lengths - // so that val points to "x", and eq_val points to "y". - eq_val->len = 0; - eq_val->ptr = (const char *) memchr(val->ptr, '=', val->len); - if (eq_val->ptr != NULL) { - eq_val->ptr++; // Skip over '=' character - eq_val->len = val->ptr + val->len - eq_val->ptr; - val->len = (eq_val->ptr - val->ptr) - 1; - } - } - } +/* Amalgamated: #include "common/mg_mem.h" */ +/* Amalgamated: #include "common/cs_dirent.h" */ - return list; -} +/* + * This file contains POSIX opendir/closedir/readdir API implementation + * for systems which do not natively support it (e.g. Windows). + */ -static int match_prefix(const char *pattern, int pattern_len, const char *str) { - const char *or_str; - int i, j, len, res; +#ifdef _WIN32 +struct win32_dir { + DIR d; + HANDLE handle; + WIN32_FIND_DATAW info; + struct dirent result; +}; - if ((or_str = (const char *) memchr(pattern, '|', pattern_len)) != NULL) { - res = match_prefix(pattern, or_str - pattern, str); - return res > 0 ? res : - match_prefix(or_str + 1, (pattern + pattern_len) - (or_str + 1), str); - } +DIR *opendir(const char *name) { + struct win32_dir *dir = NULL; + wchar_t wpath[MAX_PATH]; + DWORD attrs; - i = j = 0; - res = -1; - for (; i < pattern_len; i++, j++) { - if (pattern[i] == '?' && str[j] != '\0') { - continue; - } else if (pattern[i] == '$') { - return str[j] == '\0' ? j : -1; - } else if (pattern[i] == '*') { - i++; - if (pattern[i] == '*') { - i++; - len = (int) strlen(str + j); - } else { - len = (int) strcspn(str + j, "/"); - } - if (i == pattern_len) { - return j + len; - } - do { - res = match_prefix(pattern + i, pattern_len - i, str + j + len); - } while (res == -1 && len-- > 0); - return res == -1 ? -1 : j + res + len; - } else if (pattern[i] != str[j]) { - return -1; + if (name == NULL) { + SetLastError(ERROR_BAD_ARGUMENTS); + } else if ((dir = (struct win32_dir *) MG_MALLOC(sizeof(*dir))) == NULL) { + SetLastError(ERROR_NOT_ENOUGH_MEMORY); + } else { + to_wchar(name, wpath, ARRAY_SIZE(wpath)); + attrs = GetFileAttributesW(wpath); + if (attrs != 0xFFFFFFFF && (attrs & FILE_ATTRIBUTE_DIRECTORY)) { + (void) wcscat(wpath, L"\\*"); + dir->handle = FindFirstFileW(wpath, &dir->info); + dir->result.d_name[0] = '\0'; + } else { + MG_FREE(dir); + dir = NULL; } } - return j; -} -// HTTP 1.1 assumes keep alive if "Connection:" header is not set -// This function must tolerate situations when connection info is not -// set up, for example if request parsing failed. -static int should_keep_alive(const struct mg_connection *conn) { - const char *http_version = conn->request_info.http_version; - const char *header = mg_get_header(conn, "Connection"); - if (conn->must_close || - conn->status_code == 401 || - mg_strcasecmp(conn->ctx->config[ENABLE_KEEP_ALIVE], "yes") != 0 || - (header != NULL && mg_strcasecmp(header, "keep-alive") != 0) || - (header == NULL && http_version && strcmp(http_version, "1.1"))) { - return 0; - } - return 1; + return (DIR *) dir; } -static const char *suggest_connection_header(const struct mg_connection *conn) { - return should_keep_alive(conn) ? "keep-alive" : "close"; -} +int closedir(DIR *d) { + struct win32_dir *dir = (struct win32_dir *) d; + int result = 0; -static void send_http_error(struct mg_connection *, int, const char *, - PRINTF_FORMAT_STRING(const char *fmt), ...) - PRINTF_ARGS(4, 5); + if (dir != NULL) { + if (dir->handle != INVALID_HANDLE_VALUE) + result = FindClose(dir->handle) ? 0 : -1; + MG_FREE(dir); + } else { + result = -1; + SetLastError(ERROR_BAD_ARGUMENTS); + } + return result; +} -static void send_http_error(struct mg_connection *conn, int status, - const char *reason, const char *fmt, ...) { - char buf[MG_BUF_LEN]; - va_list ap; - int len = 0; +struct dirent *readdir(DIR *d) { + struct win32_dir *dir = (struct win32_dir *) d; + struct dirent *result = NULL; - conn->status_code = status; - if (conn->ctx->callbacks.http_error == NULL || - conn->ctx->callbacks.http_error(conn, status)) { - buf[0] = '\0'; + if (dir) { + memset(&dir->result, 0, sizeof(dir->result)); + if (dir->handle != INVALID_HANDLE_VALUE) { + result = &dir->result; + (void) WideCharToMultiByte(CP_UTF8, 0, dir->info.cFileName, -1, + result->d_name, sizeof(result->d_name), NULL, + NULL); - // Errors 1xx, 204 and 304 MUST NOT send a body - if (status > 199 && status != 204 && status != 304) { - len = mg_snprintf(conn, buf, sizeof(buf), "Error %d: %s", status, reason); - buf[len++] = '\n'; + if (!FindNextFileW(dir->handle, &dir->info)) { + (void) FindClose(dir->handle); + dir->handle = INVALID_HANDLE_VALUE; + } - va_start(ap, fmt); - len += mg_vsnprintf(conn, buf + len, sizeof(buf) - len, fmt, ap); - va_end(ap); + } else { + SetLastError(ERROR_FILE_NOT_FOUND); } - DEBUG_TRACE(("[%s]", buf)); - - mg_printf(conn, "HTTP/1.1 %d %s\r\n" - "Content-Length: %d\r\n" - "Connection: %s\r\n\r\n", status, reason, len, - suggest_connection_header(conn)); - conn->num_bytes_sent += mg_printf(conn, "%s", buf); + } else { + SetLastError(ERROR_BAD_ARGUMENTS); } -} - -#if defined(_WIN32) && !defined(__SYMBIAN32__) -static int pthread_mutex_init(pthread_mutex_t *mutex, void *unused) { - (void) unused; - *mutex = CreateMutex(NULL, FALSE, NULL); - return *mutex == NULL ? -1 : 0; -} -static int pthread_mutex_destroy(pthread_mutex_t *mutex) { - return CloseHandle(*mutex) == 0 ? -1 : 0; -} - -static int pthread_mutex_lock(pthread_mutex_t *mutex) { - return WaitForSingleObject(*mutex, INFINITE) == WAIT_OBJECT_0? 0 : -1; + return result; } +#endif -static int pthread_mutex_unlock(pthread_mutex_t *mutex) { - return ReleaseMutex(*mutex) == 0 ? -1 : 0; -} +#endif /* EXCLUDE_COMMON */ -static int pthread_cond_init(pthread_cond_t *cv, const void *unused) { - (void) unused; - cv->signal = CreateEvent(NULL, FALSE, FALSE, NULL); - cv->broadcast = CreateEvent(NULL, TRUE, FALSE, NULL); - return cv->signal != NULL && cv->broadcast != NULL ? 0 : -1; -} +/* ISO C requires a translation unit to contain at least one declaration */ +typedef int cs_dirent_dummy; +#ifdef MG_MODULE_LINES +#line 1 "common/cs_time.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ -static int pthread_cond_wait(pthread_cond_t *cv, pthread_mutex_t *mutex) { - HANDLE handles[] = {cv->signal, cv->broadcast}; - ReleaseMutex(*mutex); - WaitForMultipleObjects(2, handles, FALSE, INFINITE); - return WaitForSingleObject(*mutex, INFINITE) == WAIT_OBJECT_0? 0 : -1; -} +/* Amalgamated: #include "common/cs_time.h" */ -static int pthread_cond_signal(pthread_cond_t *cv) { - return SetEvent(cv->signal) == 0 ? -1 : 0; +#ifndef _WIN32 +#include <stddef.h> +/* + * There is no sys/time.h on ARMCC. + */ +#if !(defined(__ARMCC_VERSION) || defined(__ICCARM__)) && \ + !defined(__TI_COMPILER_VERSION__) && \ + (!defined(CS_PLATFORM) || CS_PLATFORM != CS_P_NXP_LPC) +#include <sys/time.h> +#endif +#else +#include <windows.h> +#endif + +double cs_time(void) WEAK; +double cs_time(void) { + double now; +#ifndef _WIN32 + struct timeval tv; + if (gettimeofday(&tv, NULL /* tz */) != 0) return 0; + now = (double) tv.tv_sec + (((double) tv.tv_usec) / 1000000.0); +#else + SYSTEMTIME sysnow; + FILETIME ftime; + GetLocalTime(&sysnow); + SystemTimeToFileTime(&sysnow, &ftime); + /* + * 1. VC 6.0 doesn't support conversion uint64 -> double, so, using int64 + * This should not cause a problems in this (21th) century + * 2. Windows FILETIME is a number of 100-nanosecond intervals since January + * 1, 1601 while time_t is a number of _seconds_ since January 1, 1970 UTC, + * thus, we need to convert to seconds and adjust amount (subtract 11644473600 + * seconds) + */ + now = (double) (((int64_t) ftime.dwLowDateTime + + ((int64_t) ftime.dwHighDateTime << 32)) / + 10000000.0) - + 11644473600; +#endif /* _WIN32 */ + return now; +} + +double cs_timegm(const struct tm *tm) { + /* Month-to-day offset for non-leap-years. */ + static const int month_day[12] = {0, 31, 59, 90, 120, 151, + 181, 212, 243, 273, 304, 334}; + + /* Most of the calculation is easy; leap years are the main difficulty. */ + int month = tm->tm_mon % 12; + int year = tm->tm_year + tm->tm_mon / 12; + int year_for_leap; + int64_t rt; + + if (month < 0) { /* Negative values % 12 are still negative. */ + month += 12; + --year; + } + + /* This is the number of Februaries since 1900. */ + year_for_leap = (month > 1) ? year + 1 : year; + + rt = + tm->tm_sec /* Seconds */ + + + 60 * + (tm->tm_min /* Minute = 60 seconds */ + + + 60 * (tm->tm_hour /* Hour = 60 minutes */ + + + 24 * (month_day[month] + tm->tm_mday - 1 /* Day = 24 hours */ + + 365 * (year - 70) /* Year = 365 days */ + + (year_for_leap - 69) / 4 /* Every 4 years is leap... */ + - (year_for_leap - 1) / 100 /* Except centuries... */ + + (year_for_leap + 299) / 400))); /* Except 400s. */ + return rt < 0 ? -1 : (double) rt; +} +#ifdef MG_MODULE_LINES +#line 1 "common/cs_endian.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_CS_ENDIAN_H_ +#define CS_COMMON_CS_ENDIAN_H_ + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * clang with std=-c99 uses __LITTLE_ENDIAN, by default + * while for ex, RTOS gcc - LITTLE_ENDIAN, by default + * it depends on __USE_BSD, but let's have everything + */ +#if !defined(BYTE_ORDER) && defined(__BYTE_ORDER) +#define BYTE_ORDER __BYTE_ORDER +#ifndef LITTLE_ENDIAN +#define LITTLE_ENDIAN __LITTLE_ENDIAN +#endif /* LITTLE_ENDIAN */ +#ifndef BIG_ENDIAN +#define BIG_ENDIAN __LITTLE_ENDIAN +#endif /* BIG_ENDIAN */ +#endif /* BYTE_ORDER */ + +#ifdef __cplusplus +} +#endif + +#endif /* CS_COMMON_CS_ENDIAN_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/cs_md5.c" +#endif +/* + * This code implements the MD5 message-digest algorithm. + * The algorithm is due to Ron Rivest. This code was + * written by Colin Plumb in 1993, no copyright is claimed. + * This code is in the public domain; do with it what you wish. + * + * Equivalent code is available from RSA Data Security, Inc. + * This code has been tested against that, and is equivalent, + * except that you don't need to include two pages of legalese + * with every copy. + * + * To compute the message digest of a chunk of bytes, declare an + * MD5Context structure, pass it to MD5Init, call MD5Update as + * needed on buffers full of bytes, and then call MD5Final, which + * will fill a supplied 16-byte array with the digest. + */ + +/* Amalgamated: #include "common/cs_md5.h" */ +/* Amalgamated: #include "common/str_util.h" */ + +#if !defined(EXCLUDE_COMMON) +#if !CS_DISABLE_MD5 + +/* Amalgamated: #include "common/cs_endian.h" */ + +static void byteReverse(unsigned char *buf, unsigned longs) { +/* Forrest: MD5 expect LITTLE_ENDIAN, swap if BIG_ENDIAN */ +#if BYTE_ORDER == BIG_ENDIAN + do { + uint32_t t = (uint32_t)((unsigned) buf[3] << 8 | buf[2]) << 16 | + ((unsigned) buf[1] << 8 | buf[0]); + *(uint32_t *) buf = t; + buf += 4; + } while (--longs); +#else + (void) buf; + (void) longs; +#endif +} + +#define F1(x, y, z) (z ^ (x & (y ^ z))) +#define F2(x, y, z) F1(z, x, y) +#define F3(x, y, z) (x ^ y ^ z) +#define F4(x, y, z) (y ^ (x | ~z)) + +#define MD5STEP(f, w, x, y, z, data, s) \ + (w += f(x, y, z) + data, w = w << s | w >> (32 - s), w += x) + +/* + * Start MD5 accumulation. Set bit count to 0 and buffer to mysterious + * initialization constants. + */ +void cs_md5_init(cs_md5_ctx *ctx) { + ctx->buf[0] = 0x67452301; + ctx->buf[1] = 0xefcdab89; + ctx->buf[2] = 0x98badcfe; + ctx->buf[3] = 0x10325476; + + ctx->bits[0] = 0; + ctx->bits[1] = 0; +} + +static void cs_md5_transform(uint32_t buf[4], uint32_t const in[16]) { + register uint32_t a, b, c, d; + + a = buf[0]; + b = buf[1]; + c = buf[2]; + d = buf[3]; + + MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); + MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); + MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); + MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); + MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); + MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12); + MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17); + MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22); + MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); + MD5STEP(F1, d, a, b, c, in[9] + 0x8b44f7af, 12); + MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17); + MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22); + MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7); + MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12); + MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17); + MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22); + + MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); + MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); + MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14); + MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20); + MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5); + MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9); + MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14); + MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20); + MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5); + MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9); + MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14); + MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20); + MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5); + MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9); + MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14); + MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20); + + MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4); + MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11); + MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16); + MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23); + MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4); + MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11); + MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16); + MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23); + MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4); + MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11); + MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16); + MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23); + MD5STEP(F3, a, b, c, d, in[9] + 0xd9d4d039, 4); + MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11); + MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16); + MD5STEP(F3, b, c, d, a, in[2] + 0xc4ac5665, 23); + + MD5STEP(F4, a, b, c, d, in[0] + 0xf4292244, 6); + MD5STEP(F4, d, a, b, c, in[7] + 0x432aff97, 10); + MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15); + MD5STEP(F4, b, c, d, a, in[5] + 0xfc93a039, 21); + MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6); + MD5STEP(F4, d, a, b, c, in[3] + 0x8f0ccc92, 10); + MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15); + MD5STEP(F4, b, c, d, a, in[1] + 0x85845dd1, 21); + MD5STEP(F4, a, b, c, d, in[8] + 0x6fa87e4f, 6); + MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10); + MD5STEP(F4, c, d, a, b, in[6] + 0xa3014314, 15); + MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21); + MD5STEP(F4, a, b, c, d, in[4] + 0xf7537e82, 6); + MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10); + MD5STEP(F4, c, d, a, b, in[2] + 0x2ad7d2bb, 15); + MD5STEP(F4, b, c, d, a, in[9] + 0xeb86d391, 21); + + buf[0] += a; + buf[1] += b; + buf[2] += c; + buf[3] += d; +} + +void cs_md5_update(cs_md5_ctx *ctx, const unsigned char *buf, size_t len) { + uint32_t t; + + t = ctx->bits[0]; + if ((ctx->bits[0] = t + ((uint32_t) len << 3)) < t) ctx->bits[1]++; + ctx->bits[1] += (uint32_t) len >> 29; + + t = (t >> 3) & 0x3f; + + if (t) { + unsigned char *p = (unsigned char *) ctx->in + t; + + t = 64 - t; + if (len < t) { + memcpy(p, buf, len); + return; + } + memcpy(p, buf, t); + byteReverse(ctx->in, 16); + cs_md5_transform(ctx->buf, (uint32_t *) ctx->in); + buf += t; + len -= t; + } + + while (len >= 64) { + memcpy(ctx->in, buf, 64); + byteReverse(ctx->in, 16); + cs_md5_transform(ctx->buf, (uint32_t *) ctx->in); + buf += 64; + len -= 64; + } + + memcpy(ctx->in, buf, len); +} + +void cs_md5_final(unsigned char digest[16], cs_md5_ctx *ctx) { + unsigned count; + unsigned char *p; + uint32_t *a; + + count = (ctx->bits[0] >> 3) & 0x3F; + + p = ctx->in + count; + *p++ = 0x80; + count = 64 - 1 - count; + if (count < 8) { + memset(p, 0, count); + byteReverse(ctx->in, 16); + cs_md5_transform(ctx->buf, (uint32_t *) ctx->in); + memset(ctx->in, 0, 56); + } else { + memset(p, 0, count - 8); + } + byteReverse(ctx->in, 14); + + a = (uint32_t *) ctx->in; + a[14] = ctx->bits[0]; + a[15] = ctx->bits[1]; + + cs_md5_transform(ctx->buf, (uint32_t *) ctx->in); + byteReverse((unsigned char *) ctx->buf, 4); + memcpy(digest, ctx->buf, 16); + memset((char *) ctx, 0, sizeof(*ctx)); +} + +#endif /* CS_DISABLE_MD5 */ +#endif /* EXCLUDE_COMMON */ +#ifdef MG_MODULE_LINES +#line 1 "common/cs_sha1.c" +#endif +/* Copyright(c) By Steve Reid <steve@edmweb.com> */ +/* 100% Public Domain */ + +/* Amalgamated: #include "common/cs_sha1.h" */ + +#if !CS_DISABLE_SHA1 && !defined(EXCLUDE_COMMON) + +/* Amalgamated: #include "common/cs_endian.h" */ + +#define SHA1HANDSOFF +#if defined(__sun) +/* Amalgamated: #include "common/solarisfixes.h" */ +#endif + +union char64long16 { + unsigned char c[64]; + uint32_t l[16]; +}; + +#define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) + +static uint32_t blk0(union char64long16 *block, int i) { +/* Forrest: SHA expect BIG_ENDIAN, swap if LITTLE_ENDIAN */ +#if BYTE_ORDER == LITTLE_ENDIAN + block->l[i] = + (rol(block->l[i], 24) & 0xFF00FF00) | (rol(block->l[i], 8) & 0x00FF00FF); +#endif + return block->l[i]; +} + +/* Avoid redefine warning (ARM /usr/include/sys/ucontext.h define R0~R4) */ +#undef blk +#undef R0 +#undef R1 +#undef R2 +#undef R3 +#undef R4 + +#define blk(i) \ + (block->l[i & 15] = rol(block->l[(i + 13) & 15] ^ block->l[(i + 8) & 15] ^ \ + block->l[(i + 2) & 15] ^ block->l[i & 15], \ + 1)) +#define R0(v, w, x, y, z, i) \ + z += ((w & (x ^ y)) ^ y) + blk0(block, i) + 0x5A827999 + rol(v, 5); \ + w = rol(w, 30); +#define R1(v, w, x, y, z, i) \ + z += ((w & (x ^ y)) ^ y) + blk(i) + 0x5A827999 + rol(v, 5); \ + w = rol(w, 30); +#define R2(v, w, x, y, z, i) \ + z += (w ^ x ^ y) + blk(i) + 0x6ED9EBA1 + rol(v, 5); \ + w = rol(w, 30); +#define R3(v, w, x, y, z, i) \ + z += (((w | x) & y) | (w & x)) + blk(i) + 0x8F1BBCDC + rol(v, 5); \ + w = rol(w, 30); +#define R4(v, w, x, y, z, i) \ + z += (w ^ x ^ y) + blk(i) + 0xCA62C1D6 + rol(v, 5); \ + w = rol(w, 30); + +void cs_sha1_transform(uint32_t state[5], const unsigned char buffer[64]) { + uint32_t a, b, c, d, e; + union char64long16 block[1]; + + memcpy(block, buffer, 64); + a = state[0]; + b = state[1]; + c = state[2]; + d = state[3]; + e = state[4]; + R0(a, b, c, d, e, 0); + R0(e, a, b, c, d, 1); + R0(d, e, a, b, c, 2); + R0(c, d, e, a, b, 3); + R0(b, c, d, e, a, 4); + R0(a, b, c, d, e, 5); + R0(e, a, b, c, d, 6); + R0(d, e, a, b, c, 7); + R0(c, d, e, a, b, 8); + R0(b, c, d, e, a, 9); + R0(a, b, c, d, e, 10); + R0(e, a, b, c, d, 11); + R0(d, e, a, b, c, 12); + R0(c, d, e, a, b, 13); + R0(b, c, d, e, a, 14); + R0(a, b, c, d, e, 15); + R1(e, a, b, c, d, 16); + R1(d, e, a, b, c, 17); + R1(c, d, e, a, b, 18); + R1(b, c, d, e, a, 19); + R2(a, b, c, d, e, 20); + R2(e, a, b, c, d, 21); + R2(d, e, a, b, c, 22); + R2(c, d, e, a, b, 23); + R2(b, c, d, e, a, 24); + R2(a, b, c, d, e, 25); + R2(e, a, b, c, d, 26); + R2(d, e, a, b, c, 27); + R2(c, d, e, a, b, 28); + R2(b, c, d, e, a, 29); + R2(a, b, c, d, e, 30); + R2(e, a, b, c, d, 31); + R2(d, e, a, b, c, 32); + R2(c, d, e, a, b, 33); + R2(b, c, d, e, a, 34); + R2(a, b, c, d, e, 35); + R2(e, a, b, c, d, 36); + R2(d, e, a, b, c, 37); + R2(c, d, e, a, b, 38); + R2(b, c, d, e, a, 39); + R3(a, b, c, d, e, 40); + R3(e, a, b, c, d, 41); + R3(d, e, a, b, c, 42); + R3(c, d, e, a, b, 43); + R3(b, c, d, e, a, 44); + R3(a, b, c, d, e, 45); + R3(e, a, b, c, d, 46); + R3(d, e, a, b, c, 47); + R3(c, d, e, a, b, 48); + R3(b, c, d, e, a, 49); + R3(a, b, c, d, e, 50); + R3(e, a, b, c, d, 51); + R3(d, e, a, b, c, 52); + R3(c, d, e, a, b, 53); + R3(b, c, d, e, a, 54); + R3(a, b, c, d, e, 55); + R3(e, a, b, c, d, 56); + R3(d, e, a, b, c, 57); + R3(c, d, e, a, b, 58); + R3(b, c, d, e, a, 59); + R4(a, b, c, d, e, 60); + R4(e, a, b, c, d, 61); + R4(d, e, a, b, c, 62); + R4(c, d, e, a, b, 63); + R4(b, c, d, e, a, 64); + R4(a, b, c, d, e, 65); + R4(e, a, b, c, d, 66); + R4(d, e, a, b, c, 67); + R4(c, d, e, a, b, 68); + R4(b, c, d, e, a, 69); + R4(a, b, c, d, e, 70); + R4(e, a, b, c, d, 71); + R4(d, e, a, b, c, 72); + R4(c, d, e, a, b, 73); + R4(b, c, d, e, a, 74); + R4(a, b, c, d, e, 75); + R4(e, a, b, c, d, 76); + R4(d, e, a, b, c, 77); + R4(c, d, e, a, b, 78); + R4(b, c, d, e, a, 79); + state[0] += a; + state[1] += b; + state[2] += c; + state[3] += d; + state[4] += e; + /* Erase working structures. The order of operations is important, + * used to ensure that compiler doesn't optimize those out. */ + memset(block, 0, sizeof(block)); + a = b = c = d = e = 0; + (void) a; + (void) b; + (void) c; + (void) d; + (void) e; +} + +void cs_sha1_init(cs_sha1_ctx *context) { + context->state[0] = 0x67452301; + context->state[1] = 0xEFCDAB89; + context->state[2] = 0x98BADCFE; + context->state[3] = 0x10325476; + context->state[4] = 0xC3D2E1F0; + context->count[0] = context->count[1] = 0; +} + +void cs_sha1_update(cs_sha1_ctx *context, const unsigned char *data, + uint32_t len) { + uint32_t i, j; + + j = context->count[0]; + if ((context->count[0] += len << 3) < j) context->count[1]++; + context->count[1] += (len >> 29); + j = (j >> 3) & 63; + if ((j + len) > 63) { + memcpy(&context->buffer[j], data, (i = 64 - j)); + cs_sha1_transform(context->state, context->buffer); + for (; i + 63 < len; i += 64) { + cs_sha1_transform(context->state, &data[i]); + } + j = 0; + } else + i = 0; + memcpy(&context->buffer[j], &data[i], len - i); +} + +void cs_sha1_final(unsigned char digest[20], cs_sha1_ctx *context) { + unsigned i; + unsigned char finalcount[8], c; + + for (i = 0; i < 8; i++) { + finalcount[i] = (unsigned char) ((context->count[(i >= 4 ? 0 : 1)] >> + ((3 - (i & 3)) * 8)) & + 255); + } + c = 0200; + cs_sha1_update(context, &c, 1); + while ((context->count[0] & 504) != 448) { + c = 0000; + cs_sha1_update(context, &c, 1); + } + cs_sha1_update(context, finalcount, 8); + for (i = 0; i < 20; i++) { + digest[i] = + (unsigned char) ((context->state[i >> 2] >> ((3 - (i & 3)) * 8)) & 255); + } + memset(context, '\0', sizeof(*context)); + memset(&finalcount, '\0', sizeof(finalcount)); +} + +void cs_hmac_sha1(const unsigned char *key, size_t keylen, + const unsigned char *data, size_t datalen, + unsigned char out[20]) { + cs_sha1_ctx ctx; + unsigned char buf1[64], buf2[64], tmp_key[20], i; + + if (keylen > sizeof(buf1)) { + cs_sha1_init(&ctx); + cs_sha1_update(&ctx, key, keylen); + cs_sha1_final(tmp_key, &ctx); + key = tmp_key; + keylen = sizeof(tmp_key); + } + + memset(buf1, 0, sizeof(buf1)); + memset(buf2, 0, sizeof(buf2)); + memcpy(buf1, key, keylen); + memcpy(buf2, key, keylen); + + for (i = 0; i < sizeof(buf1); i++) { + buf1[i] ^= 0x36; + buf2[i] ^= 0x5c; + } + + cs_sha1_init(&ctx); + cs_sha1_update(&ctx, buf1, sizeof(buf1)); + cs_sha1_update(&ctx, data, datalen); + cs_sha1_final(out, &ctx); + + cs_sha1_init(&ctx); + cs_sha1_update(&ctx, buf2, sizeof(buf2)); + cs_sha1_update(&ctx, out, 20); + cs_sha1_final(out, &ctx); +} + +#endif /* EXCLUDE_COMMON */ +#ifdef MG_MODULE_LINES +#line 1 "common/mbuf.c" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +#ifndef EXCLUDE_COMMON + +#include <assert.h> +#include <string.h> +/* Amalgamated: #include "common/mbuf.h" */ + +#ifndef MBUF_REALLOC +#define MBUF_REALLOC realloc +#endif + +#ifndef MBUF_FREE +#define MBUF_FREE free +#endif + +void mbuf_init(struct mbuf *mbuf, size_t initial_size) WEAK; +void mbuf_init(struct mbuf *mbuf, size_t initial_size) { + mbuf->len = mbuf->size = 0; + mbuf->buf = NULL; + mbuf_resize(mbuf, initial_size); +} + +void mbuf_free(struct mbuf *mbuf) WEAK; +void mbuf_free(struct mbuf *mbuf) { + if (mbuf->buf != NULL) { + MBUF_FREE(mbuf->buf); + mbuf_init(mbuf, 0); + } +} + +void mbuf_resize(struct mbuf *a, size_t new_size) WEAK; +void mbuf_resize(struct mbuf *a, size_t new_size) { + if (new_size > a->size || (new_size < a->size && new_size >= a->len)) { + char *buf = (char *) MBUF_REALLOC(a->buf, new_size); + /* + * In case realloc fails, there's not much we can do, except keep things as + * they are. Note that NULL is a valid return value from realloc when + * size == 0, but that is covered too. + */ + if (buf == NULL && new_size != 0) return; + a->buf = buf; + a->size = new_size; + } +} + +void mbuf_trim(struct mbuf *mbuf) WEAK; +void mbuf_trim(struct mbuf *mbuf) { + mbuf_resize(mbuf, mbuf->len); +} + +size_t mbuf_insert(struct mbuf *a, size_t off, const void *buf, size_t) WEAK; +size_t mbuf_insert(struct mbuf *a, size_t off, const void *buf, size_t len) { + char *p = NULL; + + assert(a != NULL); + assert(a->len <= a->size); + assert(off <= a->len); + + /* check overflow */ + if (~(size_t) 0 - (size_t) a->buf < len) return 0; + + if (a->len + len <= a->size) { + memmove(a->buf + off + len, a->buf + off, a->len - off); + if (buf != NULL) { + memcpy(a->buf + off, buf, len); + } + a->len += len; + } else { + size_t new_size = (size_t)((a->len + len) * MBUF_SIZE_MULTIPLIER); + if ((p = (char *) MBUF_REALLOC(a->buf, new_size)) != NULL) { + a->buf = p; + memmove(a->buf + off + len, a->buf + off, a->len - off); + if (buf != NULL) memcpy(a->buf + off, buf, len); + a->len += len; + a->size = new_size; + } else { + len = 0; + } + } + + return len; +} + +size_t mbuf_append(struct mbuf *a, const void *buf, size_t len) WEAK; +size_t mbuf_append(struct mbuf *a, const void *buf, size_t len) { + return mbuf_insert(a, a->len, buf, len); +} + +void mbuf_remove(struct mbuf *mb, size_t n) WEAK; +void mbuf_remove(struct mbuf *mb, size_t n) { + if (n > 0 && n <= mb->len) { + memmove(mb->buf, mb->buf + n, mb->len - n); + mb->len -= n; + } +} + +#endif /* EXCLUDE_COMMON */ +#ifdef MG_MODULE_LINES +#line 1 "common/mg_str.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +/* Amalgamated: #include "common/mg_mem.h" */ +/* Amalgamated: #include "common/mg_str.h" */ + +#include <stdlib.h> +#include <string.h> + +int mg_ncasecmp(const char *s1, const char *s2, size_t len) WEAK; + +struct mg_str mg_mk_str(const char *s) WEAK; +struct mg_str mg_mk_str(const char *s) { + struct mg_str ret = {s, 0}; + if (s != NULL) ret.len = strlen(s); + return ret; +} + +struct mg_str mg_mk_str_n(const char *s, size_t len) WEAK; +struct mg_str mg_mk_str_n(const char *s, size_t len) { + struct mg_str ret = {s, len}; + return ret; +} + +int mg_vcmp(const struct mg_str *str1, const char *str2) WEAK; +int mg_vcmp(const struct mg_str *str1, const char *str2) { + size_t n2 = strlen(str2), n1 = str1->len; + int r = strncmp(str1->p, str2, (n1 < n2) ? n1 : n2); + if (r == 0) { + return n1 - n2; + } + return r; +} + +int mg_vcasecmp(const struct mg_str *str1, const char *str2) WEAK; +int mg_vcasecmp(const struct mg_str *str1, const char *str2) { + size_t n2 = strlen(str2), n1 = str1->len; + int r = mg_ncasecmp(str1->p, str2, (n1 < n2) ? n1 : n2); + if (r == 0) { + return n1 - n2; + } + return r; +} + +static struct mg_str mg_strdup_common(const struct mg_str s, + int nul_terminate) { + struct mg_str r = {NULL, 0}; + if (s.len > 0 && s.p != NULL) { + char *sc = (char *) MG_MALLOC(s.len + (nul_terminate ? 1 : 0)); + if (sc != NULL) { + memcpy(sc, s.p, s.len); + if (nul_terminate) sc[s.len] = '\0'; + r.p = sc; + r.len = s.len; + } + } + return r; +} + +struct mg_str mg_strdup(const struct mg_str s) WEAK; +struct mg_str mg_strdup(const struct mg_str s) { + return mg_strdup_common(s, 0 /* NUL-terminate */); +} + +struct mg_str mg_strdup_nul(const struct mg_str s) WEAK; +struct mg_str mg_strdup_nul(const struct mg_str s) { + return mg_strdup_common(s, 1 /* NUL-terminate */); +} + +const char *mg_strchr(const struct mg_str s, int c) WEAK; +const char *mg_strchr(const struct mg_str s, int c) { + size_t i; + for (i = 0; i < s.len; i++) { + if (s.p[i] == c) return &s.p[i]; + } + return NULL; +} + +int mg_strcmp(const struct mg_str str1, const struct mg_str str2) WEAK; +int mg_strcmp(const struct mg_str str1, const struct mg_str str2) { + size_t i = 0; + while (i < str1.len && i < str2.len) { + if (str1.p[i] < str2.p[i]) return -1; + if (str1.p[i] > str2.p[i]) return 1; + i++; + } + if (i < str1.len) return 1; + if (i < str2.len) return -1; + return 0; +} + +int mg_strncmp(const struct mg_str, const struct mg_str, size_t n) WEAK; +int mg_strncmp(const struct mg_str str1, const struct mg_str str2, size_t n) { + struct mg_str s1 = str1; + struct mg_str s2 = str2; + + if (s1.len > n) { + s1.len = n; + } + if (s2.len > n) { + s2.len = n; + } + return mg_strcmp(s1, s2); +} + +const char *mg_strstr(const struct mg_str haystack, + const struct mg_str needle) WEAK; +const char *mg_strstr(const struct mg_str haystack, + const struct mg_str needle) { + size_t i; + if (needle.len > haystack.len) return NULL; + for (i = 0; i <= haystack.len - needle.len; i++) { + if (memcmp(haystack.p + i, needle.p, needle.len) == 0) { + return haystack.p + i; + } + } + return NULL; +} +#ifdef MG_MODULE_LINES +#line 1 "common/str_util.c" +#endif +/* + * Copyright (c) 2015 Cesanta Software Limited + * All rights reserved + */ + +#ifndef EXCLUDE_COMMON + +/* Amalgamated: #include "common/mg_mem.h" */ +/* Amalgamated: #include "common/platform.h" */ +/* Amalgamated: #include "common/str_util.h" */ + +#ifndef C_DISABLE_BUILTIN_SNPRINTF +#define C_DISABLE_BUILTIN_SNPRINTF 0 +#endif + +/* Amalgamated: #include "common/mg_mem.h" */ + +size_t c_strnlen(const char *s, size_t maxlen) WEAK; +size_t c_strnlen(const char *s, size_t maxlen) { + size_t l = 0; + for (; l < maxlen && s[l] != '\0'; l++) { + } + return l; +} + +#define C_SNPRINTF_APPEND_CHAR(ch) \ + do { \ + if (i < (int) buf_size) buf[i] = ch; \ + i++; \ + } while (0) + +#define C_SNPRINTF_FLAG_ZERO 1 + +#if C_DISABLE_BUILTIN_SNPRINTF +int c_vsnprintf(char *buf, size_t buf_size, const char *fmt, va_list ap) WEAK; +int c_vsnprintf(char *buf, size_t buf_size, const char *fmt, va_list ap) { + return vsnprintf(buf, buf_size, fmt, ap); +} +#else +static int c_itoa(char *buf, size_t buf_size, int64_t num, int base, int flags, + int field_width) { + char tmp[40]; + int i = 0, k = 0, neg = 0; + + if (num < 0) { + neg++; + num = -num; + } + + /* Print into temporary buffer - in reverse order */ + do { + int rem = num % base; + if (rem < 10) { + tmp[k++] = '0' + rem; + } else { + tmp[k++] = 'a' + (rem - 10); + } + num /= base; + } while (num > 0); + + /* Zero padding */ + if (flags && C_SNPRINTF_FLAG_ZERO) { + while (k < field_width && k < (int) sizeof(tmp) - 1) { + tmp[k++] = '0'; + } + } + + /* And sign */ + if (neg) { + tmp[k++] = '-'; + } + + /* Now output */ + while (--k >= 0) { + C_SNPRINTF_APPEND_CHAR(tmp[k]); + } + + return i; +} + +int c_vsnprintf(char *buf, size_t buf_size, const char *fmt, va_list ap) WEAK; +int c_vsnprintf(char *buf, size_t buf_size, const char *fmt, va_list ap) { + int ch, i = 0, len_mod, flags, precision, field_width; + + while ((ch = *fmt++) != '\0') { + if (ch != '%') { + C_SNPRINTF_APPEND_CHAR(ch); + } else { + /* + * Conversion specification: + * zero or more flags (one of: # 0 - <space> + ') + * an optional minimum field width (digits) + * an optional precision (. followed by digits, or *) + * an optional length modifier (one of: hh h l ll L q j z t) + * conversion specifier (one of: d i o u x X e E f F g G a A c s p n) + */ + flags = field_width = precision = len_mod = 0; + + /* Flags. only zero-pad flag is supported. */ + if (*fmt == '0') { + flags |= C_SNPRINTF_FLAG_ZERO; + } + + /* Field width */ + while (*fmt >= '0' && *fmt <= '9') { + field_width *= 10; + field_width += *fmt++ - '0'; + } + /* Dynamic field width */ + if (*fmt == '*') { + field_width = va_arg(ap, int); + fmt++; + } + + /* Precision */ + if (*fmt == '.') { + fmt++; + if (*fmt == '*') { + precision = va_arg(ap, int); + fmt++; + } else { + while (*fmt >= '0' && *fmt <= '9') { + precision *= 10; + precision += *fmt++ - '0'; + } + } + } + + /* Length modifier */ + switch (*fmt) { + case 'h': + case 'l': + case 'L': + case 'I': + case 'q': + case 'j': + case 'z': + case 't': + len_mod = *fmt++; + if (*fmt == 'h') { + len_mod = 'H'; + fmt++; + } + if (*fmt == 'l') { + len_mod = 'q'; + fmt++; + } + break; + } + + ch = *fmt++; + if (ch == 's') { + const char *s = va_arg(ap, const char *); /* Always fetch parameter */ + int j; + int pad = field_width - (precision >= 0 ? c_strnlen(s, precision) : 0); + for (j = 0; j < pad; j++) { + C_SNPRINTF_APPEND_CHAR(' '); + } + + /* `s` may be NULL in case of %.*s */ + if (s != NULL) { + /* Ignore negative and 0 precisions */ + for (j = 0; (precision <= 0 || j < precision) && s[j] != '\0'; j++) { + C_SNPRINTF_APPEND_CHAR(s[j]); + } + } + } else if (ch == 'c') { + ch = va_arg(ap, int); /* Always fetch parameter */ + C_SNPRINTF_APPEND_CHAR(ch); + } else if (ch == 'd' && len_mod == 0) { + i += c_itoa(buf + i, buf_size - i, va_arg(ap, int), 10, flags, + field_width); + } else if (ch == 'd' && len_mod == 'l') { + i += c_itoa(buf + i, buf_size - i, va_arg(ap, long), 10, flags, + field_width); +#ifdef SSIZE_MAX + } else if (ch == 'd' && len_mod == 'z') { + i += c_itoa(buf + i, buf_size - i, va_arg(ap, ssize_t), 10, flags, + field_width); +#endif + } else if (ch == 'd' && len_mod == 'q') { + i += c_itoa(buf + i, buf_size - i, va_arg(ap, int64_t), 10, flags, + field_width); + } else if ((ch == 'x' || ch == 'u') && len_mod == 0) { + i += c_itoa(buf + i, buf_size - i, va_arg(ap, unsigned), + ch == 'x' ? 16 : 10, flags, field_width); + } else if ((ch == 'x' || ch == 'u') && len_mod == 'l') { + i += c_itoa(buf + i, buf_size - i, va_arg(ap, unsigned long), + ch == 'x' ? 16 : 10, flags, field_width); + } else if ((ch == 'x' || ch == 'u') && len_mod == 'z') { + i += c_itoa(buf + i, buf_size - i, va_arg(ap, size_t), + ch == 'x' ? 16 : 10, flags, field_width); + } else if (ch == 'p') { + unsigned long num = (unsigned long) (uintptr_t) va_arg(ap, void *); + C_SNPRINTF_APPEND_CHAR('0'); + C_SNPRINTF_APPEND_CHAR('x'); + i += c_itoa(buf + i, buf_size - i, num, 16, flags, 0); + } else { +#ifndef NO_LIBC + /* + * TODO(lsm): abort is not nice in a library, remove it + * Also, ESP8266 SDK doesn't have it + */ + abort(); +#endif + } + } + } + + /* Zero-terminate the result */ + if (buf_size > 0) { + buf[i < (int) buf_size ? i : (int) buf_size - 1] = '\0'; + } + + return i; +} +#endif + +int c_snprintf(char *buf, size_t buf_size, const char *fmt, ...) WEAK; +int c_snprintf(char *buf, size_t buf_size, const char *fmt, ...) { + int result; + va_list ap; + va_start(ap, fmt); + result = c_vsnprintf(buf, buf_size, fmt, ap); + va_end(ap); + return result; +} + +#ifdef _WIN32 +int to_wchar(const char *path, wchar_t *wbuf, size_t wbuf_len) { + int ret; + char buf[MAX_PATH * 2], buf2[MAX_PATH * 2], *p; + + strncpy(buf, path, sizeof(buf)); + buf[sizeof(buf) - 1] = '\0'; + + /* Trim trailing slashes. Leave backslash for paths like "X:\" */ + p = buf + strlen(buf) - 1; + while (p > buf && p[-1] != ':' && (p[0] == '\\' || p[0] == '/')) *p-- = '\0'; + + memset(wbuf, 0, wbuf_len * sizeof(wchar_t)); + ret = MultiByteToWideChar(CP_UTF8, 0, buf, -1, wbuf, (int) wbuf_len); + + /* + * Convert back to Unicode. If doubly-converted string does not match the + * original, something is fishy, reject. + */ + WideCharToMultiByte(CP_UTF8, 0, wbuf, (int) wbuf_len, buf2, sizeof(buf2), + NULL, NULL); + if (strcmp(buf, buf2) != 0) { + wbuf[0] = L'\0'; + ret = 0; + } + + return ret; +} +#endif /* _WIN32 */ + +/* The simplest O(mn) algorithm. Better implementation are GPLed */ +const char *c_strnstr(const char *s, const char *find, size_t slen) WEAK; +const char *c_strnstr(const char *s, const char *find, size_t slen) { + size_t find_length = strlen(find); + size_t i; + + for (i = 0; i < slen; i++) { + if (i + find_length > slen) { + return NULL; + } + + if (strncmp(&s[i], find, find_length) == 0) { + return &s[i]; + } + } + + return NULL; +} + +#if CS_ENABLE_STRDUP +char *strdup(const char *src) WEAK; +char *strdup(const char *src) { + size_t len = strlen(src) + 1; + char *ret = MG_MALLOC(len); + if (ret != NULL) { + strcpy(ret, src); + } + return ret; +} +#endif + +void cs_to_hex(char *to, const unsigned char *p, size_t len) WEAK; +void cs_to_hex(char *to, const unsigned char *p, size_t len) { + static const char *hex = "0123456789abcdef"; + + for (; len--; p++) { + *to++ = hex[p[0] >> 4]; + *to++ = hex[p[0] & 0x0f]; + } + *to = '\0'; +} + +static int fourbit(int ch) { + if (ch >= '0' && ch <= '9') { + return ch - '0'; + } else if (ch >= 'a' && ch <= 'f') { + return ch - 'a' + 10; + } else if (ch >= 'A' && ch <= 'F') { + return ch - 'A' + 10; + } + return 0; +} + +void cs_from_hex(char *to, const char *p, size_t len) WEAK; +void cs_from_hex(char *to, const char *p, size_t len) { + size_t i; + + for (i = 0; i < len; i += 2) { + *to++ = (fourbit(p[i]) << 4) + fourbit(p[i + 1]); + } + *to = '\0'; +} + +#if CS_ENABLE_TO64 +int64_t cs_to64(const char *s) WEAK; +int64_t cs_to64(const char *s) { + int64_t result = 0; + int64_t neg = 1; + while (*s && isspace((unsigned char) *s)) s++; + if (*s == '-') { + neg = -1; + s++; + } + while (isdigit((unsigned char) *s)) { + result *= 10; + result += (*s - '0'); + s++; + } + return result * neg; +} +#endif + +static int str_util_lowercase(const char *s) { + return tolower(*(const unsigned char *) s); +} + +int mg_ncasecmp(const char *s1, const char *s2, size_t len) WEAK; +int mg_ncasecmp(const char *s1, const char *s2, size_t len) { + int diff = 0; + + if (len > 0) do { + diff = str_util_lowercase(s1++) - str_util_lowercase(s2++); + } while (diff == 0 && s1[-1] != '\0' && --len > 0); + + return diff; +} + +int mg_casecmp(const char *s1, const char *s2) WEAK; +int mg_casecmp(const char *s1, const char *s2) { + return mg_ncasecmp(s1, s2, (size_t) ~0); +} + +int mg_asprintf(char **buf, size_t size, const char *fmt, ...) WEAK; +int mg_asprintf(char **buf, size_t size, const char *fmt, ...) { + int ret; + va_list ap; + va_start(ap, fmt); + ret = mg_avprintf(buf, size, fmt, ap); + va_end(ap); + return ret; +} + +int mg_avprintf(char **buf, size_t size, const char *fmt, va_list ap) WEAK; +int mg_avprintf(char **buf, size_t size, const char *fmt, va_list ap) { + va_list ap_copy; + int len; + + va_copy(ap_copy, ap); + len = vsnprintf(*buf, size, fmt, ap_copy); + va_end(ap_copy); + + if (len < 0) { + /* eCos and Windows are not standard-compliant and return -1 when + * the buffer is too small. Keep allocating larger buffers until we + * succeed or out of memory. */ + *buf = NULL; /* LCOV_EXCL_START */ + while (len < 0) { + MG_FREE(*buf); + size *= 2; + if ((*buf = (char *) MG_MALLOC(size)) == NULL) break; + va_copy(ap_copy, ap); + len = vsnprintf(*buf, size, fmt, ap_copy); + va_end(ap_copy); + } + /* LCOV_EXCL_STOP */ + } else if (len >= (int) size) { + /* Standard-compliant code path. Allocate a buffer that is large enough. */ + if ((*buf = (char *) MG_MALLOC(len + 1)) == NULL) { + len = -1; /* LCOV_EXCL_LINE */ + } else { /* LCOV_EXCL_LINE */ + va_copy(ap_copy, ap); + len = vsnprintf(*buf, len + 1, fmt, ap_copy); + va_end(ap_copy); + } + } + + return len; +} + +const char *mg_next_comma_list_entry(const char *, struct mg_str *, + struct mg_str *) WEAK; +const char *mg_next_comma_list_entry(const char *list, struct mg_str *val, + struct mg_str *eq_val) { + struct mg_str ret = mg_next_comma_list_entry_n(mg_mk_str(list), val, eq_val); + return ret.p; +} + +struct mg_str mg_next_comma_list_entry_n(struct mg_str list, struct mg_str *val, + struct mg_str *eq_val) WEAK; +struct mg_str mg_next_comma_list_entry_n(struct mg_str list, struct mg_str *val, + struct mg_str *eq_val) { + if (list.len == 0) { + /* End of the list */ + list = mg_mk_str(NULL); + } else { + const char *chr = NULL; + *val = list; + + if ((chr = mg_strchr(*val, ',')) != NULL) { + /* Comma found. Store length and shift the list ptr */ + val->len = chr - val->p; + chr++; + list.len -= (chr - list.p); + list.p = chr; + } else { + /* This value is the last one */ + list = mg_mk_str_n(list.p + list.len, 0); + } + + if (eq_val != NULL) { + /* Value has form "x=y", adjust pointers and lengths */ + /* so that val points to "x", and eq_val points to "y". */ + eq_val->len = 0; + eq_val->p = (const char *) memchr(val->p, '=', val->len); + if (eq_val->p != NULL) { + eq_val->p++; /* Skip over '=' character */ + eq_val->len = val->p + val->len - eq_val->p; + val->len = (eq_val->p - val->p) - 1; + } + } + } + + return list; +} + +int mg_match_prefix_n(const struct mg_str, const struct mg_str) WEAK; +int mg_match_prefix_n(const struct mg_str pattern, const struct mg_str str) { + const char *or_str; + size_t len, i = 0, j = 0; + int res; + + if ((or_str = (const char *) memchr(pattern.p, '|', pattern.len)) != NULL || + (or_str = (const char *) memchr(pattern.p, ',', pattern.len)) != NULL) { + struct mg_str pstr = {pattern.p, (size_t)(or_str - pattern.p)}; + res = mg_match_prefix_n(pstr, str); + if (res > 0) return res; + pstr.p = or_str + 1; + pstr.len = (pattern.p + pattern.len) - (or_str + 1); + return mg_match_prefix_n(pstr, str); + } + + for (; i < pattern.len; i++, j++) { + if (pattern.p[i] == '?' && j != str.len) { + continue; + } else if (pattern.p[i] == '$') { + return j == str.len ? (int) j : -1; + } else if (pattern.p[i] == '*') { + i++; + if (i < pattern.len && pattern.p[i] == '*') { + i++; + len = str.len - j; + } else { + len = 0; + while (j + len != str.len && str.p[j + len] != '/') { + len++; + } + } + if (i == pattern.len) { + return j + len; + } + do { + const struct mg_str pstr = {pattern.p + i, pattern.len - i}; + const struct mg_str sstr = {str.p + j + len, str.len - j - len}; + res = mg_match_prefix_n(pstr, sstr); + } while (res == -1 && len-- > 0); + return res == -1 ? -1 : (int) (j + res + len); + } else if (str_util_lowercase(&pattern.p[i]) != + str_util_lowercase(&str.p[j])) { + return -1; + } + } + return j; +} + +int mg_match_prefix(const char *, int, const char *) WEAK; +int mg_match_prefix(const char *pattern, int pattern_len, const char *str) { + const struct mg_str pstr = {pattern, (size_t) pattern_len}; + struct mg_str s = {str, 0}; + if (str != NULL) s.len = strlen(str); + return mg_match_prefix_n(pstr, s); +} + +#endif /* EXCLUDE_COMMON */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/tun.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_MONGOOSE_SRC_TUN_H_ +#define CS_MONGOOSE_SRC_TUN_H_ + +#if MG_ENABLE_TUN + +/* Amalgamated: #include "mongoose/src/net.h" */ +/* Amalgamated: #include "common/mg_str.h" */ + +#ifndef MG_TUN_RECONNECT_INTERVAL +#define MG_TUN_RECONNECT_INTERVAL 1 +#endif + +#define MG_TUN_PROTO_NAME "mg_tun" + +#define MG_TUN_DATA_FRAME 0x0 +#define MG_TUN_F_END_STREAM 0x1 + +/* + * MG TUN frame format is loosely based on HTTP/2. + * However since the communication happens via WebSocket + * there is no need to encode the frame length, since that's + * solved by WebSocket framing. + * + * TODO(mkm): Detailed description of the protocol. + */ +struct mg_tun_frame { + uint8_t type; + uint8_t flags; + uint32_t stream_id; /* opaque stream identifier */ + struct mg_str body; +}; + +struct mg_tun_ssl_opts { +#if MG_ENABLE_SSL + const char *ssl_cert; + const char *ssl_key; + const char *ssl_ca_cert; +#else + int dummy; /* some compilers don't like empty structs */ +#endif +}; + +struct mg_tun_client { + struct mg_mgr *mgr; + struct mg_iface *iface; + const char *disp_url; + struct mg_tun_ssl_opts ssl; + + uint32_t last_stream_id; /* stream id of most recently accepted connection */ + + struct mg_connection *disp; + struct mg_connection *listener; + struct mg_connection *reconnect; +}; + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +struct mg_connection *mg_tun_bind_opt(struct mg_mgr *mgr, + const char *dispatcher, + MG_CB(mg_event_handler_t handler, + void *user_data), + struct mg_bind_opts opts); + +int mg_tun_parse_frame(void *data, size_t len, struct mg_tun_frame *frame); + +void mg_tun_send_frame(struct mg_connection *ws, uint32_t stream_id, + uint8_t type, uint8_t flags, struct mg_str msg); + +void mg_tun_destroy_client(struct mg_tun_client *client); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* MG_ENABLE_TUN */ + +#endif /* CS_MONGOOSE_SRC_TUN_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/net.c" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + * + * This software is dual-licensed: you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 as + * published by the Free Software Foundation. For the terms of this + * license, see <http://www.gnu.org/licenses/>. + * + * You are free to use this software under the terms of the GNU General + * Public License, but WITHOUT ANY WARRANTY; without even the implied + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. + * See the GNU General Public License for more details. + * + * Alternatively, you can license this software under a commercial + * license, as set out in <https://www.cesanta.com/license>. + */ + +/* Amalgamated: #include "common/cs_time.h" */ +/* Amalgamated: #include "mongoose/src/dns.h" */ +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/resolv.h" */ +/* Amalgamated: #include "mongoose/src/util.h" */ +/* Amalgamated: #include "mongoose/src/tun.h" */ + +#define MG_MAX_HOST_LEN 200 + +#define MG_COPY_COMMON_CONNECTION_OPTIONS(dst, src) \ + memcpy(dst, src, sizeof(*dst)); + +/* Which flags can be pre-set by the user at connection creation time. */ +#define _MG_ALLOWED_CONNECT_FLAGS_MASK \ + (MG_F_USER_1 | MG_F_USER_2 | MG_F_USER_3 | MG_F_USER_4 | MG_F_USER_5 | \ + MG_F_USER_6 | MG_F_WEBSOCKET_NO_DEFRAG | MG_F_ENABLE_BROADCAST) +/* Which flags should be modifiable by user's callbacks. */ +#define _MG_CALLBACK_MODIFIABLE_FLAGS_MASK \ + (MG_F_USER_1 | MG_F_USER_2 | MG_F_USER_3 | MG_F_USER_4 | MG_F_USER_5 | \ + MG_F_USER_6 | MG_F_WEBSOCKET_NO_DEFRAG | MG_F_SEND_AND_CLOSE | \ + MG_F_CLOSE_IMMEDIATELY | MG_F_IS_WEBSOCKET | MG_F_DELETE_CHUNK) + +#ifndef intptr_t +#define intptr_t long +#endif + +MG_INTERNAL void mg_add_conn(struct mg_mgr *mgr, struct mg_connection *c) { + DBG(("%p %p", mgr, c)); + c->mgr = mgr; + c->next = mgr->active_connections; + mgr->active_connections = c; + c->prev = NULL; + if (c->next != NULL) c->next->prev = c; + if (c->sock != INVALID_SOCKET) { + c->iface->vtable->add_conn(c); + } +} + +MG_INTERNAL void mg_remove_conn(struct mg_connection *conn) { + if (conn->prev == NULL) conn->mgr->active_connections = conn->next; + if (conn->prev) conn->prev->next = conn->next; + if (conn->next) conn->next->prev = conn->prev; + conn->prev = conn->next = NULL; + conn->iface->vtable->remove_conn(conn); +} + +MG_INTERNAL void mg_call(struct mg_connection *nc, + mg_event_handler_t ev_handler, void *user_data, int ev, + void *ev_data) { + static int nesting_level = 0; + nesting_level++; + if (ev_handler == NULL) { + /* + * If protocol handler is specified, call it. Otherwise, call user-specified + * event handler. + */ + ev_handler = nc->proto_handler ? nc->proto_handler : nc->handler; + } + if (ev != MG_EV_POLL) { + DBG(("%p %s ev=%d ev_data=%p flags=%lu rmbl=%d smbl=%d", nc, + ev_handler == nc->handler ? "user" : "proto", ev, ev_data, nc->flags, + (int) nc->recv_mbuf.len, (int) nc->send_mbuf.len)); + } + +#if !defined(NO_LIBC) && MG_ENABLE_HEXDUMP + if (nc->mgr->hexdump_file != NULL && ev != MG_EV_POLL && ev != MG_EV_RECV && + ev != MG_EV_SEND /* handled separately */) { + mg_hexdump_connection(nc, nc->mgr->hexdump_file, NULL, 0, ev); + } +#endif + if (ev_handler != NULL) { + unsigned long flags_before = nc->flags; + size_t recv_mbuf_before = nc->recv_mbuf.len, recved; + ev_handler(nc, ev, ev_data MG_UD_ARG(user_data)); + recved = (recv_mbuf_before - nc->recv_mbuf.len); + /* Prevent user handler from fiddling with system flags. */ + if (ev_handler == nc->handler && nc->flags != flags_before) { + nc->flags = (flags_before & ~_MG_CALLBACK_MODIFIABLE_FLAGS_MASK) | + (nc->flags & _MG_CALLBACK_MODIFIABLE_FLAGS_MASK); + } + /* It's important to not double-count recved bytes, and since mg_call can be + * called recursively (e.g. proto_handler invokes user handler), we keep + * track of recursion and only report received bytes at the top level. */ + if (nesting_level == 1 && recved > 0 && !(nc->flags & MG_F_UDP)) { + nc->iface->vtable->recved(nc, recved); + } + } + if (ev != MG_EV_POLL) { + DBG(("%p after %s flags=%lu rmbl=%d smbl=%d", nc, + ev_handler == nc->handler ? "user" : "proto", nc->flags, + (int) nc->recv_mbuf.len, (int) nc->send_mbuf.len)); + } + nesting_level--; +#if !MG_ENABLE_CALLBACK_USERDATA + (void) user_data; +#endif +} + +void mg_if_timer(struct mg_connection *c, double now) { + if (c->ev_timer_time > 0 && now >= c->ev_timer_time) { + double old_value = c->ev_timer_time; + c->ev_timer_time = 0; + mg_call(c, NULL, c->user_data, MG_EV_TIMER, &old_value); + } +} + +void mg_if_poll(struct mg_connection *nc, time_t now) { + if (!(nc->flags & MG_F_SSL) || (nc->flags & MG_F_SSL_HANDSHAKE_DONE)) { + mg_call(nc, NULL, nc->user_data, MG_EV_POLL, &now); + } +} + +void mg_destroy_conn(struct mg_connection *conn, int destroy_if) { + if (destroy_if) conn->iface->vtable->destroy_conn(conn); + if (conn->proto_data != NULL && conn->proto_data_destructor != NULL) { + conn->proto_data_destructor(conn->proto_data); + } +#if MG_ENABLE_SSL + mg_ssl_if_conn_free(conn); +#endif + mbuf_free(&conn->recv_mbuf); + mbuf_free(&conn->send_mbuf); + + memset(conn, 0, sizeof(*conn)); + MG_FREE(conn); +} + +void mg_close_conn(struct mg_connection *conn) { + DBG(("%p %lu %d", conn, conn->flags, conn->sock)); +#if MG_ENABLE_SSL + if (conn->flags & MG_F_SSL_HANDSHAKE_DONE) { + mg_ssl_if_conn_close_notify(conn); + } +#endif + mg_remove_conn(conn); + conn->iface->vtable->destroy_conn(conn); + mg_call(conn, NULL, conn->user_data, MG_EV_CLOSE, NULL); + mg_destroy_conn(conn, 0 /* destroy_if */); +} + +void mg_mgr_init(struct mg_mgr *m, void *user_data) { + struct mg_mgr_init_opts opts; + memset(&opts, 0, sizeof(opts)); + mg_mgr_init_opt(m, user_data, opts); +} + +void mg_mgr_init_opt(struct mg_mgr *m, void *user_data, + struct mg_mgr_init_opts opts) { + memset(m, 0, sizeof(*m)); +#if MG_ENABLE_BROADCAST + m->ctl[0] = m->ctl[1] = INVALID_SOCKET; +#endif + m->user_data = user_data; + +#ifdef _WIN32 + { + WSADATA data; + WSAStartup(MAKEWORD(2, 2), &data); + } +#elif defined(__unix__) + /* Ignore SIGPIPE signal, so if client cancels the request, it + * won't kill the whole process. */ + signal(SIGPIPE, SIG_IGN); +#endif + +#if MG_ENABLE_SSL + { + static int init_done; + if (!init_done) { + mg_ssl_if_init(); + init_done++; + } + } +#endif + { + int i; + if (opts.num_ifaces == 0) { + opts.num_ifaces = mg_num_ifaces; + opts.ifaces = mg_ifaces; + } + if (opts.main_iface != NULL) { + opts.ifaces[MG_MAIN_IFACE] = opts.main_iface; + } + m->num_ifaces = opts.num_ifaces; + m->ifaces = + (struct mg_iface **) MG_MALLOC(sizeof(*m->ifaces) * opts.num_ifaces); + for (i = 0; i < mg_num_ifaces; i++) { + m->ifaces[i] = mg_if_create_iface(opts.ifaces[i], m); + m->ifaces[i]->vtable->init(m->ifaces[i]); + } + } + if (opts.nameserver != NULL) { + m->nameserver = strdup(opts.nameserver); + } + DBG(("==================================")); + DBG(("init mgr=%p", m)); +} + +void mg_mgr_free(struct mg_mgr *m) { + struct mg_connection *conn, *tmp_conn; + + DBG(("%p", m)); + if (m == NULL) return; + /* Do one last poll, see https://github.com/cesanta/mongoose/issues/286 */ + mg_mgr_poll(m, 0); + +#if MG_ENABLE_BROADCAST + if (m->ctl[0] != INVALID_SOCKET) closesocket(m->ctl[0]); + if (m->ctl[1] != INVALID_SOCKET) closesocket(m->ctl[1]); + m->ctl[0] = m->ctl[1] = INVALID_SOCKET; +#endif + + for (conn = m->active_connections; conn != NULL; conn = tmp_conn) { + tmp_conn = conn->next; + mg_close_conn(conn); + } + + { + int i; + for (i = 0; i < m->num_ifaces; i++) { + m->ifaces[i]->vtable->free(m->ifaces[i]); + MG_FREE(m->ifaces[i]); + } + MG_FREE(m->ifaces); + } + + MG_FREE((char *) m->nameserver); +} + +time_t mg_mgr_poll(struct mg_mgr *m, int timeout_ms) { + int i; + time_t now = 0; /* oh GCC, seriously ? */ + + if (m->num_ifaces == 0) { + LOG(LL_ERROR, ("cannot poll: no interfaces")); + return 0; + } + + for (i = 0; i < m->num_ifaces; i++) { + now = m->ifaces[i]->vtable->poll(m->ifaces[i], timeout_ms); + } + return now; +} + +int mg_vprintf(struct mg_connection *nc, const char *fmt, va_list ap) { + char mem[MG_VPRINTF_BUFFER_SIZE], *buf = mem; + int len; + + if ((len = mg_avprintf(&buf, sizeof(mem), fmt, ap)) > 0) { + mg_send(nc, buf, len); + } + if (buf != mem && buf != NULL) { + MG_FREE(buf); /* LCOV_EXCL_LINE */ + } /* LCOV_EXCL_LINE */ + + return len; +} + +int mg_printf(struct mg_connection *conn, const char *fmt, ...) { + int len; + va_list ap; + va_start(ap, fmt); + len = mg_vprintf(conn, fmt, ap); + va_end(ap); + return len; +} + +#if MG_ENABLE_SYNC_RESOLVER +/* TODO(lsm): use non-blocking resolver */ +static int mg_resolve2(const char *host, struct in_addr *ina) { +#if MG_ENABLE_GETADDRINFO + int rv = 0; + struct addrinfo hints, *servinfo, *p; + struct sockaddr_in *h = NULL; + memset(&hints, 0, sizeof hints); + hints.ai_family = AF_INET; + hints.ai_socktype = SOCK_STREAM; + if ((rv = getaddrinfo(host, NULL, NULL, &servinfo)) != 0) { + DBG(("getaddrinfo(%s) failed: %s", host, strerror(mg_get_errno()))); + return 0; + } + for (p = servinfo; p != NULL; p = p->ai_next) { + memcpy(&h, &p->ai_addr, sizeof(struct sockaddr_in *)); + memcpy(ina, &h->sin_addr, sizeof(ina)); + } + freeaddrinfo(servinfo); + return 1; +#else + struct hostent *he; + if ((he = gethostbyname(host)) == NULL) { + DBG(("gethostbyname(%s) failed: %s", host, strerror(mg_get_errno()))); + } else { + memcpy(ina, he->h_addr_list[0], sizeof(*ina)); + return 1; + } + return 0; +#endif /* MG_ENABLE_GETADDRINFO */ +} + +int mg_resolve(const char *host, char *buf, size_t n) { + struct in_addr ad; + return mg_resolve2(host, &ad) ? snprintf(buf, n, "%s", inet_ntoa(ad)) : 0; +} +#endif /* MG_ENABLE_SYNC_RESOLVER */ + +MG_INTERNAL struct mg_connection *mg_create_connection_base( + struct mg_mgr *mgr, mg_event_handler_t callback, + struct mg_add_sock_opts opts) { + struct mg_connection *conn; + + if ((conn = (struct mg_connection *) MG_CALLOC(1, sizeof(*conn))) != NULL) { + conn->sock = INVALID_SOCKET; + conn->handler = callback; + conn->mgr = mgr; + conn->last_io_time = (time_t) mg_time(); + conn->iface = + (opts.iface != NULL ? opts.iface : mgr->ifaces[MG_MAIN_IFACE]); + conn->flags = opts.flags & _MG_ALLOWED_CONNECT_FLAGS_MASK; + conn->user_data = opts.user_data; + /* + * SIZE_MAX is defined as a long long constant in + * system headers on some platforms and so it + * doesn't compile with pedantic ansi flags. + */ + conn->recv_mbuf_limit = ~0; + } else { + MG_SET_PTRPTR(opts.error_string, "failed to create connection"); + } + + return conn; +} + +MG_INTERNAL struct mg_connection *mg_create_connection( + struct mg_mgr *mgr, mg_event_handler_t callback, + struct mg_add_sock_opts opts) { + struct mg_connection *conn = mg_create_connection_base(mgr, callback, opts); + + if (conn != NULL && !conn->iface->vtable->create_conn(conn)) { + MG_FREE(conn); + conn = NULL; + } + if (conn == NULL) { + MG_SET_PTRPTR(opts.error_string, "failed to init connection"); + } + + return conn; +} + +/* + * Address format: [PROTO://][HOST]:PORT + * + * HOST could be IPv4/IPv6 address or a host name. + * `host` is a destination buffer to hold parsed HOST part. Should be at least + * MG_MAX_HOST_LEN bytes long. + * `proto` is a returned socket type, either SOCK_STREAM or SOCK_DGRAM + * + * Return: + * -1 on parse error + * 0 if HOST needs DNS lookup + * >0 length of the address string + */ +MG_INTERNAL int mg_parse_address(const char *str, union socket_address *sa, + int *proto, char *host, size_t host_len) { + unsigned int a, b, c, d, port = 0; + int ch, len = 0; +#if MG_ENABLE_IPV6 + char buf[100]; +#endif + + /* + * MacOS needs that. If we do not zero it, subsequent bind() will fail. + * Also, all-zeroes in the socket address means binding to all addresses + * for both IPv4 and IPv6 (INADDR_ANY and IN6ADDR_ANY_INIT). + */ + memset(sa, 0, sizeof(*sa)); + sa->sin.sin_family = AF_INET; + + *proto = SOCK_STREAM; + + if (strncmp(str, "udp://", 6) == 0) { + str += 6; + *proto = SOCK_DGRAM; + } else if (strncmp(str, "tcp://", 6) == 0) { + str += 6; + } + + if (sscanf(str, "%u.%u.%u.%u:%u%n", &a, &b, &c, &d, &port, &len) == 5) { + /* Bind to a specific IPv4 address, e.g. 192.168.1.5:8080 */ + sa->sin.sin_addr.s_addr = + htonl(((uint32_t) a << 24) | ((uint32_t) b << 16) | c << 8 | d); + sa->sin.sin_port = htons((uint16_t) port); +#if MG_ENABLE_IPV6 + } else if (sscanf(str, "[%99[^]]]:%u%n", buf, &port, &len) == 2 && + inet_pton(AF_INET6, buf, &sa->sin6.sin6_addr)) { + /* IPv6 address, e.g. [3ffe:2a00:100:7031::1]:8080 */ + sa->sin6.sin6_family = AF_INET6; + sa->sin.sin_port = htons((uint16_t) port); +#endif +#if MG_ENABLE_ASYNC_RESOLVER + } else if (strlen(str) < host_len && + sscanf(str, "%[^ :]:%u%n", host, &port, &len) == 2) { + sa->sin.sin_port = htons((uint16_t) port); + if (mg_resolve_from_hosts_file(host, sa) != 0) { + /* + * if resolving from hosts file failed and the host + * we are trying to resolve is `localhost` - we should + * try to resolve it using `gethostbyname` and do not try + * to resolve it via DNS server if gethostbyname has failed too + */ + if (mg_ncasecmp(host, "localhost", 9) != 0) { + return 0; + } + +#if MG_ENABLE_SYNC_RESOLVER + if (!mg_resolve2(host, &sa->sin.sin_addr)) { + return -1; + } +#else + return -1; +#endif + } +#endif + } else if (sscanf(str, ":%u%n", &port, &len) == 1 || + sscanf(str, "%u%n", &port, &len) == 1) { + /* If only port is specified, bind to IPv4, INADDR_ANY */ + sa->sin.sin_port = htons((uint16_t) port); + } else { + return -1; + } + + /* Required for MG_ENABLE_ASYNC_RESOLVER=0 */ + (void) host; + (void) host_len; + + ch = str[len]; /* Character that follows the address */ + return port < 0xffffUL && (ch == '\0' || ch == ',' || isspace(ch)) ? len : -1; +} + +struct mg_connection *mg_if_accept_new_conn(struct mg_connection *lc) { + struct mg_add_sock_opts opts; + struct mg_connection *nc; + memset(&opts, 0, sizeof(opts)); + nc = mg_create_connection(lc->mgr, lc->handler, opts); + if (nc == NULL) return NULL; + nc->listener = lc; + nc->proto_handler = lc->proto_handler; + nc->user_data = lc->user_data; + nc->recv_mbuf_limit = lc->recv_mbuf_limit; + nc->iface = lc->iface; + if (lc->flags & MG_F_SSL) nc->flags |= MG_F_SSL; + mg_add_conn(nc->mgr, nc); + DBG(("%p %p %d %d", lc, nc, nc->sock, (int) nc->flags)); + return nc; +} + +void mg_if_accept_tcp_cb(struct mg_connection *nc, union socket_address *sa, + size_t sa_len) { + (void) sa_len; + nc->sa = *sa; + mg_call(nc, NULL, nc->user_data, MG_EV_ACCEPT, &nc->sa); +} + +void mg_send(struct mg_connection *nc, const void *buf, int len) { + nc->last_io_time = (time_t) mg_time(); + if (nc->flags & MG_F_UDP) { + nc->iface->vtable->udp_send(nc, buf, len); + } else { + nc->iface->vtable->tcp_send(nc, buf, len); + } +} + +void mg_if_sent_cb(struct mg_connection *nc, int num_sent) { + DBG(("%p %d", nc, num_sent)); +#if !defined(NO_LIBC) && MG_ENABLE_HEXDUMP + if (nc->mgr && nc->mgr->hexdump_file != NULL) { + char *buf = nc->send_mbuf.buf; + mg_hexdump_connection(nc, nc->mgr->hexdump_file, buf, num_sent, MG_EV_SEND); + } +#endif + if (num_sent < 0) { + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + } else { + mbuf_remove(&nc->send_mbuf, num_sent); + mbuf_trim(&nc->send_mbuf); + } + mg_call(nc, NULL, nc->user_data, MG_EV_SEND, &num_sent); +} + +MG_INTERNAL void mg_recv_common(struct mg_connection *nc, void *buf, int len, + int own) { + DBG(("%p %d %u", nc, len, (unsigned int) nc->recv_mbuf.len)); + +#if !defined(NO_LIBC) && MG_ENABLE_HEXDUMP + if (nc->mgr && nc->mgr->hexdump_file != NULL) { + mg_hexdump_connection(nc, nc->mgr->hexdump_file, buf, len, MG_EV_RECV); + } +#endif + + if (nc->flags & MG_F_CLOSE_IMMEDIATELY) { + DBG(("%p discarded %d bytes", nc, len)); + /* + * This connection will not survive next poll. Do not deliver events, + * send data to /dev/null without acking. + */ + if (own) { + MG_FREE(buf); + } + return; + } + nc->last_io_time = (time_t) mg_time(); + if (!own) { + mbuf_append(&nc->recv_mbuf, buf, len); + } else if (nc->recv_mbuf.len == 0) { + /* Adopt buf as recv_mbuf's backing store. */ + mbuf_free(&nc->recv_mbuf); + nc->recv_mbuf.buf = (char *) buf; + nc->recv_mbuf.size = nc->recv_mbuf.len = len; + } else { + mbuf_append(&nc->recv_mbuf, buf, len); + MG_FREE(buf); + } + mg_call(nc, NULL, nc->user_data, MG_EV_RECV, &len); +} + +void mg_if_recv_tcp_cb(struct mg_connection *nc, void *buf, int len, int own) { + mg_recv_common(nc, buf, len, own); +} + +void mg_if_recv_udp_cb(struct mg_connection *nc, void *buf, int len, + union socket_address *sa, size_t sa_len) { + assert(nc->flags & MG_F_UDP); + DBG(("%p %u", nc, (unsigned int) len)); + if (nc->flags & MG_F_LISTENING) { + struct mg_connection *lc = nc; + /* + * Do we have an existing connection for this source? + * This is very inefficient for long connection lists. + */ + for (nc = mg_next(lc->mgr, NULL); nc != NULL; nc = mg_next(lc->mgr, nc)) { + if (memcmp(&nc->sa.sa, &sa->sa, sa_len) == 0 && nc->listener == lc) { + break; + } + } + if (nc == NULL) { + struct mg_add_sock_opts opts; + memset(&opts, 0, sizeof(opts)); + /* Create fake connection w/out sock initialization */ + nc = mg_create_connection_base(lc->mgr, lc->handler, opts); + if (nc != NULL) { + nc->sock = lc->sock; + nc->listener = lc; + nc->sa = *sa; + nc->proto_handler = lc->proto_handler; + nc->user_data = lc->user_data; + nc->recv_mbuf_limit = lc->recv_mbuf_limit; + nc->flags = MG_F_UDP; + /* + * Long-lived UDP "connections" i.e. interactions that involve more + * than one request and response are rare, most are transactional: + * response is sent and the "connection" is closed. Or - should be. + * But users (including ourselves) tend to forget about that part, + * because UDP is connectionless and one does not think about + * processing a UDP request as handling a connection that needs to be + * closed. Thus, we begin with SEND_AND_CLOSE flag set, which should + * be a reasonable default for most use cases, but it is possible to + * turn it off the connection should be kept alive after processing. + */ + nc->flags |= MG_F_SEND_AND_CLOSE; + mg_add_conn(lc->mgr, nc); + mg_call(nc, NULL, nc->user_data, MG_EV_ACCEPT, &nc->sa); + } else { + DBG(("OOM")); + /* No return here, we still need to drop on the floor */ + } + } + } + if (nc != NULL) { + mg_recv_common(nc, buf, len, 1); + } else { + /* Drop on the floor. */ + MG_FREE(buf); + nc->iface->vtable->recved(nc, len); + } +} + +/* + * Schedules an async connect for a resolved address and proto. + * Called from two places: `mg_connect_opt()` and from async resolver. + * When called from the async resolver, it must trigger `MG_EV_CONNECT` event + * with a failure flag to indicate connection failure. + */ +MG_INTERNAL struct mg_connection *mg_do_connect(struct mg_connection *nc, + int proto, + union socket_address *sa) { + DBG(("%p %s://%s:%hu", nc, proto == SOCK_DGRAM ? "udp" : "tcp", + inet_ntoa(sa->sin.sin_addr), ntohs(sa->sin.sin_port))); + + nc->flags |= MG_F_CONNECTING; + if (proto == SOCK_DGRAM) { + nc->iface->vtable->connect_udp(nc); + } else { + nc->iface->vtable->connect_tcp(nc, sa); + } + mg_add_conn(nc->mgr, nc); + return nc; +} + +void mg_if_connect_cb(struct mg_connection *nc, int err) { + DBG(("%p connect, err=%d", nc, err)); + nc->flags &= ~MG_F_CONNECTING; + if (err != 0) { + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + } + mg_call(nc, NULL, nc->user_data, MG_EV_CONNECT, &err); +} + +#if MG_ENABLE_ASYNC_RESOLVER +/* + * Callback for the async resolver on mg_connect_opt() call. + * Main task of this function is to trigger MG_EV_CONNECT event with + * either failure (and dealloc the connection) + * or success (and proceed with connect() + */ +static void resolve_cb(struct mg_dns_message *msg, void *data, + enum mg_resolve_err e) { + struct mg_connection *nc = (struct mg_connection *) data; + int i; + int failure = -1; + + nc->flags &= ~MG_F_RESOLVING; + if (msg != NULL) { + /* + * Take the first DNS A answer and run... + */ + for (i = 0; i < msg->num_answers; i++) { + if (msg->answers[i].rtype == MG_DNS_A_RECORD) { + /* + * Async resolver guarantees that there is at least one answer. + * TODO(lsm): handle IPv6 answers too + */ + mg_dns_parse_record_data(msg, &msg->answers[i], &nc->sa.sin.sin_addr, + 4); + mg_do_connect(nc, nc->flags & MG_F_UDP ? SOCK_DGRAM : SOCK_STREAM, + &nc->sa); + return; + } + } + } + + if (e == MG_RESOLVE_TIMEOUT) { + double now = mg_time(); + mg_call(nc, NULL, nc->user_data, MG_EV_TIMER, &now); + } + + /* + * If we get there was no MG_DNS_A_RECORD in the answer + */ + mg_call(nc, NULL, nc->user_data, MG_EV_CONNECT, &failure); + mg_call(nc, NULL, nc->user_data, MG_EV_CLOSE, NULL); + mg_destroy_conn(nc, 1 /* destroy_if */); +} +#endif + +struct mg_connection *mg_connect(struct mg_mgr *mgr, const char *address, + MG_CB(mg_event_handler_t callback, + void *user_data)) { + struct mg_connect_opts opts; + memset(&opts, 0, sizeof(opts)); + return mg_connect_opt(mgr, address, MG_CB(callback, user_data), opts); +} + +struct mg_connection *mg_connect_opt(struct mg_mgr *mgr, const char *address, + MG_CB(mg_event_handler_t callback, + void *user_data), + struct mg_connect_opts opts) { + struct mg_connection *nc = NULL; + int proto, rc; + struct mg_add_sock_opts add_sock_opts; + char host[MG_MAX_HOST_LEN]; + + MG_COPY_COMMON_CONNECTION_OPTIONS(&add_sock_opts, &opts); + + if ((nc = mg_create_connection(mgr, callback, add_sock_opts)) == NULL) { + return NULL; + } + + if ((rc = mg_parse_address(address, &nc->sa, &proto, host, sizeof(host))) < + 0) { + /* Address is malformed */ + MG_SET_PTRPTR(opts.error_string, "cannot parse address"); + mg_destroy_conn(nc, 1 /* destroy_if */); + return NULL; + } + + nc->flags |= opts.flags & _MG_ALLOWED_CONNECT_FLAGS_MASK; + nc->flags |= (proto == SOCK_DGRAM) ? MG_F_UDP : 0; +#if MG_ENABLE_CALLBACK_USERDATA + nc->user_data = user_data; +#else + nc->user_data = opts.user_data; +#endif + +#if MG_ENABLE_SSL + DBG(("%p %s %s,%s,%s", nc, address, (opts.ssl_cert ? opts.ssl_cert : "-"), + (opts.ssl_key ? opts.ssl_key : "-"), + (opts.ssl_ca_cert ? opts.ssl_ca_cert : "-"))); + + if (opts.ssl_cert != NULL || opts.ssl_ca_cert != NULL || + opts.ssl_psk_identity != NULL) { + const char *err_msg = NULL; + struct mg_ssl_if_conn_params params; + if (nc->flags & MG_F_UDP) { + MG_SET_PTRPTR(opts.error_string, "SSL for UDP is not supported"); + mg_destroy_conn(nc, 1 /* destroy_if */); + return NULL; + } + memset(¶ms, 0, sizeof(params)); + params.cert = opts.ssl_cert; + params.key = opts.ssl_key; + params.ca_cert = opts.ssl_ca_cert; + params.cipher_suites = opts.ssl_cipher_suites; + params.psk_identity = opts.ssl_psk_identity; + params.psk_key = opts.ssl_psk_key; + if (opts.ssl_ca_cert != NULL) { + if (opts.ssl_server_name != NULL) { + if (strcmp(opts.ssl_server_name, "*") != 0) { + params.server_name = opts.ssl_server_name; + } + } else if (rc == 0) { /* If it's a DNS name, use host. */ + params.server_name = host; + } + } + if (mg_ssl_if_conn_init(nc, ¶ms, &err_msg) != MG_SSL_OK) { + MG_SET_PTRPTR(opts.error_string, err_msg); + mg_destroy_conn(nc, 1 /* destroy_if */); + return NULL; + } + nc->flags |= MG_F_SSL; + } +#endif /* MG_ENABLE_SSL */ + + if (rc == 0) { +#if MG_ENABLE_ASYNC_RESOLVER + /* + * DNS resolution is required for host. + * mg_parse_address() fills port in nc->sa, which we pass to resolve_cb() + */ + struct mg_connection *dns_conn = NULL; + struct mg_resolve_async_opts o; + memset(&o, 0, sizeof(o)); + o.dns_conn = &dns_conn; + o.nameserver = opts.nameserver; + if (mg_resolve_async_opt(nc->mgr, host, MG_DNS_A_RECORD, resolve_cb, nc, + o) != 0) { + MG_SET_PTRPTR(opts.error_string, "cannot schedule DNS lookup"); + mg_destroy_conn(nc, 1 /* destroy_if */); + return NULL; + } + nc->priv_2 = dns_conn; + nc->flags |= MG_F_RESOLVING; + return nc; +#else + MG_SET_PTRPTR(opts.error_string, "Resolver is disabled"); + mg_destroy_conn(nc, 1 /* destroy_if */); + return NULL; +#endif + } else { + /* Address is parsed and resolved to IP. proceed with connect() */ + return mg_do_connect(nc, proto, &nc->sa); + } +} + +struct mg_connection *mg_bind(struct mg_mgr *srv, const char *address, + MG_CB(mg_event_handler_t event_handler, + void *user_data)) { + struct mg_bind_opts opts; + memset(&opts, 0, sizeof(opts)); + return mg_bind_opt(srv, address, MG_CB(event_handler, user_data), opts); +} + +struct mg_connection *mg_bind_opt(struct mg_mgr *mgr, const char *address, + MG_CB(mg_event_handler_t callback, + void *user_data), + struct mg_bind_opts opts) { + union socket_address sa; + struct mg_connection *nc = NULL; + int proto, rc; + struct mg_add_sock_opts add_sock_opts; + char host[MG_MAX_HOST_LEN]; + +#if MG_ENABLE_CALLBACK_USERDATA + opts.user_data = user_data; +#endif + + MG_COPY_COMMON_CONNECTION_OPTIONS(&add_sock_opts, &opts); + +#if MG_ENABLE_TUN + if (mg_strncmp(mg_mk_str(address), mg_mk_str("ws://"), 5) == 0 || + mg_strncmp(mg_mk_str(address), mg_mk_str("wss://"), 6) == 0) { + return mg_tun_bind_opt(mgr, address, MG_CB(callback, user_data), opts); + } +#endif + + if (mg_parse_address(address, &sa, &proto, host, sizeof(host)) <= 0) { + MG_SET_PTRPTR(opts.error_string, "cannot parse address"); + return NULL; + } + + nc = mg_create_connection(mgr, callback, add_sock_opts); + if (nc == NULL) { + return NULL; + } + + nc->sa = sa; + nc->flags |= MG_F_LISTENING; + if (proto == SOCK_DGRAM) nc->flags |= MG_F_UDP; + +#if MG_ENABLE_SSL + DBG(("%p %s %s,%s,%s", nc, address, (opts.ssl_cert ? opts.ssl_cert : "-"), + (opts.ssl_key ? opts.ssl_key : "-"), + (opts.ssl_ca_cert ? opts.ssl_ca_cert : "-"))); + + if (opts.ssl_cert != NULL || opts.ssl_ca_cert != NULL) { + const char *err_msg = NULL; + struct mg_ssl_if_conn_params params; + if (nc->flags & MG_F_UDP) { + MG_SET_PTRPTR(opts.error_string, "SSL for UDP is not supported"); + mg_destroy_conn(nc, 1 /* destroy_if */); + return NULL; + } + memset(¶ms, 0, sizeof(params)); + params.cert = opts.ssl_cert; + params.key = opts.ssl_key; + params.ca_cert = opts.ssl_ca_cert; + params.cipher_suites = opts.ssl_cipher_suites; + if (mg_ssl_if_conn_init(nc, ¶ms, &err_msg) != MG_SSL_OK) { + MG_SET_PTRPTR(opts.error_string, err_msg); + mg_destroy_conn(nc, 1 /* destroy_if */); + return NULL; + } + nc->flags |= MG_F_SSL; + } +#endif /* MG_ENABLE_SSL */ + + if (nc->flags & MG_F_UDP) { + rc = nc->iface->vtable->listen_udp(nc, &nc->sa); + } else { + rc = nc->iface->vtable->listen_tcp(nc, &nc->sa); + } + if (rc != 0) { + DBG(("Failed to open listener: %d", rc)); + MG_SET_PTRPTR(opts.error_string, "failed to open listener"); + mg_destroy_conn(nc, 1 /* destroy_if */); + return NULL; + } + mg_add_conn(nc->mgr, nc); + + return nc; +} + +struct mg_connection *mg_next(struct mg_mgr *s, struct mg_connection *conn) { + return conn == NULL ? s->active_connections : conn->next; +} + +#if MG_ENABLE_BROADCAST +void mg_broadcast(struct mg_mgr *mgr, mg_event_handler_t cb, void *data, + size_t len) { + struct ctl_msg ctl_msg; + + /* + * Mongoose manager has a socketpair, `struct mg_mgr::ctl`, + * where `mg_broadcast()` pushes the message. + * `mg_mgr_poll()` wakes up, reads a message from the socket pair, and calls + * specified callback for each connection. Thus the callback function executes + * in event manager thread. + */ + if (mgr->ctl[0] != INVALID_SOCKET && data != NULL && + len < sizeof(ctl_msg.message)) { + size_t dummy; + + ctl_msg.callback = cb; + memcpy(ctl_msg.message, data, len); + dummy = MG_SEND_FUNC(mgr->ctl[0], (char *) &ctl_msg, + offsetof(struct ctl_msg, message) + len, 0); + dummy = MG_RECV_FUNC(mgr->ctl[0], (char *) &len, 1, 0); + (void) dummy; /* https://gcc.gnu.org/bugzilla/show_bug.cgi?id=25509 */ + } +} +#endif /* MG_ENABLE_BROADCAST */ + +static int isbyte(int n) { + return n >= 0 && n <= 255; +} + +static int parse_net(const char *spec, uint32_t *net, uint32_t *mask) { + int n, a, b, c, d, slash = 32, len = 0; + + if ((sscanf(spec, "%d.%d.%d.%d/%d%n", &a, &b, &c, &d, &slash, &n) == 5 || + sscanf(spec, "%d.%d.%d.%d%n", &a, &b, &c, &d, &n) == 4) && + isbyte(a) && isbyte(b) && isbyte(c) && isbyte(d) && slash >= 0 && + slash < 33) { + len = n; + *net = + ((uint32_t) a << 24) | ((uint32_t) b << 16) | ((uint32_t) c << 8) | d; + *mask = slash ? 0xffffffffU << (32 - slash) : 0; + } + + return len; +} + +int mg_check_ip_acl(const char *acl, uint32_t remote_ip) { + int allowed, flag; + uint32_t net, mask; + struct mg_str vec; + + /* If any ACL is set, deny by default */ + allowed = (acl == NULL || *acl == '\0') ? '+' : '-'; + + while ((acl = mg_next_comma_list_entry(acl, &vec, NULL)) != NULL) { + flag = vec.p[0]; + if ((flag != '+' && flag != '-') || + parse_net(&vec.p[1], &net, &mask) == 0) { + return -1; + } + + if (net == (remote_ip & mask)) { + allowed = flag; + } + } + + DBG(("%08x %c", (unsigned int) remote_ip, allowed)); + return allowed == '+'; +} + +/* Move data from one connection to another */ +void mg_forward(struct mg_connection *from, struct mg_connection *to) { + mg_send(to, from->recv_mbuf.buf, from->recv_mbuf.len); + mbuf_remove(&from->recv_mbuf, from->recv_mbuf.len); +} + +double mg_set_timer(struct mg_connection *c, double timestamp) { + double result = c->ev_timer_time; + c->ev_timer_time = timestamp; + /* + * If this connection is resolving, it's not in the list of active + * connections, so not processed yet. It has a DNS resolver connection + * linked to it. Set up a timer for the DNS connection. + */ + DBG(("%p %p %d -> %lu", c, c->priv_2, (c->flags & MG_F_RESOLVING ? 1 : 0), + (unsigned long) timestamp)); + if ((c->flags & MG_F_RESOLVING) && c->priv_2 != NULL) { + ((struct mg_connection *) c->priv_2)->ev_timer_time = timestamp; + } + return result; +} + +void mg_sock_set(struct mg_connection *nc, sock_t sock) { + if (sock != INVALID_SOCKET) { + nc->iface->vtable->sock_set(nc, sock); + } +} + +void mg_if_get_conn_addr(struct mg_connection *nc, int remote, + union socket_address *sa) { + nc->iface->vtable->get_conn_addr(nc, remote, sa); +} + +struct mg_connection *mg_add_sock_opt(struct mg_mgr *s, sock_t sock, + MG_CB(mg_event_handler_t callback, + void *user_data), + struct mg_add_sock_opts opts) { +#if MG_ENABLE_CALLBACK_USERDATA + opts.user_data = user_data; +#endif + + struct mg_connection *nc = mg_create_connection_base(s, callback, opts); + if (nc != NULL) { + mg_sock_set(nc, sock); + mg_add_conn(nc->mgr, nc); + } + return nc; +} + +struct mg_connection *mg_add_sock(struct mg_mgr *s, sock_t sock, + MG_CB(mg_event_handler_t callback, + void *user_data)) { + struct mg_add_sock_opts opts; + memset(&opts, 0, sizeof(opts)); + return mg_add_sock_opt(s, sock, MG_CB(callback, user_data), opts); +} + +double mg_time(void) { + return cs_time(); +} +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/net_if_socket.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_MONGOOSE_SRC_NET_IF_SOCKET_H_ +#define CS_MONGOOSE_SRC_NET_IF_SOCKET_H_ + +/* Amalgamated: #include "mongoose/src/net_if.h" */ + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +#ifndef MG_ENABLE_NET_IF_SOCKET +#define MG_ENABLE_NET_IF_SOCKET MG_NET_IF == MG_NET_IF_SOCKET +#endif + +extern const struct mg_iface_vtable mg_socket_iface_vtable; + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* CS_MONGOOSE_SRC_NET_IF_SOCKET_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/net_if_tun.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_MONGOOSE_SRC_NET_IF_TUN_H_ +#define CS_MONGOOSE_SRC_NET_IF_TUN_H_ + +#if MG_ENABLE_TUN + +/* Amalgamated: #include "mongoose/src/net_if.h" */ + +struct mg_tun_client; + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +extern const struct mg_iface_vtable mg_tun_iface_vtable; + +struct mg_connection *mg_tun_if_find_conn(struct mg_tun_client *client, + uint32_t stream_id); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* MG_ENABLE_TUN */ + +#endif /* CS_MONGOOSE_SRC_NET_IF_TUN_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/net_if_socks.h" +#endif +/* +* Copyright (c) 2014-2017 Cesanta Software Limited +* All rights reserved +*/ + +#ifndef CS_MONGOOSE_SRC_NET_IF_SOCKS_H_ +#define CS_MONGOOSE_SRC_NET_IF_SOCKS_H_ + +#if MG_ENABLE_SOCKS +/* Amalgamated: #include "mongoose/src/net_if.h" */ + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +extern const struct mg_iface_vtable mg_socks_iface_vtable; + +#ifdef __cplusplus +} +#endif /* __cplusplus */ +#endif /* MG_ENABLE_SOCKS */ +#endif /* CS_MONGOOSE_SRC_NET_IF_SOCKS_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/net_if.c" +#endif +/* Amalgamated: #include "mongoose/src/net_if.h" */ +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/net_if_socket.h" */ +/* Amalgamated: #include "mongoose/src/net_if_tun.h" */ + +extern const struct mg_iface_vtable mg_default_iface_vtable; + +const struct mg_iface_vtable *mg_ifaces[] = { + &mg_default_iface_vtable, +#if MG_ENABLE_TUN + &mg_tun_iface_vtable, +#endif +}; + +int mg_num_ifaces = (int) (sizeof(mg_ifaces) / sizeof(mg_ifaces[0])); + +struct mg_iface *mg_if_create_iface(const struct mg_iface_vtable *vtable, + struct mg_mgr *mgr) { + struct mg_iface *iface = (struct mg_iface *) MG_CALLOC(1, sizeof(*iface)); + iface->mgr = mgr; + iface->data = NULL; + iface->vtable = vtable; + return iface; +} + +struct mg_iface *mg_find_iface(struct mg_mgr *mgr, + const struct mg_iface_vtable *vtable, + struct mg_iface *from) { + int i = 0; + if (from != NULL) { + for (i = 0; i < mgr->num_ifaces; i++) { + if (mgr->ifaces[i] == from) { + i++; + break; + } + } + } + + for (; i < mgr->num_ifaces; i++) { + if (mgr->ifaces[i]->vtable == vtable) { + return mgr->ifaces[i]; + } + } + return NULL; +} +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/net_if_socket.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_NET_IF_SOCKET + +/* Amalgamated: #include "mongoose/src/net_if_socket.h" */ +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/util.h" */ + +#define MG_TCP_RECV_BUFFER_SIZE 1024 +#define MG_UDP_RECV_BUFFER_SIZE 1500 + +static sock_t mg_open_listening_socket(union socket_address *sa, int type, + int proto); +#if MG_ENABLE_SSL +static void mg_ssl_begin(struct mg_connection *nc); +#endif + +void mg_set_non_blocking_mode(sock_t sock) { +#ifdef _WIN32 + unsigned long on = 1; + ioctlsocket(sock, FIONBIO, &on); +#else + int flags = fcntl(sock, F_GETFL, 0); + fcntl(sock, F_SETFL, flags | O_NONBLOCK); +#endif +} + +static int mg_is_error(void) { + int err = mg_get_errno(); + return err != EINPROGRESS && err != EWOULDBLOCK +#ifndef WINCE + && err != EAGAIN && err != EINTR +#endif +#ifdef _WIN32 + && WSAGetLastError() != WSAEINTR && WSAGetLastError() != WSAEWOULDBLOCK +#endif + ; +} + +void mg_socket_if_connect_tcp(struct mg_connection *nc, + const union socket_address *sa) { + int rc, proto = 0; + nc->sock = socket(AF_INET, SOCK_STREAM, proto); + if (nc->sock == INVALID_SOCKET) { + nc->err = mg_get_errno() ? mg_get_errno() : 1; + return; + } +#if !defined(MG_ESP8266) + mg_set_non_blocking_mode(nc->sock); +#endif + rc = connect(nc->sock, &sa->sa, sizeof(sa->sin)); + nc->err = rc < 0 && mg_is_error() ? mg_get_errno() : 0; + DBG(("%p sock %d rc %d errno %d err %d", nc, nc->sock, rc, mg_get_errno(), + nc->err)); +} + +void mg_socket_if_connect_udp(struct mg_connection *nc) { + nc->sock = socket(AF_INET, SOCK_DGRAM, 0); + if (nc->sock == INVALID_SOCKET) { + nc->err = mg_get_errno() ? mg_get_errno() : 1; + return; + } + if (nc->flags & MG_F_ENABLE_BROADCAST) { + int optval = 1; + setsockopt(nc->sock, SOL_SOCKET, SO_BROADCAST, (const char *) &optval, + sizeof(optval)); + } + nc->err = 0; +} + +int mg_socket_if_listen_tcp(struct mg_connection *nc, + union socket_address *sa) { + int proto = 0; + sock_t sock = mg_open_listening_socket(sa, SOCK_STREAM, proto); + if (sock == INVALID_SOCKET) { + return (mg_get_errno() ? mg_get_errno() : 1); + } + mg_sock_set(nc, sock); + return 0; +} + +int mg_socket_if_listen_udp(struct mg_connection *nc, + union socket_address *sa) { + sock_t sock = mg_open_listening_socket(sa, SOCK_DGRAM, 0); + if (sock == INVALID_SOCKET) return (mg_get_errno() ? mg_get_errno() : 1); + mg_sock_set(nc, sock); + return 0; +} + +void mg_socket_if_tcp_send(struct mg_connection *nc, const void *buf, + size_t len) { + mbuf_append(&nc->send_mbuf, buf, len); +} + +void mg_socket_if_udp_send(struct mg_connection *nc, const void *buf, + size_t len) { + mbuf_append(&nc->send_mbuf, buf, len); +} + +void mg_socket_if_recved(struct mg_connection *nc, size_t len) { + (void) nc; + (void) len; +} + +int mg_socket_if_create_conn(struct mg_connection *nc) { + (void) nc; + return 1; +} + +void mg_socket_if_destroy_conn(struct mg_connection *nc) { + if (nc->sock == INVALID_SOCKET) return; + if (!(nc->flags & MG_F_UDP)) { + closesocket(nc->sock); + } else { + /* Only close outgoing UDP sockets or listeners. */ + if (nc->listener == NULL) closesocket(nc->sock); + } + nc->sock = INVALID_SOCKET; +} + +static int mg_accept_conn(struct mg_connection *lc) { + struct mg_connection *nc; + union socket_address sa; + socklen_t sa_len = sizeof(sa); + /* NOTE(lsm): on Windows, sock is always > FD_SETSIZE */ + sock_t sock = accept(lc->sock, &sa.sa, &sa_len); + if (sock == INVALID_SOCKET) { + if (mg_is_error()) DBG(("%p: failed to accept: %d", lc, mg_get_errno())); + return 0; + } + nc = mg_if_accept_new_conn(lc); + if (nc == NULL) { + closesocket(sock); + return 0; + } + DBG(("%p conn from %s:%d", nc, inet_ntoa(sa.sin.sin_addr), + ntohs(sa.sin.sin_port))); + mg_sock_set(nc, sock); +#if MG_ENABLE_SSL + if (lc->flags & MG_F_SSL) { + if (mg_ssl_if_conn_accept(nc, lc) != MG_SSL_OK) mg_close_conn(nc); + } else +#endif + { + mg_if_accept_tcp_cb(nc, &sa, sa_len); + } + return 1; +} + +/* 'sa' must be an initialized address to bind to */ +static sock_t mg_open_listening_socket(union socket_address *sa, int type, + int proto) { + socklen_t sa_len = + (sa->sa.sa_family == AF_INET) ? sizeof(sa->sin) : sizeof(sa->sin6); + sock_t sock = INVALID_SOCKET; +#if !MG_LWIP + int on = 1; +#endif + + if ((sock = socket(sa->sa.sa_family, type, proto)) != INVALID_SOCKET && +#if !MG_LWIP /* LWIP doesn't support either */ +#if defined(_WIN32) && defined(SO_EXCLUSIVEADDRUSE) && !defined(WINCE) + /* "Using SO_REUSEADDR and SO_EXCLUSIVEADDRUSE" http://goo.gl/RmrFTm */ + !setsockopt(sock, SOL_SOCKET, SO_EXCLUSIVEADDRUSE, (void *) &on, + sizeof(on)) && +#endif + +#if !defined(_WIN32) || !defined(SO_EXCLUSIVEADDRUSE) + /* + * SO_RESUSEADDR is not enabled on Windows because the semantics of + * SO_REUSEADDR on UNIX and Windows is different. On Windows, + * SO_REUSEADDR allows to bind a socket to a port without error even if + * the port is already open by another program. This is not the behavior + * SO_REUSEADDR was designed for, and leads to hard-to-track failure + * scenarios. Therefore, SO_REUSEADDR was disabled on Windows unless + * SO_EXCLUSIVEADDRUSE is supported and set on a socket. + */ + !setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (void *) &on, sizeof(on)) && +#endif +#endif /* !MG_LWIP */ + + !bind(sock, &sa->sa, sa_len) && + (type == SOCK_DGRAM || listen(sock, SOMAXCONN) == 0)) { +#if !MG_LWIP + mg_set_non_blocking_mode(sock); + /* In case port was set to 0, get the real port number */ + (void) getsockname(sock, &sa->sa, &sa_len); +#endif + } else if (sock != INVALID_SOCKET) { + closesocket(sock); + sock = INVALID_SOCKET; + } + + return sock; +} + +static void mg_write_to_socket(struct mg_connection *nc) { + struct mbuf *io = &nc->send_mbuf; + int n = 0; + +#if MG_LWIP + /* With LWIP we don't know if the socket is ready */ + if (io->len == 0) return; +#endif + + assert(io->len > 0); + + if (nc->flags & MG_F_UDP) { + int n = + sendto(nc->sock, io->buf, io->len, 0, &nc->sa.sa, sizeof(nc->sa.sin)); + DBG(("%p %d %d %d %s:%hu", nc, nc->sock, n, mg_get_errno(), + inet_ntoa(nc->sa.sin.sin_addr), ntohs(nc->sa.sin.sin_port))); + mg_if_sent_cb(nc, n); + return; + } + +#if MG_ENABLE_SSL + if (nc->flags & MG_F_SSL) { + if (nc->flags & MG_F_SSL_HANDSHAKE_DONE) { + n = mg_ssl_if_write(nc, io->buf, io->len); + DBG(("%p %d bytes -> %d (SSL)", nc, n, nc->sock)); + if (n < 0) { + if (n != MG_SSL_WANT_READ && n != MG_SSL_WANT_WRITE) { + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + } + return; + } else { + /* Successful SSL operation, clear off SSL wait flags */ + nc->flags &= ~(MG_F_WANT_READ | MG_F_WANT_WRITE); + } + } else { + mg_ssl_begin(nc); + return; + } + } else +#endif + { + n = (int) MG_SEND_FUNC(nc->sock, io->buf, io->len, 0); + DBG(("%p %d bytes -> %d", nc, n, nc->sock)); + } + + mg_if_sent_cb(nc, n); +} + +MG_INTERNAL size_t recv_avail_size(struct mg_connection *conn, size_t max) { + size_t avail; + if (conn->recv_mbuf_limit < conn->recv_mbuf.len) return 0; + avail = conn->recv_mbuf_limit - conn->recv_mbuf.len; + return avail > max ? max : avail; +} + +static void mg_handle_tcp_read(struct mg_connection *conn) { + int n = 0; + char *buf = (char *) MG_MALLOC(MG_TCP_RECV_BUFFER_SIZE); + + if (buf == NULL) { + DBG(("OOM")); + return; + } + +#if MG_ENABLE_SSL + if (conn->flags & MG_F_SSL) { + if (conn->flags & MG_F_SSL_HANDSHAKE_DONE) { + /* SSL library may have more bytes ready to read than we ask to read. + * Therefore, read in a loop until we read everything. Without the loop, + * we skip to the next select() cycle which can just timeout. */ + while ((n = mg_ssl_if_read(conn, buf, MG_TCP_RECV_BUFFER_SIZE)) > 0) { + DBG(("%p %d bytes <- %d (SSL)", conn, n, conn->sock)); + mg_if_recv_tcp_cb(conn, buf, n, 1 /* own */); + buf = NULL; + if (conn->flags & MG_F_CLOSE_IMMEDIATELY) break; + /* buf has been freed, we need a new one. */ + buf = (char *) MG_MALLOC(MG_TCP_RECV_BUFFER_SIZE); + if (buf == NULL) break; + } + MG_FREE(buf); + if (n < 0 && n != MG_SSL_WANT_READ) conn->flags |= MG_F_CLOSE_IMMEDIATELY; + } else { + MG_FREE(buf); + mg_ssl_begin(conn); + return; + } + } else +#endif + { + n = (int) MG_RECV_FUNC(conn->sock, buf, + recv_avail_size(conn, MG_TCP_RECV_BUFFER_SIZE), 0); + DBG(("%p %d bytes (PLAIN) <- %d", conn, n, conn->sock)); + if (n > 0) { + mg_if_recv_tcp_cb(conn, buf, n, 1 /* own */); + } else { + MG_FREE(buf); + } + if (n == 0) { + /* Orderly shutdown of the socket, try flushing output. */ + conn->flags |= MG_F_SEND_AND_CLOSE; + } else if (n < 0 && mg_is_error()) { + conn->flags |= MG_F_CLOSE_IMMEDIATELY; + } + } +} + +static int mg_recvfrom(struct mg_connection *nc, union socket_address *sa, + socklen_t *sa_len, char **buf) { + int n; + *buf = (char *) MG_MALLOC(MG_UDP_RECV_BUFFER_SIZE); + if (*buf == NULL) { + DBG(("Out of memory")); + return -ENOMEM; + } + n = recvfrom(nc->sock, *buf, MG_UDP_RECV_BUFFER_SIZE, 0, &sa->sa, sa_len); + if (n <= 0) { + DBG(("%p recvfrom: %s", nc, strerror(mg_get_errno()))); + MG_FREE(*buf); + } + return n; +} + +static void mg_handle_udp_read(struct mg_connection *nc) { + char *buf = NULL; + union socket_address sa; + socklen_t sa_len = sizeof(sa); + int n = mg_recvfrom(nc, &sa, &sa_len, &buf); + DBG(("%p %d bytes from %s:%d", nc, n, inet_ntoa(nc->sa.sin.sin_addr), + ntohs(nc->sa.sin.sin_port))); + mg_if_recv_udp_cb(nc, buf, n, &sa, sa_len); +} + +#if MG_ENABLE_SSL +static void mg_ssl_begin(struct mg_connection *nc) { + int server_side = (nc->listener != NULL); + enum mg_ssl_if_result res = mg_ssl_if_handshake(nc); + DBG(("%p %d res %d", nc, server_side, res)); + + if (res == MG_SSL_OK) { + nc->flags |= MG_F_SSL_HANDSHAKE_DONE; + nc->flags &= ~(MG_F_WANT_READ | MG_F_WANT_WRITE); + + if (server_side) { + union socket_address sa; + socklen_t sa_len = sizeof(sa); + (void) getpeername(nc->sock, &sa.sa, &sa_len); + mg_if_accept_tcp_cb(nc, &sa, sa_len); + } else { + mg_if_connect_cb(nc, 0); + } + } else if (res != MG_SSL_WANT_READ && res != MG_SSL_WANT_WRITE) { + if (!server_side) { + mg_if_connect_cb(nc, res); + } + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + } +} +#endif /* MG_ENABLE_SSL */ + +#define _MG_F_FD_CAN_READ 1 +#define _MG_F_FD_CAN_WRITE 1 << 1 +#define _MG_F_FD_ERROR 1 << 2 + +void mg_mgr_handle_conn(struct mg_connection *nc, int fd_flags, double now) { + int worth_logging = + fd_flags != 0 || (nc->flags & (MG_F_WANT_READ | MG_F_WANT_WRITE)); + if (worth_logging) { + DBG(("%p fd=%d fd_flags=%d nc_flags=%lu rmbl=%d smbl=%d", nc, nc->sock, + fd_flags, nc->flags, (int) nc->recv_mbuf.len, + (int) nc->send_mbuf.len)); + } + + if (nc->flags & MG_F_CONNECTING) { + if (fd_flags != 0) { + int err = 0; +#if !defined(MG_ESP8266) + if (!(nc->flags & MG_F_UDP)) { + socklen_t len = sizeof(err); + int ret = + getsockopt(nc->sock, SOL_SOCKET, SO_ERROR, (char *) &err, &len); + if (ret != 0) { + err = 1; + } else if (err == EAGAIN || err == EWOULDBLOCK) { + err = 0; + } + } +#else + /* + * On ESP8266 we use blocking connect. + */ + err = nc->err; +#endif +#if MG_ENABLE_SSL + if ((nc->flags & MG_F_SSL) && err == 0) { + mg_ssl_begin(nc); + } else { + mg_if_connect_cb(nc, err); + } +#else + mg_if_connect_cb(nc, err); +#endif + } else if (nc->err != 0) { + mg_if_connect_cb(nc, nc->err); + } + } + + if (fd_flags & _MG_F_FD_CAN_READ) { + if (nc->flags & MG_F_UDP) { + mg_handle_udp_read(nc); + } else { + if (nc->flags & MG_F_LISTENING) { + /* + * We're not looping here, and accepting just one connection at + * a time. The reason is that eCos does not respect non-blocking + * flag on a listening socket and hangs in a loop. + */ + mg_accept_conn(nc); + } else { + mg_handle_tcp_read(nc); + } + } + } + + if (!(nc->flags & MG_F_CLOSE_IMMEDIATELY)) { + if ((fd_flags & _MG_F_FD_CAN_WRITE) && nc->send_mbuf.len > 0) { + mg_write_to_socket(nc); + } + mg_if_poll(nc, (time_t) now); + mg_if_timer(nc, now); + } + + if (worth_logging) { + DBG(("%p after fd=%d nc_flags=%lu rmbl=%d smbl=%d", nc, nc->sock, nc->flags, + (int) nc->recv_mbuf.len, (int) nc->send_mbuf.len)); + } +} + +#if MG_ENABLE_BROADCAST +static void mg_mgr_handle_ctl_sock(struct mg_mgr *mgr) { + struct ctl_msg ctl_msg; + int len = + (int) MG_RECV_FUNC(mgr->ctl[1], (char *) &ctl_msg, sizeof(ctl_msg), 0); + size_t dummy = MG_SEND_FUNC(mgr->ctl[1], ctl_msg.message, 1, 0); + DBG(("read %d from ctl socket", len)); + (void) dummy; /* https://gcc.gnu.org/bugzilla/show_bug.cgi?id=25509 */ + if (len >= (int) sizeof(ctl_msg.callback) && ctl_msg.callback != NULL) { + struct mg_connection *nc; + for (nc = mg_next(mgr, NULL); nc != NULL; nc = mg_next(mgr, nc)) { + ctl_msg.callback(nc, MG_EV_POLL, + ctl_msg.message MG_UD_ARG(nc->user_data)); + } + } +} +#endif + +/* Associate a socket to a connection. */ +void mg_socket_if_sock_set(struct mg_connection *nc, sock_t sock) { + mg_set_non_blocking_mode(sock); + mg_set_close_on_exec(sock); + nc->sock = sock; + DBG(("%p %d", nc, sock)); +} + +void mg_socket_if_init(struct mg_iface *iface) { + (void) iface; + DBG(("%p using select()", iface->mgr)); +#if MG_ENABLE_BROADCAST + mg_socketpair(iface->mgr->ctl, SOCK_DGRAM); +#endif +} + +void mg_socket_if_free(struct mg_iface *iface) { + (void) iface; +} + +void mg_socket_if_add_conn(struct mg_connection *nc) { + (void) nc; +} + +void mg_socket_if_remove_conn(struct mg_connection *nc) { + (void) nc; +} + +void mg_add_to_set(sock_t sock, fd_set *set, sock_t *max_fd) { + if (sock != INVALID_SOCKET +#ifdef __unix__ + && sock < (sock_t) FD_SETSIZE +#endif + ) { + FD_SET(sock, set); + if (*max_fd == INVALID_SOCKET || sock > *max_fd) { + *max_fd = sock; + } + } +} + +time_t mg_socket_if_poll(struct mg_iface *iface, int timeout_ms) { + struct mg_mgr *mgr = iface->mgr; + double now = mg_time(); + double min_timer; + struct mg_connection *nc, *tmp; + struct timeval tv; + fd_set read_set, write_set, err_set; + sock_t max_fd = INVALID_SOCKET; + int num_fds, num_ev, num_timers = 0; +#ifdef __unix__ + int try_dup = 1; +#endif + + FD_ZERO(&read_set); + FD_ZERO(&write_set); + FD_ZERO(&err_set); +#if MG_ENABLE_BROADCAST + mg_add_to_set(mgr->ctl[1], &read_set, &max_fd); +#endif + + /* + * Note: it is ok to have connections with sock == INVALID_SOCKET in the list, + * e.g. timer-only "connections". + */ + min_timer = 0; + for (nc = mgr->active_connections, num_fds = 0; nc != NULL; nc = tmp) { + tmp = nc->next; + + if (nc->sock != INVALID_SOCKET) { + num_fds++; + +#ifdef __unix__ + /* A hack to make sure all our file descriptos fit into FD_SETSIZE. */ + if (nc->sock >= (sock_t) FD_SETSIZE && try_dup) { + int new_sock = dup(nc->sock); + if (new_sock >= 0 && new_sock < (sock_t) FD_SETSIZE) { + closesocket(nc->sock); + DBG(("new sock %d -> %d", nc->sock, new_sock)); + nc->sock = new_sock; + } else { + try_dup = 0; + } + } +#endif + + if (!(nc->flags & MG_F_WANT_WRITE) && + nc->recv_mbuf.len < nc->recv_mbuf_limit && + (!(nc->flags & MG_F_UDP) || nc->listener == NULL)) { + mg_add_to_set(nc->sock, &read_set, &max_fd); + } + + if (((nc->flags & MG_F_CONNECTING) && !(nc->flags & MG_F_WANT_READ)) || + (nc->send_mbuf.len > 0 && !(nc->flags & MG_F_CONNECTING))) { + mg_add_to_set(nc->sock, &write_set, &max_fd); + mg_add_to_set(nc->sock, &err_set, &max_fd); + } + } + + if (nc->ev_timer_time > 0) { + if (num_timers == 0 || nc->ev_timer_time < min_timer) { + min_timer = nc->ev_timer_time; + } + num_timers++; + } + } + + /* + * If there is a timer to be fired earlier than the requested timeout, + * adjust the timeout. + */ + if (num_timers > 0) { + double timer_timeout_ms = (min_timer - mg_time()) * 1000 + 1 /* rounding */; + if (timer_timeout_ms < timeout_ms) { + timeout_ms = (int) timer_timeout_ms; + } + } + if (timeout_ms < 0) timeout_ms = 0; + + tv.tv_sec = timeout_ms / 1000; + tv.tv_usec = (timeout_ms % 1000) * 1000; + + num_ev = select((int) max_fd + 1, &read_set, &write_set, &err_set, &tv); + now = mg_time(); +#if 0 + DBG(("select @ %ld num_ev=%d of %d, timeout=%d", (long) now, num_ev, num_fds, + timeout_ms)); +#endif + +#if MG_ENABLE_BROADCAST + if (num_ev > 0 && mgr->ctl[1] != INVALID_SOCKET && + FD_ISSET(mgr->ctl[1], &read_set)) { + mg_mgr_handle_ctl_sock(mgr); + } +#endif + + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { + int fd_flags = 0; + if (nc->sock != INVALID_SOCKET) { + if (num_ev > 0) { + fd_flags = (FD_ISSET(nc->sock, &read_set) && + (!(nc->flags & MG_F_UDP) || nc->listener == NULL) + ? _MG_F_FD_CAN_READ + : 0) | + (FD_ISSET(nc->sock, &write_set) ? _MG_F_FD_CAN_WRITE : 0) | + (FD_ISSET(nc->sock, &err_set) ? _MG_F_FD_ERROR : 0); + } +#if MG_LWIP + /* With LWIP socket emulation layer, we don't get write events for UDP */ + if ((nc->flags & MG_F_UDP) && nc->listener == NULL) { + fd_flags |= _MG_F_FD_CAN_WRITE; + } +#endif + } + tmp = nc->next; + mg_mgr_handle_conn(nc, fd_flags, now); + } + + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { + tmp = nc->next; + if ((nc->flags & MG_F_CLOSE_IMMEDIATELY) || + (nc->send_mbuf.len == 0 && (nc->flags & MG_F_SEND_AND_CLOSE))) { + mg_close_conn(nc); + } + } + + return (time_t) now; +} + +#if MG_ENABLE_BROADCAST +MG_INTERNAL void mg_socketpair_close(sock_t *sock) { + while (1) { + if (closesocket(*sock) == -1 && errno == EINTR) continue; + break; + } + *sock = INVALID_SOCKET; +} + +MG_INTERNAL sock_t +mg_socketpair_accept(sock_t sock, union socket_address *sa, socklen_t sa_len) { + sock_t rc; + while (1) { + if ((rc = accept(sock, &sa->sa, &sa_len)) == INVALID_SOCKET && + errno == EINTR) + continue; + break; + } + return rc; +} + +int mg_socketpair(sock_t sp[2], int sock_type) { + union socket_address sa; + sock_t sock; + socklen_t len = sizeof(sa.sin); + int ret = 0; + + sock = sp[0] = sp[1] = INVALID_SOCKET; + + (void) memset(&sa, 0, sizeof(sa)); + sa.sin.sin_family = AF_INET; + sa.sin.sin_port = htons(0); + sa.sin.sin_addr.s_addr = htonl(0x7f000001); /* 127.0.0.1 */ + + if ((sock = socket(AF_INET, sock_type, 0)) == INVALID_SOCKET) { + } else if (bind(sock, &sa.sa, len) != 0) { + } else if (sock_type == SOCK_STREAM && listen(sock, 1) != 0) { + } else if (getsockname(sock, &sa.sa, &len) != 0) { + } else if ((sp[0] = socket(AF_INET, sock_type, 0)) == INVALID_SOCKET) { + } else if (connect(sp[0], &sa.sa, len) != 0) { + } else if (sock_type == SOCK_DGRAM && + (getsockname(sp[0], &sa.sa, &len) != 0 || + connect(sock, &sa.sa, len) != 0)) { + } else if ((sp[1] = (sock_type == SOCK_DGRAM ? sock : mg_socketpair_accept( + sock, &sa, len))) == + INVALID_SOCKET) { + } else { + mg_set_close_on_exec(sp[0]); + mg_set_close_on_exec(sp[1]); + if (sock_type == SOCK_STREAM) mg_socketpair_close(&sock); + ret = 1; + } + + if (!ret) { + if (sp[0] != INVALID_SOCKET) mg_socketpair_close(&sp[0]); + if (sp[1] != INVALID_SOCKET) mg_socketpair_close(&sp[1]); + if (sock != INVALID_SOCKET) mg_socketpair_close(&sock); + } + + return ret; +} +#endif /* MG_ENABLE_BROADCAST */ + +static void mg_sock_get_addr(sock_t sock, int remote, + union socket_address *sa) { + socklen_t slen = sizeof(*sa); + memset(sa, 0, slen); + if (remote) { + getpeername(sock, &sa->sa, &slen); + } else { + getsockname(sock, &sa->sa, &slen); + } +} + +void mg_sock_to_str(sock_t sock, char *buf, size_t len, int flags) { + union socket_address sa; + mg_sock_get_addr(sock, flags & MG_SOCK_STRINGIFY_REMOTE, &sa); + mg_sock_addr_to_str(&sa, buf, len, flags); +} + +void mg_socket_if_get_conn_addr(struct mg_connection *nc, int remote, + union socket_address *sa) { + if ((nc->flags & MG_F_UDP) && remote) { + memcpy(sa, &nc->sa, sizeof(*sa)); + return; + } + mg_sock_get_addr(nc->sock, remote, sa); +} + +/* clang-format off */ +#define MG_SOCKET_IFACE_VTABLE \ + { \ + mg_socket_if_init, \ + mg_socket_if_free, \ + mg_socket_if_add_conn, \ + mg_socket_if_remove_conn, \ + mg_socket_if_poll, \ + mg_socket_if_listen_tcp, \ + mg_socket_if_listen_udp, \ + mg_socket_if_connect_tcp, \ + mg_socket_if_connect_udp, \ + mg_socket_if_tcp_send, \ + mg_socket_if_udp_send, \ + mg_socket_if_recved, \ + mg_socket_if_create_conn, \ + mg_socket_if_destroy_conn, \ + mg_socket_if_sock_set, \ + mg_socket_if_get_conn_addr, \ + } +/* clang-format on */ + +const struct mg_iface_vtable mg_socket_iface_vtable = MG_SOCKET_IFACE_VTABLE; +#if MG_NET_IF == MG_NET_IF_SOCKET +const struct mg_iface_vtable mg_default_iface_vtable = MG_SOCKET_IFACE_VTABLE; +#endif + +#endif /* MG_ENABLE_NET_IF_SOCKET */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/net_if_socks.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_SOCKS + +struct socksdata { + char *proxy_addr; /* HOST:PORT of the socks5 proxy server */ + struct mg_connection *s; /* Respective connection to the server */ + struct mg_connection *c; /* Connection to the client */ + struct mbuf tmp; /* Temporary buffer for sent data */ +}; + +static void socks_if_disband(struct socksdata *d) { + LOG(LL_DEBUG, ("disbanding proxy %p %p", d->c, d->s)); + if (d->c) d->c->flags |= MG_F_SEND_AND_CLOSE; + if (d->s) d->s->flags |= MG_F_SEND_AND_CLOSE; + d->c = d->s = NULL; +} + +static void socks_if_handler(struct mg_connection *c, int ev, void *ev_data) { + struct socksdata *d = (struct socksdata *) c->user_data; + if (ev == MG_EV_CONNECT) { + int res = *(int *) ev_data; + if (res == 0) { + /* Send handshake to the proxy server */ + unsigned char buf[] = {MG_SOCKS_VERSION, 1, MG_SOCKS_HANDSHAKE_NOAUTH}; + mg_send(d->s, buf, sizeof(buf)); + LOG(LL_DEBUG, ("Sent handshake to %s", d->proxy_addr)); + } else { + LOG(LL_ERROR, ("Cannot connect to %s: %d", d->proxy_addr, res)); + d->c->flags |= MG_F_CLOSE_IMMEDIATELY; + } + } else if (ev == MG_EV_CLOSE) { + socks_if_disband(d); + } else if (ev == MG_EV_RECV) { + /* Handle handshake reply */ + if (!(c->flags & MG_SOCKS_HANDSHAKE_DONE)) { + /* TODO(lsm): process IPv6 too */ + unsigned char buf[10] = {MG_SOCKS_VERSION, MG_SOCKS_CMD_CONNECT, 0, + MG_SOCKS_ADDR_IPV4}; + if (c->recv_mbuf.len < 2) return; + if ((unsigned char) c->recv_mbuf.buf[1] == MG_SOCKS_HANDSHAKE_FAILURE) { + LOG(LL_ERROR, ("Server kicked us out")); + socks_if_disband(d); + return; + } + mbuf_remove(&c->recv_mbuf, 2); + c->flags |= MG_SOCKS_HANDSHAKE_DONE; + + /* Send connect request */ + memcpy(buf + 4, &d->c->sa.sin.sin_addr, 4); + memcpy(buf + 8, &d->c->sa.sin.sin_port, 2); + mg_send(c, buf, sizeof(buf)); + } + /* Process connect request */ + if ((c->flags & MG_SOCKS_HANDSHAKE_DONE) && + !(c->flags & MG_SOCKS_CONNECT_DONE)) { + if (c->recv_mbuf.len < 10) return; + if (c->recv_mbuf.buf[1] != MG_SOCKS_SUCCESS) { + LOG(LL_ERROR, ("Socks connection error: %d", c->recv_mbuf.buf[1])); + socks_if_disband(d); + return; + } + mbuf_remove(&c->recv_mbuf, 10); + c->flags |= MG_SOCKS_CONNECT_DONE; + /* Connected. Move sent data from client, if any, to server */ + if (d->s && d->c) { + mbuf_append(&d->s->send_mbuf, d->tmp.buf, d->tmp.len); + mbuf_free(&d->tmp); + } + } + /* All flags are set, we're in relay mode */ + if ((c->flags & MG_SOCKS_CONNECT_DONE) && d->c && d->s) { + mbuf_append(&d->c->recv_mbuf, d->s->recv_mbuf.buf, d->s->recv_mbuf.len); + mbuf_remove(&d->s->recv_mbuf, d->s->recv_mbuf.len); + } + } +} + +static void mg_socks_if_connect_tcp(struct mg_connection *c, + const union socket_address *sa) { + struct socksdata *d = (struct socksdata *) c->iface->data; + d->c = c; + d->s = mg_connect(c->mgr, d->proxy_addr, socks_if_handler); + d->s->user_data = d; + LOG(LL_DEBUG, ("%p %s", c, d->proxy_addr)); + (void) sa; +} + +static void mg_socks_if_connect_udp(struct mg_connection *c) { + (void) c; +} + +static int mg_socks_if_listen_tcp(struct mg_connection *c, + union socket_address *sa) { + (void) c; + (void) sa; + return 0; +} + +static int mg_socks_if_listen_udp(struct mg_connection *c, + union socket_address *sa) { + (void) c; + (void) sa; + return -1; +} + +static void mg_socks_if_tcp_send(struct mg_connection *c, const void *buf, + size_t len) { + struct socksdata *d = (struct socksdata *) c->iface->data; + LOG(LL_DEBUG, ("%p -> %p %d %d", c, buf, (int) len, (int) c->send_mbuf.len)); + if (d && d->s && d->s->flags & MG_SOCKS_CONNECT_DONE) { + mbuf_append(&d->s->send_mbuf, d->tmp.buf, d->tmp.len); + mbuf_append(&d->s->send_mbuf, buf, len); + mbuf_free(&d->tmp); + } else { + mbuf_append(&d->tmp, buf, len); + } +} + +static void mg_socks_if_udp_send(struct mg_connection *c, const void *buf, + size_t len) { + (void) c; + (void) buf; + (void) len; +} + +static void mg_socks_if_recved(struct mg_connection *c, size_t len) { + (void) c; + (void) len; +} + +static int mg_socks_if_create_conn(struct mg_connection *c) { + (void) c; + return 1; +} + +static void mg_socks_if_destroy_conn(struct mg_connection *c) { + c->iface->vtable->free(c->iface); + MG_FREE(c->iface); + c->iface = NULL; + LOG(LL_DEBUG, ("%p", c)); +} + +static void mg_socks_if_sock_set(struct mg_connection *c, sock_t sock) { + (void) c; + (void) sock; +} + +static void mg_socks_if_init(struct mg_iface *iface) { + (void) iface; +} + +static void mg_socks_if_free(struct mg_iface *iface) { + struct socksdata *d = (struct socksdata *) iface->data; + LOG(LL_DEBUG, ("%p", iface)); + if (d != NULL) { + socks_if_disband(d); + mbuf_free(&d->tmp); + MG_FREE(d->proxy_addr); + MG_FREE(d); + iface->data = NULL; + } +} + +static void mg_socks_if_add_conn(struct mg_connection *c) { + c->sock = INVALID_SOCKET; +} + +static void mg_socks_if_remove_conn(struct mg_connection *c) { + (void) c; +} + +static time_t mg_socks_if_poll(struct mg_iface *iface, int timeout_ms) { + LOG(LL_DEBUG, ("%p", iface)); + (void) iface; + (void) timeout_ms; + return (time_t) cs_time(); +} + +static void mg_socks_if_get_conn_addr(struct mg_connection *c, int remote, + union socket_address *sa) { + LOG(LL_DEBUG, ("%p", c)); + (void) c; + (void) remote; + (void) sa; +} + +const struct mg_iface_vtable mg_socks_iface_vtable = { + mg_socks_if_init, mg_socks_if_free, + mg_socks_if_add_conn, mg_socks_if_remove_conn, + mg_socks_if_poll, mg_socks_if_listen_tcp, + mg_socks_if_listen_udp, mg_socks_if_connect_tcp, + mg_socks_if_connect_udp, mg_socks_if_tcp_send, + mg_socks_if_udp_send, mg_socks_if_recved, + mg_socks_if_create_conn, mg_socks_if_destroy_conn, + mg_socks_if_sock_set, mg_socks_if_get_conn_addr, +}; + +struct mg_iface *mg_socks_mk_iface(struct mg_mgr *mgr, const char *proxy_addr) { + struct mg_iface *iface = mg_if_create_iface(&mg_socks_iface_vtable, mgr); + iface->data = MG_CALLOC(1, sizeof(struct socksdata)); + ((struct socksdata *) iface->data)->proxy_addr = strdup(proxy_addr); + return iface; +} + +#endif +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/net_if_tun.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_TUN + +/* Amalgamated: #include "common/cs_dbg.h" */ +/* Amalgamated: #include "common/cs_time.h" */ +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/net_if_tun.h" */ +/* Amalgamated: #include "mongoose/src/tun.h" */ +/* Amalgamated: #include "mongoose/src/util.h" */ + +#define MG_TCP_RECV_BUFFER_SIZE 1024 +#define MG_UDP_RECV_BUFFER_SIZE 1500 + +void mg_tun_if_connect_tcp(struct mg_connection *nc, + const union socket_address *sa) { + (void) nc; + (void) sa; +} + +void mg_tun_if_connect_udp(struct mg_connection *nc) { + (void) nc; +} + +int mg_tun_if_listen_tcp(struct mg_connection *nc, union socket_address *sa) { + (void) nc; + (void) sa; + return 0; +} + +int mg_tun_if_listen_udp(struct mg_connection *nc, union socket_address *sa) { + (void) nc; + (void) sa; + return -1; +} + +void mg_tun_if_tcp_send(struct mg_connection *nc, const void *buf, size_t len) { + struct mg_tun_client *client = (struct mg_tun_client *) nc->iface->data; + uint32_t stream_id = (uint32_t)(uintptr_t) nc->mgr_data; + struct mg_str msg = {(char *) buf, len}; +#if MG_ENABLE_HEXDUMP + char hex[512]; + mg_hexdump(buf, len, hex, sizeof(hex)); + LOG(LL_DEBUG, ("sending to stream 0x%x:\n%s", (unsigned int) stream_id, hex)); +#endif + + mg_tun_send_frame(client->disp, stream_id, MG_TUN_DATA_FRAME, 0, msg); +} + +void mg_tun_if_udp_send(struct mg_connection *nc, const void *buf, size_t len) { + (void) nc; + (void) buf; + (void) len; +} + +void mg_tun_if_recved(struct mg_connection *nc, size_t len) { + (void) nc; + (void) len; +} + +int mg_tun_if_create_conn(struct mg_connection *nc) { + (void) nc; + return 1; +} + +void mg_tun_if_destroy_conn(struct mg_connection *nc) { + struct mg_tun_client *client = (struct mg_tun_client *) nc->iface->data; + + if (nc->flags & MG_F_LISTENING) { + mg_tun_destroy_client(client); + } else if (client->disp) { + uint32_t stream_id = (uint32_t)(uintptr_t) nc->mgr_data; + struct mg_str msg = {NULL, 0}; + + LOG(LL_DEBUG, ("closing 0x%x:", (unsigned int) stream_id)); + mg_tun_send_frame(client->disp, stream_id, MG_TUN_DATA_FRAME, + MG_TUN_F_END_STREAM, msg); + } +} + +/* Associate a socket to a connection. */ +void mg_tun_if_sock_set(struct mg_connection *nc, sock_t sock) { + (void) nc; + (void) sock; +} + +void mg_tun_if_init(struct mg_iface *iface) { + (void) iface; +} + +void mg_tun_if_free(struct mg_iface *iface) { + (void) iface; +} + +void mg_tun_if_add_conn(struct mg_connection *nc) { + nc->sock = INVALID_SOCKET; +} + +void mg_tun_if_remove_conn(struct mg_connection *nc) { + (void) nc; +} + +time_t mg_tun_if_poll(struct mg_iface *iface, int timeout_ms) { + (void) iface; + (void) timeout_ms; + return (time_t) cs_time(); +} + +void mg_tun_if_get_conn_addr(struct mg_connection *nc, int remote, + union socket_address *sa) { + (void) nc; + (void) remote; + (void) sa; +} + +struct mg_connection *mg_tun_if_find_conn(struct mg_tun_client *client, + uint32_t stream_id) { + struct mg_connection *nc = NULL; + + for (nc = client->mgr->active_connections; nc != NULL; nc = nc->next) { + if (nc->iface != client->iface || (nc->flags & MG_F_LISTENING)) { + continue; + } + if (stream_id == (uint32_t)(uintptr_t) nc->mgr_data) { + return nc; + } + } + + if (stream_id > client->last_stream_id) { + /* create a new connection */ + LOG(LL_DEBUG, ("new stream 0x%x, accepting", (unsigned int) stream_id)); + nc = mg_if_accept_new_conn(client->listener); + nc->mgr_data = (void *) (uintptr_t) stream_id; + client->last_stream_id = stream_id; + } else { + LOG(LL_DEBUG, + ("Ignoring stream 0x%x (last_stream_id 0x%x)", (unsigned int) stream_id, + (unsigned int) client->last_stream_id)); + } + + return nc; +} + +/* clang-format off */ +#define MG_TUN_IFACE_VTABLE \ + { \ + mg_tun_if_init, \ + mg_tun_if_free, \ + mg_tun_if_add_conn, \ + mg_tun_if_remove_conn, \ + mg_tun_if_poll, \ + mg_tun_if_listen_tcp, \ + mg_tun_if_listen_udp, \ + mg_tun_if_connect_tcp, \ + mg_tun_if_connect_udp, \ + mg_tun_if_tcp_send, \ + mg_tun_if_udp_send, \ + mg_tun_if_recved, \ + mg_tun_if_create_conn, \ + mg_tun_if_destroy_conn, \ + mg_tun_if_sock_set, \ + mg_tun_if_get_conn_addr, \ + } +/* clang-format on */ + +const struct mg_iface_vtable mg_tun_iface_vtable = MG_TUN_IFACE_VTABLE; + +#endif /* MG_ENABLE_TUN */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/ssl_if_openssl.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_SSL && MG_SSL_IF == MG_SSL_IF_OPENSSL + +#ifdef __APPLE__ +#pragma GCC diagnostic ignored "-Wdeprecated-declarations" +#endif + +#include <openssl/ssl.h> + +struct mg_ssl_if_ctx { + SSL *ssl; + SSL_CTX *ssl_ctx; + struct mbuf psk; + size_t identity_len; +}; + +void mg_ssl_if_init() { + SSL_library_init(); +} + +enum mg_ssl_if_result mg_ssl_if_conn_accept(struct mg_connection *nc, + struct mg_connection *lc) { + struct mg_ssl_if_ctx *ctx = + (struct mg_ssl_if_ctx *) MG_CALLOC(1, sizeof(*ctx)); + struct mg_ssl_if_ctx *lc_ctx = (struct mg_ssl_if_ctx *) lc->ssl_if_data; + nc->ssl_if_data = ctx; + if (ctx == NULL || lc_ctx == NULL) return MG_SSL_ERROR; + ctx->ssl_ctx = lc_ctx->ssl_ctx; + if ((ctx->ssl = SSL_new(ctx->ssl_ctx)) == NULL) { + return MG_SSL_ERROR; + } + return MG_SSL_OK; +} + +static enum mg_ssl_if_result mg_use_cert(SSL_CTX *ctx, const char *cert, + const char *key, const char **err_msg); +static enum mg_ssl_if_result mg_use_ca_cert(SSL_CTX *ctx, const char *cert); +static enum mg_ssl_if_result mg_set_cipher_list(SSL_CTX *ctx, const char *cl); +static enum mg_ssl_if_result mg_ssl_if_ossl_set_psk(struct mg_ssl_if_ctx *ctx, + const char *identity, + const char *key_str); + +enum mg_ssl_if_result mg_ssl_if_conn_init( + struct mg_connection *nc, const struct mg_ssl_if_conn_params *params, + const char **err_msg) { + struct mg_ssl_if_ctx *ctx = + (struct mg_ssl_if_ctx *) MG_CALLOC(1, sizeof(*ctx)); + DBG(("%p %s,%s,%s", nc, (params->cert ? params->cert : ""), + (params->key ? params->key : ""), + (params->ca_cert ? params->ca_cert : ""))); + if (ctx == NULL) { + MG_SET_PTRPTR(err_msg, "Out of memory"); + return MG_SSL_ERROR; + } + nc->ssl_if_data = ctx; + if (nc->flags & MG_F_LISTENING) { + ctx->ssl_ctx = SSL_CTX_new(SSLv23_server_method()); + } else { + ctx->ssl_ctx = SSL_CTX_new(SSLv23_client_method()); + } + if (ctx->ssl_ctx == NULL) { + MG_SET_PTRPTR(err_msg, "Failed to create SSL context"); + return MG_SSL_ERROR; + } + +#ifndef KR_VERSION + /* Disable deprecated protocols. */ + SSL_CTX_set_options(ctx->ssl_ctx, SSL_OP_NO_SSLv2); + SSL_CTX_set_options(ctx->ssl_ctx, SSL_OP_NO_SSLv3); + SSL_CTX_set_options(ctx->ssl_ctx, SSL_OP_NO_TLSv1); +#ifdef MG_SSL_OPENSSL_NO_COMPRESSION + SSL_CTX_set_options(ctx->ssl_ctx, SSL_OP_NO_COMPRESSION); +#endif +#ifdef MG_SSL_OPENSSL_CIPHER_SERVER_PREFERENCE + SSL_CTX_set_options(ctx->ssl_ctx, SSL_OP_CIPHER_SERVER_PREFERENCE); +#endif +#else +/* Krypton only supports TLSv1.2 anyway. */ +#endif + + if (params->cert != NULL && + mg_use_cert(ctx->ssl_ctx, params->cert, params->key, err_msg) != + MG_SSL_OK) { + return MG_SSL_ERROR; + } + + if (params->ca_cert != NULL && + mg_use_ca_cert(ctx->ssl_ctx, params->ca_cert) != MG_SSL_OK) { + MG_SET_PTRPTR(err_msg, "Invalid SSL CA cert"); + return MG_SSL_ERROR; + } + + if (params->server_name != NULL) { +#ifdef KR_VERSION + SSL_CTX_kr_set_verify_name(ctx->ssl_ctx, params->server_name); +#else +/* TODO(rojer): Implement server name verification on OpenSSL. */ +#endif + } + + if (mg_set_cipher_list(ctx->ssl_ctx, params->cipher_suites) != MG_SSL_OK) { + MG_SET_PTRPTR(err_msg, "Invalid cipher suite list"); + return MG_SSL_ERROR; + } + + mbuf_init(&ctx->psk, 0); + if (mg_ssl_if_ossl_set_psk(ctx, params->psk_identity, params->psk_key) != + MG_SSL_OK) { + MG_SET_PTRPTR(err_msg, "Invalid PSK settings"); + return MG_SSL_ERROR; + } + + if (!(nc->flags & MG_F_LISTENING) && + (ctx->ssl = SSL_new(ctx->ssl_ctx)) == NULL) { + MG_SET_PTRPTR(err_msg, "Failed to create SSL session"); + return MG_SSL_ERROR; + } + + nc->flags |= MG_F_SSL; + + return MG_SSL_OK; +} + +static enum mg_ssl_if_result mg_ssl_if_ssl_err(struct mg_connection *nc, + int res) { + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; + int err = SSL_get_error(ctx->ssl, res); + if (err == SSL_ERROR_WANT_READ) return MG_SSL_WANT_READ; + if (err == SSL_ERROR_WANT_WRITE) return MG_SSL_WANT_WRITE; + DBG(("%p %p SSL error: %d %d", nc, ctx->ssl_ctx, res, err)); + nc->err = err; + return MG_SSL_ERROR; +} + +enum mg_ssl_if_result mg_ssl_if_handshake(struct mg_connection *nc) { + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; + int server_side = (nc->listener != NULL); + int res; + /* If descriptor is not yet set, do it now. */ + if (SSL_get_fd(ctx->ssl) < 0) { + if (SSL_set_fd(ctx->ssl, nc->sock) != 1) return MG_SSL_ERROR; + } + res = server_side ? SSL_accept(ctx->ssl) : SSL_connect(ctx->ssl); + if (res != 1) return mg_ssl_if_ssl_err(nc, res); + return MG_SSL_OK; +} + +int mg_ssl_if_read(struct mg_connection *nc, void *buf, size_t buf_size) { + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; + int n = SSL_read(ctx->ssl, buf, buf_size); + DBG(("%p %d -> %d", nc, (int) buf_size, n)); + if (n < 0) return mg_ssl_if_ssl_err(nc, n); + if (n == 0) nc->flags |= MG_F_CLOSE_IMMEDIATELY; + return n; +} + +int mg_ssl_if_write(struct mg_connection *nc, const void *data, size_t len) { + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; + int n = SSL_write(ctx->ssl, data, len); + DBG(("%p %d -> %d", nc, (int) len, n)); + if (n <= 0) return mg_ssl_if_ssl_err(nc, n); + return n; +} + +void mg_ssl_if_conn_close_notify(struct mg_connection *nc) { + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; + if (ctx == NULL) return; + SSL_shutdown(ctx->ssl); +} + +void mg_ssl_if_conn_free(struct mg_connection *nc) { + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; + if (ctx == NULL) return; + nc->ssl_if_data = NULL; + if (ctx->ssl != NULL) SSL_free(ctx->ssl); + if (ctx->ssl_ctx != NULL && nc->listener == NULL) SSL_CTX_free(ctx->ssl_ctx); + mbuf_free(&ctx->psk); + memset(ctx, 0, sizeof(*ctx)); + MG_FREE(ctx); +} + +/* + * Cipher suite options used for TLS negotiation. + * https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended_configurations + */ +static const char mg_s_cipher_list[] = +#if defined(MG_SSL_CRYPTO_MODERN) + "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:" + "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:" + "DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:" + "ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:" + "ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:" + "ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:" + "DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:" + "DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:" + "!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK" +#elif defined(MG_SSL_CRYPTO_OLD) + "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:" + "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:" + "DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:" + "ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:" + "ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:" + "ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:" + "DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:" + "DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:" + "ECDHE-ECDSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:" + "AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:DES-CBC3-SHA:" + "HIGH:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:" + "!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA" +#else /* Default - intermediate. */ + "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:" + "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:" + "DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:" + "ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:" + "ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:" + "ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:" + "DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:" + "DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:" + "AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:" + "DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:" + "!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA" +#endif + ; + +/* + * Default DH params for PFS cipher negotiation. This is a 2048-bit group. + * Will be used if none are provided by the user in the certificate file. + */ +#if !MG_DISABLE_PFS && !defined(KR_VERSION) +static const char mg_s_default_dh_params[] = + "\ +-----BEGIN DH PARAMETERS-----\n\ +MIIBCAKCAQEAlvbgD/qh9znWIlGFcV0zdltD7rq8FeShIqIhkQ0C7hYFThrBvF2E\n\ +Z9bmgaP+sfQwGpVlv9mtaWjvERbu6mEG7JTkgmVUJrUt/wiRzwTaCXBqZkdUO8Tq\n\ ++E6VOEQAilstG90ikN1Tfo+K6+X68XkRUIlgawBTKuvKVwBhuvlqTGerOtnXWnrt\n\ +ym//hd3cd5PBYGBix0i7oR4xdghvfR2WLVu0LgdThTBb6XP7gLd19cQ1JuBtAajZ\n\ +wMuPn7qlUkEFDIkAZy59/Hue/H2Q2vU/JsvVhHWCQBL4F1ofEAt50il6ZxR1QfFK\n\ +9VGKDC4oOgm9DlxwwBoC2FjqmvQlqVV3kwIBAg==\n\ +-----END DH PARAMETERS-----\n"; +#endif + +static enum mg_ssl_if_result mg_use_ca_cert(SSL_CTX *ctx, const char *cert) { + if (cert == NULL || strcmp(cert, "*") == 0) { + return MG_SSL_OK; + } + SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, 0); + return SSL_CTX_load_verify_locations(ctx, cert, NULL) == 1 ? MG_SSL_OK + : MG_SSL_ERROR; +} + +static enum mg_ssl_if_result mg_use_cert(SSL_CTX *ctx, const char *cert, + const char *key, + const char **err_msg) { + if (key == NULL) key = cert; + if (cert == NULL || cert[0] == '\0' || key == NULL || key[0] == '\0') { + return MG_SSL_OK; + } else if (SSL_CTX_use_certificate_file(ctx, cert, 1) == 0) { + MG_SET_PTRPTR(err_msg, "Invalid SSL cert"); + return MG_SSL_ERROR; + } else if (SSL_CTX_use_PrivateKey_file(ctx, key, 1) == 0) { + MG_SET_PTRPTR(err_msg, "Invalid SSL key"); + return MG_SSL_ERROR; + } else if (SSL_CTX_use_certificate_chain_file(ctx, cert) == 0) { + MG_SET_PTRPTR(err_msg, "Invalid CA bundle"); + return MG_SSL_ERROR; + } else { + SSL_CTX_set_mode(ctx, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER); +#if !MG_DISABLE_PFS && !defined(KR_VERSION) + BIO *bio = NULL; + DH *dh = NULL; + + /* Try to read DH parameters from the cert/key file. */ + bio = BIO_new_file(cert, "r"); + if (bio != NULL) { + dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL); + BIO_free(bio); + } + /* + * If there are no DH params in the file, fall back to hard-coded ones. + * Not ideal, but better than nothing. + */ + if (dh == NULL) { + bio = BIO_new_mem_buf((void *) mg_s_default_dh_params, -1); + dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL); + BIO_free(bio); + } + if (dh != NULL) { + SSL_CTX_set_tmp_dh(ctx, dh); + SSL_CTX_set_options(ctx, SSL_OP_SINGLE_DH_USE); + DH_free(dh); + } +#if OPENSSL_VERSION_NUMBER > 0x10002000L + SSL_CTX_set_ecdh_auto(ctx, 1); +#endif +#endif + } + return MG_SSL_OK; +} + +static enum mg_ssl_if_result mg_set_cipher_list(SSL_CTX *ctx, const char *cl) { + return (SSL_CTX_set_cipher_list(ctx, cl ? cl : mg_s_cipher_list) == 1 + ? MG_SSL_OK + : MG_SSL_ERROR); +} + +#ifndef KR_VERSION +static unsigned int mg_ssl_if_ossl_psk_cb(SSL *ssl, const char *hint, + char *identity, + unsigned int max_identity_len, + unsigned char *psk, + unsigned int max_psk_len) { + struct mg_ssl_if_ctx *ctx = + (struct mg_ssl_if_ctx *) SSL_CTX_get_app_data(SSL_get_SSL_CTX(ssl)); + size_t key_len = ctx->psk.len - ctx->identity_len - 1; + DBG(("hint: '%s'", (hint ? hint : ""))); + if (ctx->identity_len + 1 > max_identity_len) { + DBG(("identity too long")); + return 0; + } + if (key_len > max_psk_len) { + DBG(("key too long")); + return 0; + } + memcpy(identity, ctx->psk.buf, ctx->identity_len + 1); + memcpy(psk, ctx->psk.buf + ctx->identity_len + 1, key_len); + (void) ssl; + return key_len; +} + +static enum mg_ssl_if_result mg_ssl_if_ossl_set_psk(struct mg_ssl_if_ctx *ctx, + const char *identity, + const char *key_str) { + unsigned char key[32]; + size_t key_len; + size_t i = 0; + if (identity == NULL && key_str == NULL) return MG_SSL_OK; + if (identity == NULL || key_str == NULL) return MG_SSL_ERROR; + key_len = strlen(key_str); + if (key_len != 32 && key_len != 64) return MG_SSL_ERROR; + memset(key, 0, sizeof(key)); + key_len = 0; + for (i = 0; key_str[i] != '\0'; i++) { + unsigned char c; + char hc = tolower((int) key_str[i]); + if (hc >= '0' && hc <= '9') { + c = hc - '0'; + } else if (hc >= 'a' && hc <= 'f') { + c = hc - 'a' + 0xa; + } else { + return MG_SSL_ERROR; + } + key_len = i / 2; + key[key_len] <<= 4; + key[key_len] |= c; + } + key_len++; + DBG(("identity = '%s', key = (%u)", identity, (unsigned int) key_len)); + ctx->identity_len = strlen(identity); + mbuf_append(&ctx->psk, identity, ctx->identity_len + 1); + mbuf_append(&ctx->psk, key, key_len); + SSL_CTX_set_psk_client_callback(ctx->ssl_ctx, mg_ssl_if_ossl_psk_cb); + SSL_CTX_set_app_data(ctx->ssl_ctx, ctx); + return MG_SSL_OK; +} +#else +static enum mg_ssl_if_result mg_ssl_if_ossl_set_psk(struct mg_ssl_if_ctx *ctx, + const char *identity, + const char *key_str) { + (void) ctx; + (void) identity; + (void) key_str; + /* Krypton does not support PSK. */ + return MG_SSL_ERROR; +} +#endif /* defined(KR_VERSION) */ + +const char *mg_set_ssl(struct mg_connection *nc, const char *cert, + const char *ca_cert) { + const char *err_msg = NULL; + struct mg_ssl_if_conn_params params; + memset(¶ms, 0, sizeof(params)); + params.cert = cert; + params.ca_cert = ca_cert; + if (mg_ssl_if_conn_init(nc, ¶ms, &err_msg) != MG_SSL_OK) { + return err_msg; + } + return NULL; +} + +#endif /* MG_ENABLE_SSL && MG_SSL_IF == MG_SSL_IF_OPENSSL */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/ssl_if_mbedtls.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_SSL && MG_SSL_IF == MG_SSL_IF_MBEDTLS + +#include <mbedtls/debug.h> +#include <mbedtls/ecp.h> +#include <mbedtls/platform.h> +#include <mbedtls/ssl.h> +#include <mbedtls/x509_crt.h> + +static void mg_ssl_mbed_log(void *ctx, int level, const char *file, int line, + const char *str) { + enum cs_log_level cs_level; + switch (level) { + case 1: + cs_level = LL_ERROR; + break; + case 2: + case 3: + cs_level = LL_DEBUG; + break; + default: + cs_level = LL_VERBOSE_DEBUG; + } + /* mbedTLS passes strings with \n at the end, strip it. */ + LOG(cs_level, ("%p %.*s", ctx, (int) (strlen(str) - 1), str)); + (void) file; + (void) line; +} + +struct mg_ssl_if_ctx { + mbedtls_ssl_config *conf; + mbedtls_ssl_context *ssl; + mbedtls_x509_crt *cert; + mbedtls_pk_context *key; + mbedtls_x509_crt *ca_cert; + struct mbuf cipher_suites; +}; + +/* Must be provided by the platform. ctx is struct mg_connection. */ +extern int mg_ssl_if_mbed_random(void *ctx, unsigned char *buf, size_t len); + +void mg_ssl_if_init() { +} + +enum mg_ssl_if_result mg_ssl_if_conn_accept(struct mg_connection *nc, + struct mg_connection *lc) { + struct mg_ssl_if_ctx *ctx = + (struct mg_ssl_if_ctx *) MG_CALLOC(1, sizeof(*ctx)); + struct mg_ssl_if_ctx *lc_ctx = (struct mg_ssl_if_ctx *) lc->ssl_if_data; + nc->ssl_if_data = ctx; + if (ctx == NULL || lc_ctx == NULL) return MG_SSL_ERROR; + ctx->ssl = (mbedtls_ssl_context *) MG_CALLOC(1, sizeof(*ctx->ssl)); + if (mbedtls_ssl_setup(ctx->ssl, lc_ctx->conf) != 0) { + return MG_SSL_ERROR; + } + return MG_SSL_OK; +} + +static enum mg_ssl_if_result mg_use_cert(struct mg_ssl_if_ctx *ctx, + const char *cert, const char *key, + const char **err_msg); +static enum mg_ssl_if_result mg_use_ca_cert(struct mg_ssl_if_ctx *ctx, + const char *cert); +static enum mg_ssl_if_result mg_set_cipher_list(struct mg_ssl_if_ctx *ctx, + const char *ciphers); +static enum mg_ssl_if_result mg_ssl_if_mbed_set_psk(struct mg_ssl_if_ctx *ctx, + const char *identity, + const char *key); + +enum mg_ssl_if_result mg_ssl_if_conn_init( + struct mg_connection *nc, const struct mg_ssl_if_conn_params *params, + const char **err_msg) { + struct mg_ssl_if_ctx *ctx = + (struct mg_ssl_if_ctx *) MG_CALLOC(1, sizeof(*ctx)); + DBG(("%p %s,%s,%s", nc, (params->cert ? params->cert : ""), + (params->key ? params->key : ""), + (params->ca_cert ? params->ca_cert : ""))); + + if (ctx == NULL) { + MG_SET_PTRPTR(err_msg, "Out of memory"); + return MG_SSL_ERROR; + } + nc->ssl_if_data = ctx; + ctx->conf = (mbedtls_ssl_config *) MG_CALLOC(1, sizeof(*ctx->conf)); + mbuf_init(&ctx->cipher_suites, 0); + mbedtls_ssl_config_init(ctx->conf); + mbedtls_ssl_conf_dbg(ctx->conf, mg_ssl_mbed_log, nc); + if (mbedtls_ssl_config_defaults( + ctx->conf, (nc->flags & MG_F_LISTENING ? MBEDTLS_SSL_IS_SERVER + : MBEDTLS_SSL_IS_CLIENT), + MBEDTLS_SSL_TRANSPORT_STREAM, MBEDTLS_SSL_PRESET_DEFAULT) != 0) { + MG_SET_PTRPTR(err_msg, "Failed to init SSL config"); + return MG_SSL_ERROR; + } + + /* TLS 1.2 and up */ + mbedtls_ssl_conf_min_version(ctx->conf, MBEDTLS_SSL_MAJOR_VERSION_3, + MBEDTLS_SSL_MINOR_VERSION_3); + mbedtls_ssl_conf_rng(ctx->conf, mg_ssl_if_mbed_random, nc); + + if (params->cert != NULL && + mg_use_cert(ctx, params->cert, params->key, err_msg) != MG_SSL_OK) { + return MG_SSL_ERROR; + } + + if (params->ca_cert != NULL && + mg_use_ca_cert(ctx, params->ca_cert) != MG_SSL_OK) { + MG_SET_PTRPTR(err_msg, "Invalid SSL CA cert"); + return MG_SSL_ERROR; + } + + if (mg_set_cipher_list(ctx, params->cipher_suites) != MG_SSL_OK) { + MG_SET_PTRPTR(err_msg, "Invalid cipher suite list"); + return MG_SSL_ERROR; + } + + if (mg_ssl_if_mbed_set_psk(ctx, params->psk_identity, params->psk_key) != + MG_SSL_OK) { + MG_SET_PTRPTR(err_msg, "Invalid PSK settings"); + return MG_SSL_ERROR; + } + + if (!(nc->flags & MG_F_LISTENING)) { + ctx->ssl = (mbedtls_ssl_context *) MG_CALLOC(1, sizeof(*ctx->ssl)); + mbedtls_ssl_init(ctx->ssl); + if (mbedtls_ssl_setup(ctx->ssl, ctx->conf) != 0) { + MG_SET_PTRPTR(err_msg, "Failed to create SSL session"); + return MG_SSL_ERROR; + } + if (params->server_name != NULL && + mbedtls_ssl_set_hostname(ctx->ssl, params->server_name) != 0) { + return MG_SSL_ERROR; + } + } + +#ifdef MG_SSL_IF_MBEDTLS_MAX_FRAG_LEN + if (mbedtls_ssl_conf_max_frag_len(ctx->conf, +#if MG_SSL_IF_MBEDTLS_MAX_FRAG_LEN == 512 + MBEDTLS_SSL_MAX_FRAG_LEN_512 +#elif MG_SSL_IF_MBEDTLS_MAX_FRAG_LEN == 1024 + MBEDTLS_SSL_MAX_FRAG_LEN_1024 +#elif MG_SSL_IF_MBEDTLS_MAX_FRAG_LEN == 2048 + MBEDTLS_SSL_MAX_FRAG_LEN_2048 +#elif MG_SSL_IF_MBEDTLS_MAX_FRAG_LEN == 4096 + MBEDTLS_SSL_MAX_FRAG_LEN_4096 +#else +#error Invalid MG_SSL_IF_MBEDTLS_MAX_FRAG_LEN +#endif + ) != 0) { + return MG_SSL_ERROR; + } +#endif + + nc->flags |= MG_F_SSL; + + return MG_SSL_OK; +} + +#if MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL +int ssl_socket_send(void *ctx, const unsigned char *buf, size_t len); +int ssl_socket_recv(void *ctx, unsigned char *buf, size_t len); +#else +static int ssl_socket_send(void *ctx, const unsigned char *buf, size_t len) { + struct mg_connection *nc = (struct mg_connection *) ctx; + int n = (int) MG_SEND_FUNC(nc->sock, buf, len, 0); + LOG(LL_DEBUG, ("%p %d -> %d", nc, (int) len, n)); + if (n >= 0) return n; + n = mg_get_errno(); + return ((n == EAGAIN || n == EINPROGRESS) ? MBEDTLS_ERR_SSL_WANT_WRITE : -1); +} + +static int ssl_socket_recv(void *ctx, unsigned char *buf, size_t len) { + struct mg_connection *nc = (struct mg_connection *) ctx; + int n = (int) MG_RECV_FUNC(nc->sock, buf, len, 0); + LOG(LL_DEBUG, ("%p %d <- %d", nc, (int) len, n)); + if (n >= 0) return n; + n = mg_get_errno(); + return ((n == EAGAIN || n == EINPROGRESS) ? MBEDTLS_ERR_SSL_WANT_READ : -1); +} +#endif + +static enum mg_ssl_if_result mg_ssl_if_mbed_err(struct mg_connection *nc, + int ret) { + if (ret == MBEDTLS_ERR_SSL_WANT_READ) return MG_SSL_WANT_READ; + if (ret == MBEDTLS_ERR_SSL_WANT_WRITE) return MG_SSL_WANT_WRITE; + if (ret != + MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY) { /* CLOSE_NOTIFY = Normal shutdown */ + LOG(LL_ERROR, ("%p SSL error: %d", nc, ret)); + } + nc->err = ret; + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + return MG_SSL_ERROR; +} + +static void mg_ssl_if_mbed_free_certs_and_keys(struct mg_ssl_if_ctx *ctx) { + if (ctx->cert != NULL) { + mbedtls_x509_crt_free(ctx->cert); + MG_FREE(ctx->cert); + ctx->cert = NULL; + mbedtls_pk_free(ctx->key); + MG_FREE(ctx->key); + ctx->key = NULL; + } + if (ctx->ca_cert != NULL) { + mbedtls_ssl_conf_ca_chain(ctx->conf, NULL, NULL); +#ifdef MBEDTLS_X509_CA_CHAIN_ON_DISK + if (ctx->ca_cert->ca_chain_file != NULL) { + MG_FREE((void *) ctx->ca_cert->ca_chain_file); + ctx->ca_cert->ca_chain_file = NULL; + } +#endif + mbedtls_x509_crt_free(ctx->ca_cert); + MG_FREE(ctx->ca_cert); + ctx->ca_cert = NULL; + } +} + +enum mg_ssl_if_result mg_ssl_if_handshake(struct mg_connection *nc) { + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; + int err; + /* If bio is not yet set, do it now. */ + if (ctx->ssl->p_bio == NULL) { + mbedtls_ssl_set_bio(ctx->ssl, nc, ssl_socket_send, ssl_socket_recv, NULL); + } + err = mbedtls_ssl_handshake(ctx->ssl); + if (err != 0) return mg_ssl_if_mbed_err(nc, err); +#ifdef MG_SSL_IF_MBEDTLS_FREE_CERTS + /* + * Free the peer certificate, we don't need it after handshake. + * Note that this effectively disables renegotiation. + */ + mbedtls_x509_crt_free(ctx->ssl->session->peer_cert); + mbedtls_free(ctx->ssl->session->peer_cert); + ctx->ssl->session->peer_cert = NULL; + /* On a client connection we can also free our own and CA certs. */ + if (nc->listener == NULL) { + if (ctx->conf->key_cert != NULL) { + /* Note that this assumes one key_cert entry, which matches our init. */ + MG_FREE(ctx->conf->key_cert); + ctx->conf->key_cert = NULL; + } + mbedtls_ssl_conf_ca_chain(ctx->conf, NULL, NULL); + mg_ssl_if_mbed_free_certs_and_keys(ctx); + } +#endif + return MG_SSL_OK; +} + +int mg_ssl_if_read(struct mg_connection *nc, void *buf, size_t buf_size) { + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; + int n = mbedtls_ssl_read(ctx->ssl, (unsigned char *) buf, buf_size); + DBG(("%p %d -> %d", nc, (int) buf_size, n)); + if (n < 0) return mg_ssl_if_mbed_err(nc, n); + if (n == 0) nc->flags |= MG_F_CLOSE_IMMEDIATELY; + return n; +} + +int mg_ssl_if_write(struct mg_connection *nc, const void *data, size_t len) { + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; + int n = mbedtls_ssl_write(ctx->ssl, (const unsigned char *) data, len); + DBG(("%p %d -> %d", nc, (int) len, n)); + if (n < 0) return mg_ssl_if_mbed_err(nc, n); + return n; +} + +void mg_ssl_if_conn_close_notify(struct mg_connection *nc) { + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; + if (ctx == NULL) return; + mbedtls_ssl_close_notify(ctx->ssl); +} + +void mg_ssl_if_conn_free(struct mg_connection *nc) { + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; + if (ctx == NULL) return; + nc->ssl_if_data = NULL; + if (ctx->ssl != NULL) { + mbedtls_ssl_free(ctx->ssl); + MG_FREE(ctx->ssl); + } + mg_ssl_if_mbed_free_certs_and_keys(ctx); + if (ctx->conf != NULL) { + mbedtls_ssl_config_free(ctx->conf); + MG_FREE(ctx->conf); + } + mbuf_free(&ctx->cipher_suites); + memset(ctx, 0, sizeof(*ctx)); + MG_FREE(ctx); +} + +static enum mg_ssl_if_result mg_use_ca_cert(struct mg_ssl_if_ctx *ctx, + const char *ca_cert) { + if (ca_cert == NULL || strcmp(ca_cert, "*") == 0) { + mbedtls_ssl_conf_authmode(ctx->conf, MBEDTLS_SSL_VERIFY_NONE); + return MG_SSL_OK; + } + ctx->ca_cert = (mbedtls_x509_crt *) MG_CALLOC(1, sizeof(*ctx->ca_cert)); + mbedtls_x509_crt_init(ctx->ca_cert); +#ifdef MBEDTLS_X509_CA_CHAIN_ON_DISK + ca_cert = strdup(ca_cert); + if (mbedtls_x509_crt_set_ca_chain_file(ctx->ca_cert, ca_cert) != 0) { + return MG_SSL_ERROR; + } +#else + if (mbedtls_x509_crt_parse_file(ctx->ca_cert, ca_cert) != 0) { + return MG_SSL_ERROR; + } +#endif + mbedtls_ssl_conf_ca_chain(ctx->conf, ctx->ca_cert, NULL); + mbedtls_ssl_conf_authmode(ctx->conf, MBEDTLS_SSL_VERIFY_REQUIRED); + return MG_SSL_OK; +} + +static enum mg_ssl_if_result mg_use_cert(struct mg_ssl_if_ctx *ctx, + const char *cert, const char *key, + const char **err_msg) { + if (key == NULL) key = cert; + if (cert == NULL || cert[0] == '\0' || key == NULL || key[0] == '\0') { + return MG_SSL_OK; + } + ctx->cert = (mbedtls_x509_crt *) MG_CALLOC(1, sizeof(*ctx->cert)); + mbedtls_x509_crt_init(ctx->cert); + ctx->key = (mbedtls_pk_context *) MG_CALLOC(1, sizeof(*ctx->key)); + mbedtls_pk_init(ctx->key); + if (mbedtls_x509_crt_parse_file(ctx->cert, cert) != 0) { + MG_SET_PTRPTR(err_msg, "Invalid SSL cert"); + return MG_SSL_ERROR; + } + if (mbedtls_pk_parse_keyfile(ctx->key, key, NULL) != 0) { + MG_SET_PTRPTR(err_msg, "Invalid SSL key"); + return MG_SSL_ERROR; + } + if (mbedtls_ssl_conf_own_cert(ctx->conf, ctx->cert, ctx->key) != 0) { + MG_SET_PTRPTR(err_msg, "Invalid SSL key or cert"); + return MG_SSL_ERROR; + } + return MG_SSL_OK; +} + +static const int mg_s_cipher_list[] = { + MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, + MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, + MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, + MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, + MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, + MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, + MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, + MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, + MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, + MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, + MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, + MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, + MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256, + MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256, + MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA, 0}; + +/* + * Ciphers can be specified as a colon-separated list of cipher suite names. + * These can be found in + * https://github.com/ARMmbed/mbedtls/blob/development/library/ssl_ciphersuites.c#L267 + * E.g.: TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-256-CCM + */ +static enum mg_ssl_if_result mg_set_cipher_list(struct mg_ssl_if_ctx *ctx, + const char *ciphers) { + if (ciphers != NULL) { + int l, id; + const char *s = ciphers, *e; + char tmp[50]; + while (s != NULL) { + e = strchr(s, ':'); + l = (e != NULL ? (e - s) : (int) strlen(s)); + strncpy(tmp, s, l); + tmp[l] = '\0'; + id = mbedtls_ssl_get_ciphersuite_id(tmp); + DBG(("%s -> %04x", tmp, id)); + if (id != 0) { + mbuf_append(&ctx->cipher_suites, &id, sizeof(id)); + } + s = (e != NULL ? e + 1 : NULL); + } + if (ctx->cipher_suites.len == 0) return MG_SSL_ERROR; + id = 0; + mbuf_append(&ctx->cipher_suites, &id, sizeof(id)); + mbuf_trim(&ctx->cipher_suites); + mbedtls_ssl_conf_ciphersuites(ctx->conf, + (const int *) ctx->cipher_suites.buf); + } else { + mbedtls_ssl_conf_ciphersuites(ctx->conf, mg_s_cipher_list); + } + return MG_SSL_OK; +} + +static enum mg_ssl_if_result mg_ssl_if_mbed_set_psk(struct mg_ssl_if_ctx *ctx, + const char *identity, + const char *key_str) { + unsigned char key[32]; + size_t key_len; + if (identity == NULL && key_str == NULL) return MG_SSL_OK; + if (identity == NULL || key_str == NULL) return MG_SSL_ERROR; + key_len = strlen(key_str); + if (key_len != 32 && key_len != 64) return MG_SSL_ERROR; + size_t i = 0; + memset(key, 0, sizeof(key)); + key_len = 0; + for (i = 0; key_str[i] != '\0'; i++) { + unsigned char c; + char hc = tolower((int) key_str[i]); + if (hc >= '0' && hc <= '9') { + c = hc - '0'; + } else if (hc >= 'a' && hc <= 'f') { + c = hc - 'a' + 0xa; + } else { + return MG_SSL_ERROR; + } + key_len = i / 2; + key[key_len] <<= 4; + key[key_len] |= c; + } + key_len++; + DBG(("identity = '%s', key = (%u)", identity, (unsigned int) key_len)); + /* mbedTLS makes copies of psk and identity. */ + if (mbedtls_ssl_conf_psk(ctx->conf, (const unsigned char *) key, key_len, + (const unsigned char *) identity, + strlen(identity)) != 0) { + return MG_SSL_ERROR; + } + return MG_SSL_OK; +} + +const char *mg_set_ssl(struct mg_connection *nc, const char *cert, + const char *ca_cert) { + const char *err_msg = NULL; + struct mg_ssl_if_conn_params params; + memset(¶ms, 0, sizeof(params)); + params.cert = cert; + params.ca_cert = ca_cert; + if (mg_ssl_if_conn_init(nc, ¶ms, &err_msg) != MG_SSL_OK) { + return err_msg; + } + return NULL; +} + +/* Lazy RNG. Warning: it would be a bad idea to do this in production! */ +#ifdef MG_SSL_MBED_DUMMY_RANDOM +int mg_ssl_if_mbed_random(void *ctx, unsigned char *buf, size_t len) { + (void) ctx; + while (len--) *buf++ = rand(); + return 0; +} +#endif + +#endif /* MG_ENABLE_SSL && MG_SSL_IF == MG_SSL_IF_MBEDTLS */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/uri.c" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/uri.h" */ + +/* + * scan string until encountering one of `seps`, keeping track of component + * boundaries in `res`. + * + * `p` will point to the char after the separator or it will be `end`. + */ +static void parse_uri_component(const char **p, const char *end, + const char *seps, struct mg_str *res) { + const char *q; + res->p = *p; + for (; *p < end; (*p)++) { + for (q = seps; *q != '\0'; q++) { + if (**p == *q) break; + } + if (*q != '\0') break; + } + res->len = (*p) - res->p; + if (*p < end) (*p)++; +} + +int mg_parse_uri(const struct mg_str uri, struct mg_str *scheme, + struct mg_str *user_info, struct mg_str *host, + unsigned int *port, struct mg_str *path, struct mg_str *query, + struct mg_str *fragment) { + struct mg_str rscheme = {0, 0}, ruser_info = {0, 0}, rhost = {0, 0}, + rpath = {0, 0}, rquery = {0, 0}, rfragment = {0, 0}; + unsigned int rport = 0; + enum { + P_START, + P_SCHEME_OR_PORT, + P_USER_INFO, + P_HOST, + P_PORT, + P_REST + } state = P_START; + + const char *p = uri.p, *end = p + uri.len; + while (p < end) { + switch (state) { + case P_START: + /* + * expecting on of: + * - `scheme://xxxx` + * - `xxxx:port` + * - `[a:b:c]:port` + * - `xxxx/path` + */ + if (*p == '[') { + state = P_HOST; + break; + } + for (; p < end; p++) { + if (*p == ':') { + state = P_SCHEME_OR_PORT; + break; + } else if (*p == '/') { + state = P_REST; + break; + } + } + if (state == P_START || state == P_REST) { + rhost.p = uri.p; + rhost.len = p - uri.p; + } + break; + case P_SCHEME_OR_PORT: + if (end - p >= 3 && strncmp(p, "://", 3) == 0) { + rscheme.p = uri.p; + rscheme.len = p - uri.p; + state = P_USER_INFO; + p += 3; + } else { + rhost.p = uri.p; + rhost.len = p - uri.p; + state = P_PORT; + } + break; + case P_USER_INFO: + ruser_info.p = p; + for (; p < end; p++) { + if (*p == '@' || *p == '[') { + break; + } + } + if (p == end || *p == '/' || *p == '[') { + /* backtrack and parse as host */ + p = ruser_info.p; + } + ruser_info.len = p - ruser_info.p; + state = P_HOST; + break; + case P_HOST: + if (*p == '@') p++; + rhost.p = p; + if (*p == '[') { + int found = 0; + for (; !found && p < end; p++) { + found = (*p == ']'); + } + if (!found) return -1; + } else { + for (; p < end; p++) { + if (*p == ':' || *p == '/') break; + } + } + rhost.len = p - rhost.p; + if (p < end) { + if (*p == ':') { + state = P_PORT; + break; + } else if (*p == '/') { + state = P_REST; + break; + } + } + break; + case P_PORT: + p++; + for (; p < end; p++) { + if (*p == '/') { + state = P_REST; + break; + } + rport *= 10; + rport += *p - '0'; + } + break; + case P_REST: + /* `p` points to separator. `path` includes the separator */ + parse_uri_component(&p, end, "?#", &rpath); + if (p < end && *(p - 1) == '?') { + parse_uri_component(&p, end, "#", &rquery); + } + parse_uri_component(&p, end, "", &rfragment); + break; + } + } + + if (scheme != 0) *scheme = rscheme; + if (user_info != 0) *user_info = ruser_info; + if (host != 0) *host = rhost; + if (port != 0) *port = rport; + if (path != 0) *path = rpath; + if (query != 0) *query = rquery; + if (fragment != 0) *fragment = rfragment; + + return 0; +} + +/* Normalize the URI path. Remove/resolve "." and "..". */ +int mg_normalize_uri_path(const struct mg_str *in, struct mg_str *out) { + const char *s = in->p, *se = s + in->len; + char *cp = (char *) out->p, *d; + + if (in->len == 0 || *s != '/') { + out->len = 0; + return 0; + } + + d = cp; + + while (s < se) { + const char *next = s; + struct mg_str component; + parse_uri_component(&next, se, "/", &component); + if (mg_vcmp(&component, ".") == 0) { + /* Yum. */ + } else if (mg_vcmp(&component, "..") == 0) { + /* Backtrack to previous slash. */ + if (d > cp + 1 && *(d - 1) == '/') d--; + while (d > cp && *(d - 1) != '/') d--; + } else { + memmove(d, s, next - s); + d += next - s; + } + s = next; + } + if (d == cp) *d++ = '/'; + + out->p = cp; + out->len = d - cp; + return 1; +} + +int mg_assemble_uri(const struct mg_str *scheme, const struct mg_str *user_info, + const struct mg_str *host, unsigned int port, + const struct mg_str *path, const struct mg_str *query, + const struct mg_str *fragment, int normalize_path, + struct mg_str *uri) { + int result = -1; + struct mbuf out; + mbuf_init(&out, 0); + + if (scheme != NULL && scheme->len > 0) { + mbuf_append(&out, scheme->p, scheme->len); + mbuf_append(&out, "://", 3); + } + + if (user_info != NULL && user_info->len > 0) { + mbuf_append(&out, user_info->p, user_info->len); + mbuf_append(&out, "@", 1); + } + + if (host != NULL && host->len > 0) { + mbuf_append(&out, host->p, host->len); + } + + if (port != 0) { + char port_str[20]; + int port_str_len = sprintf(port_str, ":%u", port); + mbuf_append(&out, port_str, port_str_len); + } + + if (path != NULL && path->len > 0) { + if (normalize_path) { + struct mg_str npath = mg_strdup(*path); + if (npath.len != path->len) goto out; + if (!mg_normalize_uri_path(path, &npath)) { + free((void *) npath.p); + goto out; + } + mbuf_append(&out, npath.p, npath.len); + free((void *) npath.p); + } else { + mbuf_append(&out, path->p, path->len); + } + } else if (normalize_path) { + mbuf_append(&out, "/", 1); + } + + if (query != NULL && query->len > 0) { + mbuf_append(&out, "?", 1); + mbuf_append(&out, query->p, query->len); + } + + if (fragment != NULL && fragment->len > 0) { + mbuf_append(&out, "#", 1); + mbuf_append(&out, fragment->p, fragment->len); + } + + result = 0; + +out: + if (result == 0) { + uri->p = out.buf; + uri->len = out.len; + } else { + mbuf_free(&out); + uri->p = NULL; + uri->len = 0; + } + return result; +} +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/http.c" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_HTTP + +/* Amalgamated: #include "common/md5.h" */ +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/util.h" */ + +static const char *mg_version_header = "Mongoose/" MG_VERSION; + +enum mg_http_proto_data_type { DATA_NONE, DATA_FILE, DATA_PUT }; + +struct mg_http_proto_data_file { + FILE *fp; /* Opened file. */ + int64_t cl; /* Content-Length. How many bytes to send. */ + int64_t sent; /* How many bytes have been already sent. */ + int keepalive; /* Keep connection open after sending. */ + enum mg_http_proto_data_type type; +}; + +#if MG_ENABLE_HTTP_CGI +struct mg_http_proto_data_cgi { + struct mg_connection *cgi_nc; +}; +#endif + +struct mg_http_proto_data_chuncked { + int64_t body_len; /* How many bytes of chunked body was reassembled. */ +}; + +struct mg_http_endpoint { + struct mg_http_endpoint *next; + struct mg_str uri_pattern; /* owned */ + char *auth_domain; /* owned */ + char *auth_file; /* owned */ + + mg_event_handler_t handler; +#if MG_ENABLE_CALLBACK_USERDATA + void *user_data; +#endif +}; + +enum mg_http_multipart_stream_state { + MPS_BEGIN, + MPS_WAITING_FOR_BOUNDARY, + MPS_WAITING_FOR_CHUNK, + MPS_GOT_CHUNK, + MPS_GOT_BOUNDARY, + MPS_FINALIZE, + MPS_FINISHED +}; + +struct mg_http_multipart_stream { + const char *boundary; + int boundary_len; + const char *var_name; + const char *file_name; + void *user_data; + int prev_io_len; + enum mg_http_multipart_stream_state state; + int processing_part; +}; + +struct mg_reverse_proxy_data { + struct mg_connection *linked_conn; +}; + +struct mg_ws_proto_data { + size_t reass_len; /* Defragmented size of the frame so far. */ +}; + +struct mg_http_proto_data { +#if MG_ENABLE_FILESYSTEM + struct mg_http_proto_data_file file; +#endif +#if MG_ENABLE_HTTP_CGI + struct mg_http_proto_data_cgi cgi; +#endif +#if MG_ENABLE_HTTP_STREAMING_MULTIPART + struct mg_http_multipart_stream mp_stream; +#endif +#if MG_ENABLE_HTTP_WEBSOCKET + struct mg_ws_proto_data ws_data; +#endif + struct mg_http_proto_data_chuncked chunk; + struct mg_http_endpoint *endpoints; + mg_event_handler_t endpoint_handler; + struct mg_reverse_proxy_data reverse_proxy_data; + size_t rcvd; /* How many bytes we have received. */ +}; + +static void mg_http_conn_destructor(void *proto_data); +struct mg_connection *mg_connect_http_base( + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), + struct mg_connect_opts opts, const char *scheme1, const char *scheme2, + const char *scheme_ssl1, const char *scheme_ssl2, const char *url, + struct mg_str *path, struct mg_str *user_info, struct mg_str *host); + +static struct mg_http_proto_data *mg_http_get_proto_data( + struct mg_connection *c) { + if (c->proto_data == NULL) { + c->proto_data = MG_CALLOC(1, sizeof(struct mg_http_proto_data)); + c->proto_data_destructor = mg_http_conn_destructor; + } + + return (struct mg_http_proto_data *) c->proto_data; +} + +#if MG_ENABLE_HTTP_STREAMING_MULTIPART +static void mg_http_free_proto_data_mp_stream( + struct mg_http_multipart_stream *mp) { + MG_FREE((void *) mp->boundary); + MG_FREE((void *) mp->var_name); + MG_FREE((void *) mp->file_name); + memset(mp, 0, sizeof(*mp)); +} +#endif + +#if MG_ENABLE_FILESYSTEM +static void mg_http_free_proto_data_file(struct mg_http_proto_data_file *d) { + if (d != NULL) { + if (d->fp != NULL) { + fclose(d->fp); + } + memset(d, 0, sizeof(struct mg_http_proto_data_file)); + } +} +#endif + +static void mg_http_free_proto_data_endpoints(struct mg_http_endpoint **ep) { + struct mg_http_endpoint *current = *ep; + + while (current != NULL) { + struct mg_http_endpoint *tmp = current->next; + MG_FREE((void *) current->uri_pattern.p); + MG_FREE((void *) current->auth_domain); + MG_FREE((void *) current->auth_file); + MG_FREE(current); + current = tmp; + } + + ep = NULL; +} + +static void mg_http_free_reverse_proxy_data(struct mg_reverse_proxy_data *rpd) { + if (rpd->linked_conn != NULL) { + /* + * Connection has linked one, we have to unlink & close it + * since _this_ connection is going to die and + * it doesn't make sense to keep another one + */ + struct mg_http_proto_data *pd = mg_http_get_proto_data(rpd->linked_conn); + if (pd->reverse_proxy_data.linked_conn != NULL) { + pd->reverse_proxy_data.linked_conn->flags |= MG_F_SEND_AND_CLOSE; + pd->reverse_proxy_data.linked_conn = NULL; + } + rpd->linked_conn = NULL; + } +} + +static void mg_http_conn_destructor(void *proto_data) { + struct mg_http_proto_data *pd = (struct mg_http_proto_data *) proto_data; +#if MG_ENABLE_FILESYSTEM + mg_http_free_proto_data_file(&pd->file); +#endif +#if MG_ENABLE_HTTP_CGI + mg_http_free_proto_data_cgi(&pd->cgi); +#endif +#if MG_ENABLE_HTTP_STREAMING_MULTIPART + mg_http_free_proto_data_mp_stream(&pd->mp_stream); +#endif + mg_http_free_proto_data_endpoints(&pd->endpoints); + mg_http_free_reverse_proxy_data(&pd->reverse_proxy_data); + MG_FREE(proto_data); +} + +#if MG_ENABLE_FILESYSTEM + +#define MIME_ENTRY(_ext, _type) \ + { _ext, sizeof(_ext) - 1, _type } +static const struct { + const char *extension; + size_t ext_len; + const char *mime_type; +} mg_static_builtin_mime_types[] = { + MIME_ENTRY("html", "text/html"), + MIME_ENTRY("html", "text/html"), + MIME_ENTRY("htm", "text/html"), + MIME_ENTRY("shtm", "text/html"), + MIME_ENTRY("shtml", "text/html"), + MIME_ENTRY("css", "text/css"), + MIME_ENTRY("js", "application/x-javascript"), + MIME_ENTRY("ico", "image/x-icon"), + MIME_ENTRY("gif", "image/gif"), + MIME_ENTRY("jpg", "image/jpeg"), + MIME_ENTRY("jpeg", "image/jpeg"), + MIME_ENTRY("png", "image/png"), + MIME_ENTRY("svg", "image/svg+xml"), + MIME_ENTRY("txt", "text/plain"), + MIME_ENTRY("torrent", "application/x-bittorrent"), + MIME_ENTRY("wav", "audio/x-wav"), + MIME_ENTRY("mp3", "audio/x-mp3"), + MIME_ENTRY("mid", "audio/mid"), + MIME_ENTRY("m3u", "audio/x-mpegurl"), + MIME_ENTRY("ogg", "application/ogg"), + MIME_ENTRY("ram", "audio/x-pn-realaudio"), + MIME_ENTRY("xml", "text/xml"), + MIME_ENTRY("ttf", "application/x-font-ttf"), + MIME_ENTRY("json", "application/json"), + MIME_ENTRY("xslt", "application/xml"), + MIME_ENTRY("xsl", "application/xml"), + MIME_ENTRY("ra", "audio/x-pn-realaudio"), + MIME_ENTRY("doc", "application/msword"), + MIME_ENTRY("exe", "application/octet-stream"), + MIME_ENTRY("zip", "application/x-zip-compressed"), + MIME_ENTRY("xls", "application/excel"), + MIME_ENTRY("tgz", "application/x-tar-gz"), + MIME_ENTRY("tar", "application/x-tar"), + MIME_ENTRY("gz", "application/x-gunzip"), + MIME_ENTRY("arj", "application/x-arj-compressed"), + MIME_ENTRY("rar", "application/x-rar-compressed"), + MIME_ENTRY("rtf", "application/rtf"), + MIME_ENTRY("pdf", "application/pdf"), + MIME_ENTRY("swf", "application/x-shockwave-flash"), + MIME_ENTRY("mpg", "video/mpeg"), + MIME_ENTRY("webm", "video/webm"), + MIME_ENTRY("mpeg", "video/mpeg"), + MIME_ENTRY("mov", "video/quicktime"), + MIME_ENTRY("mp4", "video/mp4"), + MIME_ENTRY("m4v", "video/x-m4v"), + MIME_ENTRY("asf", "video/x-ms-asf"), + MIME_ENTRY("avi", "video/x-msvideo"), + MIME_ENTRY("bmp", "image/bmp"), + {NULL, 0, NULL}}; + +static struct mg_str mg_get_mime_type(const char *path, const char *dflt, + const struct mg_serve_http_opts *opts) { + const char *ext, *overrides; + size_t i, path_len; + struct mg_str r, k, v; + + path_len = strlen(path); + + overrides = opts->custom_mime_types; + while ((overrides = mg_next_comma_list_entry(overrides, &k, &v)) != NULL) { + ext = path + (path_len - k.len); + if (path_len > k.len && mg_vcasecmp(&k, ext) == 0) { + return v; + } + } + + for (i = 0; mg_static_builtin_mime_types[i].extension != NULL; i++) { + ext = path + (path_len - mg_static_builtin_mime_types[i].ext_len); + if (path_len > mg_static_builtin_mime_types[i].ext_len && ext[-1] == '.' && + mg_casecmp(ext, mg_static_builtin_mime_types[i].extension) == 0) { + r.p = mg_static_builtin_mime_types[i].mime_type; + r.len = strlen(r.p); + return r; + } + } + + r.p = dflt; + r.len = strlen(r.p); + return r; +} +#endif + +/* + * Check whether full request is buffered. Return: + * -1 if request is malformed + * 0 if request is not yet fully buffered + * >0 actual request length, including last \r\n\r\n + */ +static int mg_http_get_request_len(const char *s, int buf_len) { + const unsigned char *buf = (unsigned char *) s; + int i; + + for (i = 0; i < buf_len; i++) { + if (!isprint(buf[i]) && buf[i] != '\r' && buf[i] != '\n' && buf[i] < 128) { + return -1; + } else if (buf[i] == '\n' && i + 1 < buf_len && buf[i + 1] == '\n') { + return i + 2; + } else if (buf[i] == '\n' && i + 2 < buf_len && buf[i + 1] == '\r' && + buf[i + 2] == '\n') { + return i + 3; + } + } + + return 0; +} + +static const char *mg_http_parse_headers(const char *s, const char *end, + int len, struct http_message *req) { + int i = 0; + while (i < (int) ARRAY_SIZE(req->header_names) - 1) { + struct mg_str *k = &req->header_names[i], *v = &req->header_values[i]; + + s = mg_skip(s, end, ": ", k); + s = mg_skip(s, end, "\r\n", v); + + while (v->len > 0 && v->p[v->len - 1] == ' ') { + v->len--; /* Trim trailing spaces in header value */ + } + + /* + * If header value is empty - skip it and go to next (if any). + * NOTE: Do not add it to headers_values because such addition changes API + * behaviour + */ + if (k->len != 0 && v->len == 0) { + continue; + } + + if (k->len == 0 || v->len == 0) { + k->p = v->p = NULL; + k->len = v->len = 0; + break; + } + + if (!mg_ncasecmp(k->p, "Content-Length", 14)) { + req->body.len = (size_t) to64(v->p); + req->message.len = len + req->body.len; + } + + i++; + } + + return s; +} + +int mg_parse_http(const char *s, int n, struct http_message *hm, int is_req) { + const char *end, *qs; + int len = mg_http_get_request_len(s, n); + + if (len <= 0) return len; + + memset(hm, 0, sizeof(*hm)); + hm->message.p = s; + hm->body.p = s + len; + hm->message.len = hm->body.len = (size_t) ~0; + end = s + len; + + /* Request is fully buffered. Skip leading whitespaces. */ + while (s < end && isspace(*(unsigned char *) s)) s++; + + if (is_req) { + /* Parse request line: method, URI, proto */ + s = mg_skip(s, end, " ", &hm->method); + s = mg_skip(s, end, " ", &hm->uri); + s = mg_skip(s, end, "\r\n", &hm->proto); + if (hm->uri.p <= hm->method.p || hm->proto.p <= hm->uri.p) return -1; + + /* If URI contains '?' character, initialize query_string */ + if ((qs = (char *) memchr(hm->uri.p, '?', hm->uri.len)) != NULL) { + hm->query_string.p = qs + 1; + hm->query_string.len = &hm->uri.p[hm->uri.len] - (qs + 1); + hm->uri.len = qs - hm->uri.p; + } + } else { + s = mg_skip(s, end, " ", &hm->proto); + if (end - s < 4 || s[3] != ' ') return -1; + hm->resp_code = atoi(s); + if (hm->resp_code < 100 || hm->resp_code >= 600) return -1; + s += 4; + s = mg_skip(s, end, "\r\n", &hm->resp_status_msg); + } + + s = mg_http_parse_headers(s, end, len, hm); + + /* + * mg_parse_http() is used to parse both HTTP requests and HTTP + * responses. If HTTP response does not have Content-Length set, then + * body is read until socket is closed, i.e. body.len is infinite (~0). + * + * For HTTP requests though, according to + * http://tools.ietf.org/html/rfc7231#section-8.1.3, + * only POST and PUT methods have defined body semantics. + * Therefore, if Content-Length is not specified and methods are + * not one of PUT or POST, set body length to 0. + * + * So, + * if it is HTTP request, and Content-Length is not set, + * and method is not (PUT or POST) then reset body length to zero. + */ + if (hm->body.len == (size_t) ~0 && is_req && + mg_vcasecmp(&hm->method, "PUT") != 0 && + mg_vcasecmp(&hm->method, "POST") != 0) { + hm->body.len = 0; + hm->message.len = len; + } + + return len; +} + +struct mg_str *mg_get_http_header(struct http_message *hm, const char *name) { + size_t i, len = strlen(name); + + for (i = 0; hm->header_names[i].len > 0; i++) { + struct mg_str *h = &hm->header_names[i], *v = &hm->header_values[i]; + if (h->p != NULL && h->len == len && !mg_ncasecmp(h->p, name, len)) + return v; + } + + return NULL; +} + +#if MG_ENABLE_FILESYSTEM +static void mg_http_transfer_file_data(struct mg_connection *nc) { + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); + char buf[MG_MAX_HTTP_SEND_MBUF]; + size_t n = 0, to_read = 0, left = (size_t)(pd->file.cl - pd->file.sent); + + if (pd->file.type == DATA_FILE) { + struct mbuf *io = &nc->send_mbuf; + if (io->len >= MG_MAX_HTTP_SEND_MBUF) { + to_read = 0; + } else { + to_read = MG_MAX_HTTP_SEND_MBUF - io->len; + } + if (to_read > left) { + to_read = left; + } + if (to_read > 0) { + n = mg_fread(buf, 1, to_read, pd->file.fp); + if (n > 0) { + mg_send(nc, buf, n); + pd->file.sent += n; + DBG(("%p sent %d (total %d)", nc, (int) n, (int) pd->file.sent)); + } + } else { + /* Rate-limited */ + } + if (pd->file.sent >= pd->file.cl) { + LOG(LL_DEBUG, ("%p done, %d bytes", nc, (int) pd->file.sent)); + if (!pd->file.keepalive) nc->flags |= MG_F_SEND_AND_CLOSE; + mg_http_free_proto_data_file(&pd->file); + } + } else if (pd->file.type == DATA_PUT) { + struct mbuf *io = &nc->recv_mbuf; + size_t to_write = left <= 0 ? 0 : left < io->len ? (size_t) left : io->len; + size_t n = mg_fwrite(io->buf, 1, to_write, pd->file.fp); + if (n > 0) { + mbuf_remove(io, n); + pd->file.sent += n; + } + if (n == 0 || pd->file.sent >= pd->file.cl) { + if (!pd->file.keepalive) nc->flags |= MG_F_SEND_AND_CLOSE; + mg_http_free_proto_data_file(&pd->file); + } + } +#if MG_ENABLE_HTTP_CGI + else if (pd->cgi.cgi_nc != NULL) { + /* This is POST data that needs to be forwarded to the CGI process */ + if (pd->cgi.cgi_nc != NULL) { + mg_forward(nc, pd->cgi.cgi_nc); + } else { + nc->flags |= MG_F_SEND_AND_CLOSE; + } + } +#endif +} +#endif /* MG_ENABLE_FILESYSTEM */ + +/* + * Parse chunked-encoded buffer. Return 0 if the buffer is not encoded, or + * if it's incomplete. If the chunk is fully buffered, return total number of + * bytes in a chunk, and store data in `data`, `data_len`. + */ +static size_t mg_http_parse_chunk(char *buf, size_t len, char **chunk_data, + size_t *chunk_len) { + unsigned char *s = (unsigned char *) buf; + size_t n = 0; /* scanned chunk length */ + size_t i = 0; /* index in s */ + + /* Scan chunk length. That should be a hexadecimal number. */ + while (i < len && isxdigit(s[i])) { + n *= 16; + n += (s[i] >= '0' && s[i] <= '9') ? s[i] - '0' : tolower(s[i]) - 'a' + 10; + i++; + } + + /* Skip new line */ + if (i == 0 || i + 2 > len || s[i] != '\r' || s[i + 1] != '\n') { + return 0; + } + i += 2; + + /* Record where the data is */ + *chunk_data = (char *) s + i; + *chunk_len = n; + + /* Skip data */ + i += n; + + /* Skip new line */ + if (i == 0 || i + 2 > len || s[i] != '\r' || s[i + 1] != '\n') { + return 0; + } + return i + 2; +} + +MG_INTERNAL size_t mg_handle_chunked(struct mg_connection *nc, + struct http_message *hm, char *buf, + size_t blen) { + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); + char *data; + size_t i, n, data_len, body_len, zero_chunk_received = 0; + /* Find out piece of received data that is not yet reassembled */ + body_len = (size_t) pd->chunk.body_len; + assert(blen >= body_len); + + /* Traverse all fully buffered chunks */ + for (i = body_len; + (n = mg_http_parse_chunk(buf + i, blen - i, &data, &data_len)) > 0; + i += n) { + /* Collapse chunk data to the rest of HTTP body */ + memmove(buf + body_len, data, data_len); + body_len += data_len; + hm->body.len = body_len; + + if (data_len == 0) { + zero_chunk_received = 1; + i += n; + break; + } + } + + if (i > body_len) { + /* Shift unparsed content to the parsed body */ + assert(i <= blen); + memmove(buf + body_len, buf + i, blen - i); + memset(buf + body_len + blen - i, 0, i - body_len); + nc->recv_mbuf.len -= i - body_len; + pd->chunk.body_len = body_len; + + /* Send MG_EV_HTTP_CHUNK event */ + nc->flags &= ~MG_F_DELETE_CHUNK; + mg_call(nc, nc->handler, nc->user_data, MG_EV_HTTP_CHUNK, hm); + + /* Delete processed data if user set MG_F_DELETE_CHUNK flag */ + if (nc->flags & MG_F_DELETE_CHUNK) { + memset(buf, 0, body_len); + memmove(buf, buf + body_len, blen - i); + nc->recv_mbuf.len -= body_len; + hm->body.len = 0; + pd->chunk.body_len = 0; + } + + if (zero_chunk_received) { + /* Total message size is len(body) + len(headers) */ + hm->message.len = + (size_t) pd->chunk.body_len + blen - i + (hm->body.p - hm->message.p); + } + } + + return body_len; +} + +struct mg_http_endpoint *mg_http_get_endpoint_handler(struct mg_connection *nc, + struct mg_str *uri_path) { + struct mg_http_proto_data *pd; + struct mg_http_endpoint *ret = NULL; + int matched, matched_max = 0; + struct mg_http_endpoint *ep; + + if (nc == NULL) { + return NULL; + } + + pd = mg_http_get_proto_data(nc); + + ep = pd->endpoints; + while (ep != NULL) { + if ((matched = mg_match_prefix_n(ep->uri_pattern, *uri_path)) != -1) { + if (matched > matched_max) { + /* Looking for the longest suitable handler */ + ret = ep; + matched_max = matched; + } + } + + ep = ep->next; + } + + return ret; +} + +#if MG_ENABLE_HTTP_STREAMING_MULTIPART +static void mg_http_multipart_continue(struct mg_connection *nc); + +static void mg_http_multipart_begin(struct mg_connection *nc, + struct http_message *hm, int req_len); + +#endif + +static void mg_http_call_endpoint_handler(struct mg_connection *nc, int ev, + struct http_message *hm); + +static void deliver_chunk(struct mg_connection *c, struct http_message *hm, + int req_len) { + /* Incomplete message received. Send MG_EV_HTTP_CHUNK event */ + hm->body.len = c->recv_mbuf.len - req_len; + c->flags &= ~MG_F_DELETE_CHUNK; + mg_call(c, c->handler, c->user_data, MG_EV_HTTP_CHUNK, hm); + /* Delete processed data if user set MG_F_DELETE_CHUNK flag */ + if (c->flags & MG_F_DELETE_CHUNK) c->recv_mbuf.len = req_len; +} + +/* + * lx106 compiler has a bug (TODO(mkm) report and insert tracking bug here) + * If a big structure is declared in a big function, lx106 gcc will make it + * even bigger (round up to 4k, from 700 bytes of actual size). + */ +#ifdef __xtensa__ +static void mg_http_handler2(struct mg_connection *nc, int ev, + void *ev_data MG_UD_ARG(void *user_data), + struct http_message *hm) __attribute__((noinline)); + +void mg_http_handler(struct mg_connection *nc, int ev, + void *ev_data MG_UD_ARG(void *user_data)) { + struct http_message hm; + mg_http_handler2(nc, ev, ev_data MG_UD_ARG(user_data), &hm); +} + +static void mg_http_handler2(struct mg_connection *nc, int ev, + void *ev_data MG_UD_ARG(void *user_data), + struct http_message *hm) { +#else /* !__XTENSA__ */ +void mg_http_handler(struct mg_connection *nc, int ev, + void *ev_data MG_UD_ARG(void *user_data)) { + struct http_message shm, *hm = &shm; +#endif /* __XTENSA__ */ + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); + struct mbuf *io = &nc->recv_mbuf; + int req_len; + const int is_req = (nc->listener != NULL); +#if MG_ENABLE_HTTP_WEBSOCKET + struct mg_str *vec; +#endif + if (ev == MG_EV_CLOSE) { +#if MG_ENABLE_HTTP_CGI + /* Close associated CGI forwarder connection */ + if (pd->cgi.cgi_nc != NULL) { + pd->cgi.cgi_nc->user_data = NULL; + pd->cgi.cgi_nc->flags |= MG_F_CLOSE_IMMEDIATELY; + } +#endif +#if MG_ENABLE_HTTP_STREAMING_MULTIPART + if (pd->mp_stream.boundary != NULL) { + /* + * Multipart message is in progress, but connection is closed. + * Finish part and request with an error flag. + */ + struct mg_http_multipart_part mp; + memset(&mp, 0, sizeof(mp)); + mp.status = -1; + mp.var_name = pd->mp_stream.var_name; + mp.file_name = pd->mp_stream.file_name; + mg_call(nc, (pd->endpoint_handler ? pd->endpoint_handler : nc->handler), + nc->user_data, MG_EV_HTTP_PART_END, &mp); + mp.var_name = NULL; + mp.file_name = NULL; + mg_call(nc, (pd->endpoint_handler ? pd->endpoint_handler : nc->handler), + nc->user_data, MG_EV_HTTP_MULTIPART_REQUEST_END, &mp); + } else +#endif + if (io->len > 0 && + (req_len = mg_parse_http(io->buf, io->len, hm, is_req)) > 0) { + /* + * For HTTP messages without Content-Length, always send HTTP message + * before MG_EV_CLOSE message. + */ + int ev2 = is_req ? MG_EV_HTTP_REQUEST : MG_EV_HTTP_REPLY; + hm->message.len = io->len; + hm->body.len = io->buf + io->len - hm->body.p; + deliver_chunk(nc, hm, req_len); + mg_http_call_endpoint_handler(nc, ev2, hm); + } + pd->rcvd = 0; + } + +#if MG_ENABLE_FILESYSTEM + if (pd->file.fp != NULL) { + mg_http_transfer_file_data(nc); + } +#endif + + mg_call(nc, nc->handler, nc->user_data, ev, ev_data); + + if (ev == MG_EV_RECV) { + struct mg_str *s; + pd->rcvd += *(int *) ev_data; + +#if MG_ENABLE_HTTP_STREAMING_MULTIPART + if (pd->mp_stream.boundary != NULL) { + mg_http_multipart_continue(nc); + return; + } +#endif /* MG_ENABLE_HTTP_STREAMING_MULTIPART */ + + req_len = mg_parse_http(io->buf, io->len, hm, is_req); + + if (req_len > 0 && + (s = mg_get_http_header(hm, "Transfer-Encoding")) != NULL && + mg_vcasecmp(s, "chunked") == 0) { + mg_handle_chunked(nc, hm, io->buf + req_len, io->len - req_len); + } + +#if MG_ENABLE_HTTP_STREAMING_MULTIPART + if (req_len > 0 && (s = mg_get_http_header(hm, "Content-Type")) != NULL && + s->len >= 9 && strncmp(s->p, "multipart", 9) == 0) { + mg_http_multipart_begin(nc, hm, req_len); + mg_http_multipart_continue(nc); + return; + } +#endif /* MG_ENABLE_HTTP_STREAMING_MULTIPART */ + + /* TODO(alashkin): refactor this ifelseifelseifelseifelse */ + if ((req_len < 0 || + (req_len == 0 && io->len >= MG_MAX_HTTP_REQUEST_SIZE))) { + DBG(("invalid request")); + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + } else if (req_len == 0) { + /* Do nothing, request is not yet fully buffered */ + } +#if MG_ENABLE_HTTP_WEBSOCKET + else if (nc->listener == NULL && + mg_get_http_header(hm, "Sec-WebSocket-Accept")) { + /* We're websocket client, got handshake response from server. */ + /* TODO(lsm): check the validity of accept Sec-WebSocket-Accept */ + mbuf_remove(io, req_len); + nc->proto_handler = mg_ws_handler; + nc->flags |= MG_F_IS_WEBSOCKET; + mg_call(nc, nc->handler, nc->user_data, MG_EV_WEBSOCKET_HANDSHAKE_DONE, + NULL); + mg_ws_handler(nc, MG_EV_RECV, ev_data MG_UD_ARG(user_data)); + } else if (nc->listener != NULL && + (vec = mg_get_http_header(hm, "Sec-WebSocket-Key")) != NULL) { + struct mg_http_endpoint *ep; + + /* This is a websocket request. Switch protocol handlers. */ + mbuf_remove(io, req_len); + nc->proto_handler = mg_ws_handler; + nc->flags |= MG_F_IS_WEBSOCKET; + + /* + * If we have a handler set up with mg_register_http_endpoint(), + * deliver subsequent websocket events to this handler after the + * protocol switch. + */ + ep = mg_http_get_endpoint_handler(nc->listener, &hm->uri); + if (ep != NULL) { + nc->handler = ep->handler; +#if MG_ENABLE_CALLBACK_USERDATA + nc->user_data = ep->user_data; +#endif + } + + /* Send handshake */ + mg_call(nc, nc->handler, nc->user_data, MG_EV_WEBSOCKET_HANDSHAKE_REQUEST, + hm); + if (!(nc->flags & (MG_F_CLOSE_IMMEDIATELY | MG_F_SEND_AND_CLOSE))) { + if (nc->send_mbuf.len == 0) { + mg_ws_handshake(nc, vec, hm); + } + mg_call(nc, nc->handler, nc->user_data, MG_EV_WEBSOCKET_HANDSHAKE_DONE, + NULL); + mg_ws_handler(nc, MG_EV_RECV, ev_data MG_UD_ARG(user_data)); + } + } +#endif /* MG_ENABLE_HTTP_WEBSOCKET */ + else if (hm->message.len > pd->rcvd) { + /* Not yet received all HTTP body, deliver MG_EV_HTTP_CHUNK */ + deliver_chunk(nc, hm, req_len); + } else { + /* We did receive all HTTP body. */ + int trigger_ev = nc->listener ? MG_EV_HTTP_REQUEST : MG_EV_HTTP_REPLY; + char addr[32]; + mg_sock_addr_to_str(&nc->sa, addr, sizeof(addr), + MG_SOCK_STRINGIFY_IP | MG_SOCK_STRINGIFY_PORT); + DBG(("%p %s %.*s %.*s", nc, addr, (int) hm->method.len, hm->method.p, + (int) hm->uri.len, hm->uri.p)); + deliver_chunk(nc, hm, req_len); + /* Whole HTTP message is fully buffered, call event handler */ + mg_http_call_endpoint_handler(nc, trigger_ev, hm); + mbuf_remove(io, hm->message.len); + pd->rcvd = 0; + } + } +} + +static size_t mg_get_line_len(const char *buf, size_t buf_len) { + size_t len = 0; + while (len < buf_len && buf[len] != '\n') len++; + return len == buf_len ? 0 : len + 1; +} + +#if MG_ENABLE_HTTP_STREAMING_MULTIPART +static void mg_http_multipart_begin(struct mg_connection *nc, + struct http_message *hm, int req_len) { + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); + struct mg_str *ct; + struct mbuf *io = &nc->recv_mbuf; + + char boundary[100]; + int boundary_len; + + ct = mg_get_http_header(hm, "Content-Type"); + if (ct == NULL) { + /* We need more data - or it isn't multipart mesage */ + goto exit_mp; + } + + /* Content-type should start with "multipart" */ + if (ct->len < 9 || strncmp(ct->p, "multipart", 9) != 0) { + goto exit_mp; + } + + boundary_len = + mg_http_parse_header(ct, "boundary", boundary, sizeof(boundary)); + if (boundary_len == 0) { + /* + * Content type is multipart, but there is no boundary, + * probably malformed request + */ + nc->flags = MG_F_CLOSE_IMMEDIATELY; + DBG(("invalid request")); + goto exit_mp; + } + + /* If we reach this place - that is multipart request */ + + if (pd->mp_stream.boundary != NULL) { + /* + * Another streaming request was in progress, + * looks like protocol error + */ + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + } else { + struct mg_http_endpoint *ep = NULL; + pd->mp_stream.state = MPS_BEGIN; + pd->mp_stream.boundary = strdup(boundary); + pd->mp_stream.boundary_len = strlen(boundary); + pd->mp_stream.var_name = pd->mp_stream.file_name = NULL; + pd->endpoint_handler = nc->handler; + + ep = mg_http_get_endpoint_handler(nc->listener, &hm->uri); + if (ep != NULL) { + pd->endpoint_handler = ep->handler; + } + + mg_http_call_endpoint_handler(nc, MG_EV_HTTP_MULTIPART_REQUEST, hm); + + mbuf_remove(io, req_len); + } +exit_mp: + ; +} + +#define CONTENT_DISPOSITION "Content-Disposition: " + +static void mg_http_multipart_call_handler(struct mg_connection *c, int ev, + const char *data, size_t data_len) { + struct mg_http_multipart_part mp; + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); + memset(&mp, 0, sizeof(mp)); + + mp.var_name = pd->mp_stream.var_name; + mp.file_name = pd->mp_stream.file_name; + mp.user_data = pd->mp_stream.user_data; + mp.data.p = data; + mp.data.len = data_len; + mg_call(c, pd->endpoint_handler, c->user_data, ev, &mp); + pd->mp_stream.user_data = mp.user_data; +} + +static int mg_http_multipart_got_chunk(struct mg_connection *c) { + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); + struct mbuf *io = &c->recv_mbuf; + + mg_http_multipart_call_handler(c, MG_EV_HTTP_PART_DATA, io->buf, + pd->mp_stream.prev_io_len); + mbuf_remove(io, pd->mp_stream.prev_io_len); + pd->mp_stream.prev_io_len = 0; + pd->mp_stream.state = MPS_WAITING_FOR_CHUNK; + + return 0; +} + +static int mg_http_multipart_finalize(struct mg_connection *c) { + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); + + mg_http_multipart_call_handler(c, MG_EV_HTTP_PART_END, NULL, 0); + MG_FREE((void *) pd->mp_stream.file_name); + pd->mp_stream.file_name = NULL; + MG_FREE((void *) pd->mp_stream.var_name); + pd->mp_stream.var_name = NULL; + mg_http_multipart_call_handler(c, MG_EV_HTTP_MULTIPART_REQUEST_END, NULL, 0); + mg_http_free_proto_data_mp_stream(&pd->mp_stream); + pd->mp_stream.state = MPS_FINISHED; + + return 1; +} + +static int mg_http_multipart_wait_for_boundary(struct mg_connection *c) { + const char *boundary; + struct mbuf *io = &c->recv_mbuf; + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); + + if (pd->mp_stream.boundary == NULL) { + pd->mp_stream.state = MPS_FINALIZE; + DBG(("Invalid request: boundary not initialized")); + return 0; + } + + if ((int) io->len < pd->mp_stream.boundary_len + 2) { + return 0; + } + + boundary = c_strnstr(io->buf, pd->mp_stream.boundary, io->len); + if (boundary != NULL) { + const char *boundary_end = (boundary + pd->mp_stream.boundary_len); + if (io->len - (boundary_end - io->buf) < 4) { + return 0; + } + if (strncmp(boundary_end, "--\r\n", 4) == 0) { + pd->mp_stream.state = MPS_FINALIZE; + mbuf_remove(io, (boundary_end - io->buf) + 4); + } else { + pd->mp_stream.state = MPS_GOT_BOUNDARY; + } + } else { + return 0; + } + + return 1; +} + +static int mg_http_multipart_process_boundary(struct mg_connection *c) { + int data_size; + const char *boundary, *block_begin; + struct mbuf *io = &c->recv_mbuf; + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); + char file_name[100], var_name[100]; + int line_len; + boundary = c_strnstr(io->buf, pd->mp_stream.boundary, io->len); + block_begin = boundary + pd->mp_stream.boundary_len + 2; + data_size = io->len - (block_begin - io->buf); + + while (data_size > 0 && + (line_len = mg_get_line_len(block_begin, data_size)) != 0) { + if (line_len > (int) sizeof(CONTENT_DISPOSITION) && + mg_ncasecmp(block_begin, CONTENT_DISPOSITION, + sizeof(CONTENT_DISPOSITION) - 1) == 0) { + struct mg_str header; + + header.p = block_begin + sizeof(CONTENT_DISPOSITION) - 1; + header.len = line_len - sizeof(CONTENT_DISPOSITION) - 1; + mg_http_parse_header(&header, "name", var_name, sizeof(var_name) - 2); + mg_http_parse_header(&header, "filename", file_name, + sizeof(file_name) - 2); + block_begin += line_len; + data_size -= line_len; + continue; + } + + if (line_len == 2 && mg_ncasecmp(block_begin, "\r\n", 2) == 0) { + mbuf_remove(io, block_begin - io->buf + 2); + + if (pd->mp_stream.processing_part != 0) { + mg_http_multipart_call_handler(c, MG_EV_HTTP_PART_END, NULL, 0); + } + + MG_FREE((void *) pd->mp_stream.file_name); + pd->mp_stream.file_name = strdup(file_name); + MG_FREE((void *) pd->mp_stream.var_name); + pd->mp_stream.var_name = strdup(var_name); + + mg_http_multipart_call_handler(c, MG_EV_HTTP_PART_BEGIN, NULL, 0); + pd->mp_stream.state = MPS_WAITING_FOR_CHUNK; + pd->mp_stream.processing_part++; + return 1; + } + + block_begin += line_len; + } + + pd->mp_stream.state = MPS_WAITING_FOR_BOUNDARY; + + return 0; +} + +static int mg_http_multipart_continue_wait_for_chunk(struct mg_connection *c) { + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); + struct mbuf *io = &c->recv_mbuf; + + const char *boundary; + if ((int) io->len < pd->mp_stream.boundary_len + 6 /* \r\n, --, -- */) { + return 0; + } + + boundary = c_strnstr(io->buf, pd->mp_stream.boundary, io->len); + if (boundary == NULL && pd->mp_stream.prev_io_len == 0) { + pd->mp_stream.prev_io_len = io->len; + return 0; + } else if (boundary == NULL && + (int) io->len > + pd->mp_stream.prev_io_len + pd->mp_stream.boundary_len + 4) { + pd->mp_stream.state = MPS_GOT_CHUNK; + return 1; + } else if (boundary != NULL) { + int data_size = (boundary - io->buf - 4); + mg_http_multipart_call_handler(c, MG_EV_HTTP_PART_DATA, io->buf, data_size); + mbuf_remove(io, (boundary - io->buf)); + pd->mp_stream.prev_io_len = 0; + pd->mp_stream.state = MPS_WAITING_FOR_BOUNDARY; + return 1; + } else { + return 0; + } +} + +static void mg_http_multipart_continue(struct mg_connection *c) { + struct mg_http_proto_data *pd = mg_http_get_proto_data(c); + while (1) { + switch (pd->mp_stream.state) { + case MPS_BEGIN: { + pd->mp_stream.state = MPS_WAITING_FOR_BOUNDARY; + break; + } + case MPS_WAITING_FOR_BOUNDARY: { + if (mg_http_multipart_wait_for_boundary(c) == 0) { + return; + } + break; + } + case MPS_GOT_BOUNDARY: { + if (mg_http_multipart_process_boundary(c) == 0) { + return; + } + break; + } + case MPS_WAITING_FOR_CHUNK: { + if (mg_http_multipart_continue_wait_for_chunk(c) == 0) { + return; + } + break; + } + case MPS_GOT_CHUNK: { + if (mg_http_multipart_got_chunk(c) == 0) { + return; + } + break; + } + case MPS_FINALIZE: { + if (mg_http_multipart_finalize(c) == 0) { + return; + } + break; + } + case MPS_FINISHED: { + mbuf_remove(&c->recv_mbuf, c->recv_mbuf.len); + return; + } + } + } +} + +struct file_upload_state { + char *lfn; + size_t num_recd; + FILE *fp; +}; + +#endif /* MG_ENABLE_HTTP_STREAMING_MULTIPART */ + +void mg_set_protocol_http_websocket(struct mg_connection *nc) { + nc->proto_handler = mg_http_handler; +} + +const char *mg_status_message(int status_code) { + switch (status_code) { + case 206: + return "Partial Content"; + case 301: + return "Moved"; + case 302: + return "Found"; + case 400: + return "Bad Request"; + case 401: + return "Unauthorized"; + case 403: + return "Forbidden"; + case 404: + return "Not Found"; + case 416: + return "Requested Range Not Satisfiable"; + case 418: + return "I'm a teapot"; + case 500: + return "Internal Server Error"; + case 502: + return "Bad Gateway"; + case 503: + return "Service Unavailable"; + +#if MG_ENABLE_EXTRA_ERRORS_DESC + case 100: + return "Continue"; + case 101: + return "Switching Protocols"; + case 102: + return "Processing"; + case 200: + return "OK"; + case 201: + return "Created"; + case 202: + return "Accepted"; + case 203: + return "Non-Authoritative Information"; + case 204: + return "No Content"; + case 205: + return "Reset Content"; + case 207: + return "Multi-Status"; + case 208: + return "Already Reported"; + case 226: + return "IM Used"; + case 300: + return "Multiple Choices"; + case 303: + return "See Other"; + case 304: + return "Not Modified"; + case 305: + return "Use Proxy"; + case 306: + return "Switch Proxy"; + case 307: + return "Temporary Redirect"; + case 308: + return "Permanent Redirect"; + case 402: + return "Payment Required"; + case 405: + return "Method Not Allowed"; + case 406: + return "Not Acceptable"; + case 407: + return "Proxy Authentication Required"; + case 408: + return "Request Timeout"; + case 409: + return "Conflict"; + case 410: + return "Gone"; + case 411: + return "Length Required"; + case 412: + return "Precondition Failed"; + case 413: + return "Payload Too Large"; + case 414: + return "URI Too Long"; + case 415: + return "Unsupported Media Type"; + case 417: + return "Expectation Failed"; + case 422: + return "Unprocessable Entity"; + case 423: + return "Locked"; + case 424: + return "Failed Dependency"; + case 426: + return "Upgrade Required"; + case 428: + return "Precondition Required"; + case 429: + return "Too Many Requests"; + case 431: + return "Request Header Fields Too Large"; + case 451: + return "Unavailable For Legal Reasons"; + case 501: + return "Not Implemented"; + case 504: + return "Gateway Timeout"; + case 505: + return "HTTP Version Not Supported"; + case 506: + return "Variant Also Negotiates"; + case 507: + return "Insufficient Storage"; + case 508: + return "Loop Detected"; + case 510: + return "Not Extended"; + case 511: + return "Network Authentication Required"; +#endif /* MG_ENABLE_EXTRA_ERRORS_DESC */ + + default: + return "OK"; + } +} + +void mg_send_response_line_s(struct mg_connection *nc, int status_code, + const struct mg_str extra_headers) { + mg_printf(nc, "HTTP/1.1 %d %s\r\nServer: %s\r\n", status_code, + mg_status_message(status_code), mg_version_header); + if (extra_headers.len > 0) { + mg_printf(nc, "%.*s\r\n", (int) extra_headers.len, extra_headers.p); + } +} + +void mg_send_response_line(struct mg_connection *nc, int status_code, + const char *extra_headers) { + mg_send_response_line_s(nc, status_code, mg_mk_str(extra_headers)); +} + +void mg_http_send_redirect(struct mg_connection *nc, int status_code, + const struct mg_str location, + const struct mg_str extra_headers) { + char bbody[100], *pbody = bbody; + int bl = mg_asprintf(&pbody, sizeof(bbody), + "<p>Moved <a href='%.*s'>here</a>.\r\n", + (int) location.len, location.p); + char bhead[150], *phead = bhead; + mg_asprintf(&phead, sizeof(bhead), + "Location: %.*s\r\n" + "Content-Type: text/html\r\n" + "Content-Length: %d\r\n" + "Cache-Control: no-cache\r\n" + "%.*s%s", + (int) location.len, location.p, bl, (int) extra_headers.len, + extra_headers.p, (extra_headers.len > 0 ? "\r\n" : "")); + mg_send_response_line(nc, status_code, phead); + if (phead != bhead) MG_FREE(phead); + mg_send(nc, pbody, bl); + if (pbody != bbody) MG_FREE(pbody); +} + +void mg_send_head(struct mg_connection *c, int status_code, + int64_t content_length, const char *extra_headers) { + mg_send_response_line(c, status_code, extra_headers); + if (content_length < 0) { + mg_printf(c, "%s", "Transfer-Encoding: chunked\r\n"); + } else { + mg_printf(c, "Content-Length: %" INT64_FMT "\r\n", content_length); + } + mg_send(c, "\r\n", 2); +} + +void mg_http_send_error(struct mg_connection *nc, int code, + const char *reason) { + if (!reason) reason = mg_status_message(code); + LOG(LL_DEBUG, ("%p %d %s", nc, code, reason)); + mg_send_head(nc, code, strlen(reason), + "Content-Type: text/plain\r\nConnection: close"); + mg_send(nc, reason, strlen(reason)); + nc->flags |= MG_F_SEND_AND_CLOSE; +} + +#if MG_ENABLE_FILESYSTEM +static void mg_http_construct_etag(char *buf, size_t buf_len, + const cs_stat_t *st) { + snprintf(buf, buf_len, "\"%lx.%" INT64_FMT "\"", (unsigned long) st->st_mtime, + (int64_t) st->st_size); +} + +#ifndef WINCE +static void mg_gmt_time_string(char *buf, size_t buf_len, time_t *t) { + strftime(buf, buf_len, "%a, %d %b %Y %H:%M:%S GMT", gmtime(t)); +} +#else +/* Look wince_lib.c for WindowsCE implementation */ +static void mg_gmt_time_string(char *buf, size_t buf_len, time_t *t); +#endif + +static int mg_http_parse_range_header(const struct mg_str *header, int64_t *a, + int64_t *b) { + /* + * There is no snscanf. Headers are not guaranteed to be NUL-terminated, + * so we have this. Ugh. + */ + int result; + char *p = (char *) MG_MALLOC(header->len + 1); + if (p == NULL) return 0; + memcpy(p, header->p, header->len); + p[header->len] = '\0'; + result = sscanf(p, "bytes=%" INT64_FMT "-%" INT64_FMT, a, b); + MG_FREE(p); + return result; +} + +void mg_http_serve_file(struct mg_connection *nc, struct http_message *hm, + const char *path, const struct mg_str mime_type, + const struct mg_str extra_headers) { + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); + cs_stat_t st; + LOG(LL_DEBUG, ("%p [%s] %.*s", nc, path, (int) mime_type.len, mime_type.p)); + if (mg_stat(path, &st) != 0 || (pd->file.fp = mg_fopen(path, "rb")) == NULL) { + int code, err = mg_get_errno(); + switch (err) { + case EACCES: + code = 403; + break; + case ENOENT: + code = 404; + break; + default: + code = 500; + }; + mg_http_send_error(nc, code, "Open failed"); + } else { + char etag[50], current_time[50], last_modified[50], range[70]; + time_t t = (time_t) mg_time(); + int64_t r1 = 0, r2 = 0, cl = st.st_size; + struct mg_str *range_hdr = mg_get_http_header(hm, "Range"); + int n, status_code = 200; + + /* Handle Range header */ + range[0] = '\0'; + if (range_hdr != NULL && + (n = mg_http_parse_range_header(range_hdr, &r1, &r2)) > 0 && r1 >= 0 && + r2 >= 0) { + /* If range is specified like "400-", set second limit to content len */ + if (n == 1) { + r2 = cl - 1; + } + if (r1 > r2 || r2 >= cl) { + status_code = 416; + cl = 0; + snprintf(range, sizeof(range), + "Content-Range: bytes */%" INT64_FMT "\r\n", + (int64_t) st.st_size); + } else { + status_code = 206; + cl = r2 - r1 + 1; + snprintf(range, sizeof(range), "Content-Range: bytes %" INT64_FMT + "-%" INT64_FMT "/%" INT64_FMT "\r\n", + r1, r1 + cl - 1, (int64_t) st.st_size); +#if _FILE_OFFSET_BITS == 64 || _POSIX_C_SOURCE >= 200112L || \ + _XOPEN_SOURCE >= 600 + fseeko(pd->file.fp, r1, SEEK_SET); +#else + fseek(pd->file.fp, (long) r1, SEEK_SET); +#endif + } + } + +#if !MG_DISABLE_HTTP_KEEP_ALIVE + { + struct mg_str *conn_hdr = mg_get_http_header(hm, "Connection"); + if (conn_hdr != NULL) { + pd->file.keepalive = (mg_vcasecmp(conn_hdr, "keep-alive") == 0); + } else { + pd->file.keepalive = (mg_vcmp(&hm->proto, "HTTP/1.1") == 0); + } + } +#endif + + mg_http_construct_etag(etag, sizeof(etag), &st); + mg_gmt_time_string(current_time, sizeof(current_time), &t); + mg_gmt_time_string(last_modified, sizeof(last_modified), &st.st_mtime); + /* + * Content length casted to size_t because: + * 1) that's the maximum buffer size anyway + * 2) ESP8266 RTOS SDK newlib vprintf cannot contain a 64bit arg at non-last + * position + * TODO(mkm): fix ESP8266 RTOS SDK + */ + mg_send_response_line_s(nc, status_code, extra_headers); + mg_printf(nc, + "Date: %s\r\n" + "Last-Modified: %s\r\n" + "Accept-Ranges: bytes\r\n" + "Content-Type: %.*s\r\n" + "Connection: %s\r\n" + "Content-Length: %" SIZE_T_FMT + "\r\n" + "%sEtag: %s\r\n\r\n", + current_time, last_modified, (int) mime_type.len, mime_type.p, + (pd->file.keepalive ? "keep-alive" : "close"), (size_t) cl, range, + etag); + + pd->file.cl = cl; + pd->file.type = DATA_FILE; + mg_http_transfer_file_data(nc); + } +} + +static void mg_http_serve_file2(struct mg_connection *nc, const char *path, + struct http_message *hm, + struct mg_serve_http_opts *opts) { +#if MG_ENABLE_HTTP_SSI + if (mg_match_prefix(opts->ssi_pattern, strlen(opts->ssi_pattern), path) > 0) { + mg_handle_ssi_request(nc, hm, path, opts); + return; + } +#endif + mg_http_serve_file(nc, hm, path, mg_get_mime_type(path, "text/plain", opts), + mg_mk_str(opts->extra_headers)); +} + +#endif + +int mg_url_decode(const char *src, int src_len, char *dst, int dst_len, + int is_form_url_encoded) { + int i, j, a, b; +#define HEXTOI(x) (isdigit(x) ? x - '0' : x - 'W') + + for (i = j = 0; i < src_len && j < dst_len - 1; i++, j++) { + if (src[i] == '%') { + if (i < src_len - 2 && isxdigit(*(const unsigned char *) (src + i + 1)) && + isxdigit(*(const unsigned char *) (src + i + 2))) { + a = tolower(*(const unsigned char *) (src + i + 1)); + b = tolower(*(const unsigned char *) (src + i + 2)); + dst[j] = (char) ((HEXTOI(a) << 4) | HEXTOI(b)); + i += 2; + } else { + return -1; + } + } else if (is_form_url_encoded && src[i] == '+') { + dst[j] = ' '; + } else { + dst[j] = src[i]; + } + } + + dst[j] = '\0'; /* Null-terminate the destination */ + + return i >= src_len ? j : -1; +} + +int mg_get_http_var(const struct mg_str *buf, const char *name, char *dst, + size_t dst_len) { + const char *p, *e, *s; + size_t name_len; + int len; + + /* + * According to the documentation function returns negative + * value in case of error. For debug purposes it returns: + * -1 - src is wrong (NUUL) + * -2 - dst is wrong (NULL) + * -3 - failed to decode url or dst is to small + */ + if (dst == NULL || dst_len == 0) { + len = -2; + } else if (buf->p == NULL || name == NULL || buf->len == 0) { + len = -1; + dst[0] = '\0'; + } else { + name_len = strlen(name); + e = buf->p + buf->len; + len = 0; + dst[0] = '\0'; + + for (p = buf->p; p + name_len < e; p++) { + if ((p == buf->p || p[-1] == '&') && p[name_len] == '=' && + !mg_ncasecmp(name, p, name_len)) { + p += name_len + 1; + s = (const char *) memchr(p, '&', (size_t)(e - p)); + if (s == NULL) { + s = e; + } + len = mg_url_decode(p, (size_t)(s - p), dst, dst_len, 1); + /* -1 means: failed to decode or dst is too small */ + if (len == -1) { + len = -3; + } + break; + } + } + } + + return len; +} + +void mg_send_http_chunk(struct mg_connection *nc, const char *buf, size_t len) { + char chunk_size[50]; + int n; + + n = snprintf(chunk_size, sizeof(chunk_size), "%lX\r\n", (unsigned long) len); + mg_send(nc, chunk_size, n); + mg_send(nc, buf, len); + mg_send(nc, "\r\n", 2); +} + +void mg_printf_http_chunk(struct mg_connection *nc, const char *fmt, ...) { + char mem[MG_VPRINTF_BUFFER_SIZE], *buf = mem; + int len; + va_list ap; + + va_start(ap, fmt); + len = mg_avprintf(&buf, sizeof(mem), fmt, ap); + va_end(ap); + + if (len >= 0) { + mg_send_http_chunk(nc, buf, len); + } + + /* LCOV_EXCL_START */ + if (buf != mem && buf != NULL) { + MG_FREE(buf); + } + /* LCOV_EXCL_STOP */ +} + +void mg_printf_html_escape(struct mg_connection *nc, const char *fmt, ...) { + char mem[MG_VPRINTF_BUFFER_SIZE], *buf = mem; + int i, j, len; + va_list ap; + + va_start(ap, fmt); + len = mg_avprintf(&buf, sizeof(mem), fmt, ap); + va_end(ap); + + if (len >= 0) { + for (i = j = 0; i < len; i++) { + if (buf[i] == '<' || buf[i] == '>') { + mg_send(nc, buf + j, i - j); + mg_send(nc, buf[i] == '<' ? "<" : ">", 4); + j = i + 1; + } + } + mg_send(nc, buf + j, i - j); + } + + /* LCOV_EXCL_START */ + if (buf != mem && buf != NULL) { + MG_FREE(buf); + } + /* LCOV_EXCL_STOP */ +} + +int mg_http_parse_header(struct mg_str *hdr, const char *var_name, char *buf, + size_t buf_size) { + int ch = ' ', ch1 = ',', len = 0, n = strlen(var_name); + const char *p, *end = hdr ? hdr->p + hdr->len : NULL, *s = NULL; + + if (buf != NULL && buf_size > 0) buf[0] = '\0'; + if (hdr == NULL) return 0; + + /* Find where variable starts */ + for (s = hdr->p; s != NULL && s + n < end; s++) { + if ((s == hdr->p || s[-1] == ch || s[-1] == ch1 || s[-1] == ';') && + s[n] == '=' && !strncmp(s, var_name, n)) + break; + } + + if (s != NULL && &s[n + 1] < end) { + s += n + 1; + if (*s == '"' || *s == '\'') { + ch = ch1 = *s++; + } + p = s; + while (p < end && p[0] != ch && p[0] != ch1 && len < (int) buf_size) { + if (ch != ' ' && p[0] == '\\' && p[1] == ch) p++; + buf[len++] = *p++; + } + if (len >= (int) buf_size || (ch != ' ' && *p != ch)) { + len = 0; + } else { + if (len > 0 && s[len - 1] == ',') len--; + if (len > 0 && s[len - 1] == ';') len--; + buf[len] = '\0'; + } + } + + return len; +} + +int mg_get_http_basic_auth(struct http_message *hm, char *user, size_t user_len, + char *pass, size_t pass_len) { + struct mg_str *hdr = mg_get_http_header(hm, "Authorization"); + if (hdr == NULL) return -1; + return mg_parse_http_basic_auth(hdr, user, user_len, pass, pass_len); +} + +int mg_parse_http_basic_auth(struct mg_str *hdr, char *user, size_t user_len, + char *pass, size_t pass_len) { + char *buf = NULL; + char fmt[64]; + int res = 0; + + if (mg_strncmp(*hdr, mg_mk_str("Basic "), 6) != 0) return -1; + + buf = (char *) MG_MALLOC(hdr->len); + cs_base64_decode((unsigned char *) hdr->p + 6, hdr->len, buf, NULL); + + /* e.g. "%123[^:]:%321[^\n]" */ + snprintf(fmt, sizeof(fmt), "%%%" SIZE_T_FMT "[^:]:%%%" SIZE_T_FMT "[^\n]", + user_len - 1, pass_len - 1); + if (sscanf(buf, fmt, user, pass) == 0) { + res = -1; + } + + MG_FREE(buf); + return res; +} + +#if MG_ENABLE_FILESYSTEM +static int mg_is_file_hidden(const char *path, + const struct mg_serve_http_opts *opts, + int exclude_specials) { + const char *p1 = opts->per_directory_auth_file; + const char *p2 = opts->hidden_file_pattern; + + /* Strip directory path from the file name */ + const char *pdir = strrchr(path, DIRSEP); + if (pdir != NULL) { + path = pdir + 1; + } + + return (exclude_specials && (!strcmp(path, ".") || !strcmp(path, ".."))) || + (p1 != NULL && + mg_match_prefix(p1, strlen(p1), path) == (int) strlen(p1)) || + (p2 != NULL && mg_match_prefix(p2, strlen(p2), path) > 0); +} + +#if !MG_DISABLE_HTTP_DIGEST_AUTH + +#ifndef MG_EXT_MD5 +void mg_hash_md5_v(size_t num_msgs, const uint8_t *msgs[], + const size_t *msg_lens, uint8_t *digest) { + size_t i; + cs_md5_ctx md5_ctx; + cs_md5_init(&md5_ctx); + for (i = 0; i < num_msgs; i++) { + cs_md5_update(&md5_ctx, msgs[i], msg_lens[i]); + } + cs_md5_final(digest, &md5_ctx); +} +#else +extern void mg_hash_md5_v(size_t num_msgs, const uint8_t *msgs[], + const size_t *msg_lens, uint8_t *digest); +#endif + +void cs_md5(char buf[33], ...) { + unsigned char hash[16]; + const uint8_t *msgs[20], *p; + size_t msg_lens[20]; + size_t num_msgs = 0; + va_list ap; + + va_start(ap, buf); + while ((p = va_arg(ap, const unsigned char *) ) != NULL) { + msgs[num_msgs] = p; + msg_lens[num_msgs] = va_arg(ap, size_t); + num_msgs++; + } + va_end(ap); + + mg_hash_md5_v(num_msgs, msgs, msg_lens, hash); + cs_to_hex(buf, hash, sizeof(hash)); +} + +static void mg_mkmd5resp(const char *method, size_t method_len, const char *uri, + size_t uri_len, const char *ha1, size_t ha1_len, + const char *nonce, size_t nonce_len, const char *nc, + size_t nc_len, const char *cnonce, size_t cnonce_len, + const char *qop, size_t qop_len, char *resp) { + static const char colon[] = ":"; + static const size_t one = 1; + char ha2[33]; + cs_md5(ha2, method, method_len, colon, one, uri, uri_len, NULL); + cs_md5(resp, ha1, ha1_len, colon, one, nonce, nonce_len, colon, one, nc, + nc_len, colon, one, cnonce, cnonce_len, colon, one, qop, qop_len, + colon, one, ha2, sizeof(ha2) - 1, NULL); +} + +int mg_http_create_digest_auth_header(char *buf, size_t buf_len, + const char *method, const char *uri, + const char *auth_domain, const char *user, + const char *passwd) { + static const char colon[] = ":", qop[] = "auth"; + static const size_t one = 1; + char ha1[33], resp[33], cnonce[40]; + + snprintf(cnonce, sizeof(cnonce), "%x", (unsigned int) mg_time()); + cs_md5(ha1, user, (size_t) strlen(user), colon, one, auth_domain, + (size_t) strlen(auth_domain), colon, one, passwd, + (size_t) strlen(passwd), NULL); + mg_mkmd5resp(method, strlen(method), uri, strlen(uri), ha1, sizeof(ha1) - 1, + cnonce, strlen(cnonce), "1", one, cnonce, strlen(cnonce), qop, + sizeof(qop) - 1, resp); + return snprintf(buf, buf_len, + "Authorization: Digest username=\"%s\"," + "realm=\"%s\",uri=\"%s\",qop=%s,nc=1,cnonce=%s," + "nonce=%s,response=%s\r\n", + user, auth_domain, uri, qop, cnonce, cnonce, resp); +} + +/* + * Check for authentication timeout. + * Clients send time stamp encoded in nonce. Make sure it is not too old, + * to prevent replay attacks. + * Assumption: nonce is a hexadecimal number of seconds since 1970. + */ +static int mg_check_nonce(const char *nonce) { + unsigned long now = (unsigned long) mg_time(); + unsigned long val = (unsigned long) strtoul(nonce, NULL, 16); + return now < val || now - val < 3600; +} + +int mg_http_check_digest_auth(struct http_message *hm, const char *auth_domain, + FILE *fp) { + struct mg_str *hdr; + char username[50], cnonce[64], response[40], uri[200], qop[20], nc[20], + nonce[30]; + + /* Parse "Authorization:" header, fail fast on parse error */ + if (hm == NULL || fp == NULL || + (hdr = mg_get_http_header(hm, "Authorization")) == NULL || + mg_http_parse_header(hdr, "username", username, sizeof(username)) == 0 || + mg_http_parse_header(hdr, "cnonce", cnonce, sizeof(cnonce)) == 0 || + mg_http_parse_header(hdr, "response", response, sizeof(response)) == 0 || + mg_http_parse_header(hdr, "uri", uri, sizeof(uri)) == 0 || + mg_http_parse_header(hdr, "qop", qop, sizeof(qop)) == 0 || + mg_http_parse_header(hdr, "nc", nc, sizeof(nc)) == 0 || + mg_http_parse_header(hdr, "nonce", nonce, sizeof(nonce)) == 0 || + mg_check_nonce(nonce) == 0) { + return 0; + } + + /* NOTE(lsm): due to a bug in MSIE, we do not compare URIs */ + + return mg_check_digest_auth( + hm->method, + mg_mk_str_n( + hm->uri.p, + hm->uri.len + (hm->query_string.len ? hm->query_string.len + 1 : 0)), + mg_mk_str(username), mg_mk_str(cnonce), mg_mk_str(response), + mg_mk_str(qop), mg_mk_str(nc), mg_mk_str(nonce), mg_mk_str(auth_domain), + fp); +} + +int mg_check_digest_auth(struct mg_str method, struct mg_str uri, + struct mg_str username, struct mg_str cnonce, + struct mg_str response, struct mg_str qop, + struct mg_str nc, struct mg_str nonce, + struct mg_str auth_domain, FILE *fp) { + char buf[128], f_user[sizeof(buf)], f_ha1[sizeof(buf)], f_domain[sizeof(buf)]; + char expected_response[33]; + + /* + * Read passwords file line by line. If should have htdigest format, + * i.e. each line should be a colon-separated sequence: + * USER_NAME:DOMAIN_NAME:HA1_HASH_OF_USER_DOMAIN_AND_PASSWORD + */ + while (fgets(buf, sizeof(buf), fp) != NULL) { + if (sscanf(buf, "%[^:]:%[^:]:%s", f_user, f_domain, f_ha1) == 3 && + mg_vcmp(&username, f_user) == 0 && + mg_vcmp(&auth_domain, f_domain) == 0) { + /* Username and domain matched, check the password */ + mg_mkmd5resp(method.p, method.len, uri.p, uri.len, f_ha1, strlen(f_ha1), + nonce.p, nonce.len, nc.p, nc.len, cnonce.p, cnonce.len, + qop.p, qop.len, expected_response); + LOG(LL_DEBUG, + ("%.*s %s %.*s %s", (int) username.len, username.p, f_domain, + (int) response.len, response.p, expected_response)); + return mg_ncasecmp(response.p, expected_response, response.len) == 0; + } + } + + /* None of the entries in the passwords file matched - return failure */ + return 0; +} + +static int mg_http_is_authorized(struct http_message *hm, struct mg_str path, + int is_directory, const char *domain, + const char *passwords_file, + int is_global_pass_file) { + char buf[MG_MAX_PATH]; + const char *p; + FILE *fp; + int authorized = 1; + + if (domain != NULL && passwords_file != NULL) { + if (is_global_pass_file) { + fp = mg_fopen(passwords_file, "r"); + } else if (is_directory) { + snprintf(buf, sizeof(buf), "%.*s%c%s", (int) path.len, path.p, DIRSEP, + passwords_file); + fp = mg_fopen(buf, "r"); + } else { + p = strrchr(path.p, DIRSEP); + if (p == NULL) p = path.p; + snprintf(buf, sizeof(buf), "%.*s%c%s", (int) (p - path.p), path.p, DIRSEP, + passwords_file); + fp = mg_fopen(buf, "r"); + } + + if (fp != NULL) { + authorized = mg_http_check_digest_auth(hm, domain, fp); + fclose(fp); + } + } + + LOG(LL_DEBUG, + ("%.*s %s %d %d", (int) path.len, path.p, + passwords_file ? passwords_file : "", is_global_pass_file, authorized)); + return authorized; +} +#else +static int mg_http_is_authorized(struct http_message *hm, + const struct mg_str path, int is_directory, + const char *domain, const char *passwords_file, + int is_global_pass_file) { + (void) hm; + (void) path; + (void) is_directory; + (void) domain; + (void) passwords_file; + (void) is_global_pass_file; + return 1; +} +#endif + +#if MG_ENABLE_DIRECTORY_LISTING +static void mg_escape(const char *src, char *dst, size_t dst_len) { + size_t n = 0; + while (*src != '\0' && n + 5 < dst_len) { + unsigned char ch = *(unsigned char *) src++; + if (ch == '<') { + n += snprintf(dst + n, dst_len - n, "%s", "<"); + } else { + dst[n++] = ch; + } + } + dst[n] = '\0'; +} + +static void mg_print_dir_entry(struct mg_connection *nc, const char *file_name, + cs_stat_t *stp) { + char size[64], mod[64], path[MG_MAX_PATH]; + int64_t fsize = stp->st_size; + int is_dir = S_ISDIR(stp->st_mode); + const char *slash = is_dir ? "/" : ""; + struct mg_str href; + + if (is_dir) { + snprintf(size, sizeof(size), "%s", "[DIRECTORY]"); + } else { + /* + * We use (double) cast below because MSVC 6 compiler cannot + * convert unsigned __int64 to double. + */ + if (fsize < 1024) { + snprintf(size, sizeof(size), "%d", (int) fsize); + } else if (fsize < 0x100000) { + snprintf(size, sizeof(size), "%.1fk", (double) fsize / 1024.0); + } else if (fsize < 0x40000000) { + snprintf(size, sizeof(size), "%.1fM", (double) fsize / 1048576); + } else { + snprintf(size, sizeof(size), "%.1fG", (double) fsize / 1073741824); + } + } + strftime(mod, sizeof(mod), "%d-%b-%Y %H:%M", localtime(&stp->st_mtime)); + mg_escape(file_name, path, sizeof(path)); + href = mg_url_encode(mg_mk_str(file_name)); + mg_printf_http_chunk(nc, + "<tr><td><a href=\"%s%s\">%s%s</a></td>" + "<td>%s</td><td name=%" INT64_FMT ">%s</td></tr>\n", + href.p, slash, path, slash, mod, is_dir ? -1 : fsize, + size); + free((void *) href.p); +} + +static void mg_scan_directory(struct mg_connection *nc, const char *dir, + const struct mg_serve_http_opts *opts, + void (*func)(struct mg_connection *, const char *, + cs_stat_t *)) { + char path[MG_MAX_PATH]; + cs_stat_t st; + struct dirent *dp; + DIR *dirp; + + LOG(LL_DEBUG, ("%p [%s]", nc, dir)); + if ((dirp = (opendir(dir))) != NULL) { + while ((dp = readdir(dirp)) != NULL) { + /* Do not show current dir and hidden files */ + if (mg_is_file_hidden((const char *) dp->d_name, opts, 1)) { + continue; + } + snprintf(path, sizeof(path), "%s/%s", dir, dp->d_name); + if (mg_stat(path, &st) == 0) { + func(nc, (const char *) dp->d_name, &st); + } + } + closedir(dirp); + } else { + LOG(LL_DEBUG, ("%p opendir(%s) -> %d", nc, dir, mg_get_errno())); + } +} + +static void mg_send_directory_listing(struct mg_connection *nc, const char *dir, + struct http_message *hm, + struct mg_serve_http_opts *opts) { + static const char *sort_js_code = + "<script>function srt(tb, sc, so, d) {" + "var tr = Array.prototype.slice.call(tb.rows, 0)," + "tr = tr.sort(function (a, b) { var c1 = a.cells[sc], c2 = b.cells[sc]," + "n1 = c1.getAttribute('name'), n2 = c2.getAttribute('name'), " + "t1 = a.cells[2].getAttribute('name'), " + "t2 = b.cells[2].getAttribute('name'); " + "return so * (t1 < 0 && t2 >= 0 ? -1 : t2 < 0 && t1 >= 0 ? 1 : " + "n1 ? parseInt(n2) - parseInt(n1) : " + "c1.textContent.trim().localeCompare(c2.textContent.trim())); });"; + static const char *sort_js_code2 = + "for (var i = 0; i < tr.length; i++) tb.appendChild(tr[i]); " + "if (!d) window.location.hash = ('sc=' + sc + '&so=' + so); " + "};" + "window.onload = function() {" + "var tb = document.getElementById('tb');" + "var m = /sc=([012]).so=(1|-1)/.exec(window.location.hash) || [0, 2, 1];" + "var sc = m[1], so = m[2]; document.onclick = function(ev) { " + "var c = ev.target.rel; if (c) {if (c == sc) so *= -1; srt(tb, c, so); " + "sc = c; ev.preventDefault();}};" + "srt(tb, sc, so, true);" + "}" + "</script>"; + + mg_send_response_line(nc, 200, opts->extra_headers); + mg_printf(nc, "%s: %s\r\n%s: %s\r\n\r\n", "Transfer-Encoding", "chunked", + "Content-Type", "text/html; charset=utf-8"); + + mg_printf_http_chunk( + nc, + "<html><head><title>Index of %.*s</title>%s%s" + "<style>th,td {text-align: left; padding-right: 1em; " + "font-family: monospace; }</style></head>\n" + "<body><h1>Index of %.*s</h1>\n<table cellpadding=0><thead>" + "<tr><th><a href=# rel=0>Name</a></th><th>" + "<a href=# rel=1>Modified</a</th>" + "<th><a href=# rel=2>Size</a></th></tr>" + "<tr><td colspan=3><hr></td></tr>\n" + "</thead>\n" + "<tbody id=tb>", + (int) hm->uri.len, hm->uri.p, sort_js_code, sort_js_code2, + (int) hm->uri.len, hm->uri.p); + mg_scan_directory(nc, dir, opts, mg_print_dir_entry); + mg_printf_http_chunk(nc, + "</tbody><tr><td colspan=3><hr></td></tr>\n" + "</table>\n" + "<address>%s</address>\n" + "</body></html>", + mg_version_header); + mg_send_http_chunk(nc, "", 0); + /* TODO(rojer): Remove when cesanta/dev/issues/197 is fixed. */ + nc->flags |= MG_F_SEND_AND_CLOSE; +} +#endif /* MG_ENABLE_DIRECTORY_LISTING */ + +/* + * Given a directory path, find one of the files specified in the + * comma-separated list of index files `list`. + * First found index file wins. If an index file is found, then gets + * appended to the `path`, stat-ed, and result of `stat()` passed to `stp`. + * If index file is not found, then `path` and `stp` remain unchanged. + */ +MG_INTERNAL void mg_find_index_file(const char *path, const char *list, + char **index_file, cs_stat_t *stp) { + struct mg_str vec; + size_t path_len = strlen(path); + int found = 0; + *index_file = NULL; + + /* Traverse index files list. For each entry, append it to the given */ + /* path and see if the file exists. If it exists, break the loop */ + while ((list = mg_next_comma_list_entry(list, &vec, NULL)) != NULL) { + cs_stat_t st; + size_t len = path_len + 1 + vec.len + 1; + *index_file = (char *) MG_REALLOC(*index_file, len); + if (*index_file == NULL) break; + snprintf(*index_file, len, "%s%c%.*s", path, DIRSEP, (int) vec.len, vec.p); + + /* Does it exist? Is it a file? */ + if (mg_stat(*index_file, &st) == 0 && S_ISREG(st.st_mode)) { + /* Yes it does, break the loop */ + *stp = st; + found = 1; + break; + } + } + if (!found) { + MG_FREE(*index_file); + *index_file = NULL; + } + LOG(LL_DEBUG, ("[%s] [%s]", path, (*index_file ? *index_file : ""))); +} + +#if MG_ENABLE_HTTP_URL_REWRITES +static int mg_http_send_port_based_redirect( + struct mg_connection *c, struct http_message *hm, + const struct mg_serve_http_opts *opts) { + const char *rewrites = opts->url_rewrites; + struct mg_str a, b; + char local_port[20] = {'%'}; + + mg_conn_addr_to_str(c, local_port + 1, sizeof(local_port) - 1, + MG_SOCK_STRINGIFY_PORT); + + while ((rewrites = mg_next_comma_list_entry(rewrites, &a, &b)) != NULL) { + if (mg_vcmp(&a, local_port) == 0) { + mg_send_response_line(c, 301, NULL); + mg_printf(c, "Content-Length: 0\r\nLocation: %.*s%.*s\r\n\r\n", + (int) b.len, b.p, (int) (hm->proto.p - hm->uri.p - 1), + hm->uri.p); + return 1; + } + } + + return 0; +} + +static void mg_reverse_proxy_handler(struct mg_connection *nc, int ev, + void *ev_data MG_UD_ARG(void *user_data)) { + struct http_message *hm = (struct http_message *) ev_data; + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); + + if (pd == NULL || pd->reverse_proxy_data.linked_conn == NULL) { + DBG(("%p: upstream closed", nc)); + return; + } + + switch (ev) { + case MG_EV_CONNECT: + if (*(int *) ev_data != 0) { + mg_http_send_error(pd->reverse_proxy_data.linked_conn, 502, NULL); + } + break; + /* TODO(mkm): handle streaming */ + case MG_EV_HTTP_REPLY: + mg_send(pd->reverse_proxy_data.linked_conn, hm->message.p, + hm->message.len); + pd->reverse_proxy_data.linked_conn->flags |= MG_F_SEND_AND_CLOSE; + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + break; + case MG_EV_CLOSE: + pd->reverse_proxy_data.linked_conn->flags |= MG_F_SEND_AND_CLOSE; + break; + } + +#if MG_ENABLE_CALLBACK_USERDATA + (void) user_data; +#endif +} + +void mg_http_reverse_proxy(struct mg_connection *nc, + const struct http_message *hm, struct mg_str mount, + struct mg_str upstream) { + struct mg_connection *be; + char burl[256], *purl = burl; + int i; + const char *error; + struct mg_connect_opts opts; + struct mg_str path = MG_NULL_STR, user_info = MG_NULL_STR, host = MG_NULL_STR; + memset(&opts, 0, sizeof(opts)); + opts.error_string = &error; + + mg_asprintf(&purl, sizeof(burl), "%.*s%.*s", (int) upstream.len, upstream.p, + (int) (hm->uri.len - mount.len), hm->uri.p + mount.len); + + be = mg_connect_http_base(nc->mgr, MG_CB(mg_reverse_proxy_handler, NULL), + opts, "http", NULL, "https", NULL, purl, &path, + &user_info, &host); + LOG(LL_DEBUG, ("Proxying %.*s to %s (rule: %.*s)", (int) hm->uri.len, + hm->uri.p, purl, (int) mount.len, mount.p)); + + if (be == NULL) { + LOG(LL_ERROR, ("Error connecting to %s: %s", purl, error)); + mg_http_send_error(nc, 502, NULL); + goto cleanup; + } + + /* link connections to each other, they must live and die together */ + mg_http_get_proto_data(be)->reverse_proxy_data.linked_conn = nc; + mg_http_get_proto_data(nc)->reverse_proxy_data.linked_conn = be; + + /* send request upstream */ + mg_printf(be, "%.*s %.*s HTTP/1.1\r\n", (int) hm->method.len, hm->method.p, + (int) path.len, path.p); + + mg_printf(be, "Host: %.*s\r\n", (int) host.len, host.p); + for (i = 0; i < MG_MAX_HTTP_HEADERS && hm->header_names[i].len > 0; i++) { + struct mg_str hn = hm->header_names[i]; + struct mg_str hv = hm->header_values[i]; + + /* we rewrite the host header */ + if (mg_vcasecmp(&hn, "Host") == 0) continue; + /* + * Don't pass chunked transfer encoding to the client because hm->body is + * already dechunked when we arrive here. + */ + if (mg_vcasecmp(&hn, "Transfer-encoding") == 0 && + mg_vcasecmp(&hv, "chunked") == 0) { + mg_printf(be, "Content-Length: %" SIZE_T_FMT "\r\n", hm->body.len); + continue; + } + /* We don't support proxying Expect: 100-continue. */ + if (mg_vcasecmp(&hn, "Expect") == 0 && + mg_vcasecmp(&hv, "100-continue") == 0) { + continue; + } + + mg_printf(be, "%.*s: %.*s\r\n", (int) hn.len, hn.p, (int) hv.len, hv.p); + } + + mg_send(be, "\r\n", 2); + mg_send(be, hm->body.p, hm->body.len); + +cleanup: + if (purl != burl) MG_FREE(purl); +} + +static int mg_http_handle_forwarding(struct mg_connection *nc, + struct http_message *hm, + const struct mg_serve_http_opts *opts) { + const char *rewrites = opts->url_rewrites; + struct mg_str a, b; + struct mg_str p1 = MG_MK_STR("http://"), p2 = MG_MK_STR("https://"); + + while ((rewrites = mg_next_comma_list_entry(rewrites, &a, &b)) != NULL) { + if (mg_strncmp(a, hm->uri, a.len) == 0) { + if (mg_strncmp(b, p1, p1.len) == 0 || mg_strncmp(b, p2, p2.len) == 0) { + mg_http_reverse_proxy(nc, hm, a, b); + return 1; + } + } + } + + return 0; +} +#endif /* MG_ENABLE_FILESYSTEM */ + +MG_INTERNAL int mg_uri_to_local_path(struct http_message *hm, + const struct mg_serve_http_opts *opts, + char **local_path, + struct mg_str *remainder) { + int ok = 1; + const char *cp = hm->uri.p, *cp_end = hm->uri.p + hm->uri.len; + struct mg_str root = {NULL, 0}; + const char *file_uri_start = cp; + *local_path = NULL; + remainder->p = NULL; + remainder->len = 0; + + { /* 1. Determine which root to use. */ + +#if MG_ENABLE_HTTP_URL_REWRITES + const char *rewrites = opts->url_rewrites; +#else + const char *rewrites = ""; +#endif + struct mg_str *hh = mg_get_http_header(hm, "Host"); + struct mg_str a, b; + /* Check rewrites first. */ + while ((rewrites = mg_next_comma_list_entry(rewrites, &a, &b)) != NULL) { + if (a.len > 1 && a.p[0] == '@') { + /* Host rewrite. */ + if (hh != NULL && hh->len == a.len - 1 && + mg_ncasecmp(a.p + 1, hh->p, a.len - 1) == 0) { + root = b; + break; + } + } else { + /* Regular rewrite, URI=directory */ + int match_len = mg_match_prefix_n(a, hm->uri); + if (match_len > 0) { + file_uri_start = hm->uri.p + match_len; + if (*file_uri_start == '/' || file_uri_start == cp_end) { + /* Match ended at component boundary, ok. */ + } else if (*(file_uri_start - 1) == '/') { + /* Pattern ends with '/', backtrack. */ + file_uri_start--; + } else { + /* No match: must fall on the component boundary. */ + continue; + } + root = b; + break; + } + } + } + /* If no rewrite rules matched, use DAV or regular document root. */ + if (root.p == NULL) { +#if MG_ENABLE_HTTP_WEBDAV + if (opts->dav_document_root != NULL && mg_is_dav_request(&hm->method)) { + root.p = opts->dav_document_root; + root.len = strlen(opts->dav_document_root); + } else +#endif + { + root.p = opts->document_root; + root.len = strlen(opts->document_root); + } + } + assert(root.p != NULL && root.len > 0); + } + + { /* 2. Find where in the canonical URI path the local path ends. */ + const char *u = file_uri_start + 1; + char *lp = (char *) MG_MALLOC(root.len + hm->uri.len + 1); + char *lp_end = lp + root.len + hm->uri.len + 1; + char *p = lp, *ps; + int exists = 1; + if (lp == NULL) { + ok = 0; + goto out; + } + memcpy(p, root.p, root.len); + p += root.len; + if (*(p - 1) == DIRSEP) p--; + *p = '\0'; + ps = p; + + /* Chop off URI path components one by one and build local path. */ + while (u <= cp_end) { + const char *next = u; + struct mg_str component; + if (exists) { + cs_stat_t st; + exists = (mg_stat(lp, &st) == 0); + if (exists && S_ISREG(st.st_mode)) { + /* We found the terminal, the rest of the URI (if any) is path_info. + */ + if (*(u - 1) == '/') u--; + break; + } + } + if (u >= cp_end) break; + parse_uri_component((const char **) &next, cp_end, "/", &component); + if (component.len > 0) { + int len; + memmove(p + 1, component.p, component.len); + len = mg_url_decode(p + 1, component.len, p + 1, lp_end - p - 1, 0); + if (len <= 0) { + ok = 0; + break; + } + component.p = p + 1; + component.len = len; + if (mg_vcmp(&component, ".") == 0) { + /* Yum. */ + } else if (mg_vcmp(&component, "..") == 0) { + while (p > ps && *p != DIRSEP) p--; + *p = '\0'; + } else { + size_t i; +#ifdef _WIN32 + /* On Windows, make sure it's valid Unicode (no funny stuff). */ + wchar_t buf[MG_MAX_PATH * 2]; + if (to_wchar(component.p, buf, MG_MAX_PATH) == 0) { + DBG(("[%.*s] smells funny", (int) component.len, component.p)); + ok = 0; + break; + } +#endif + *p++ = DIRSEP; + /* No NULs and DIRSEPs in the component (percent-encoded). */ + for (i = 0; i < component.len; i++, p++) { + if (*p == '\0' || *p == DIRSEP +#ifdef _WIN32 + /* On Windows, "/" is also accepted, so check for that too. */ + || + *p == '/' +#endif + ) { + ok = 0; + break; + } + } + } + } + u = next; + } + if (ok) { + *local_path = lp; + if (u > cp_end) u = cp_end; + remainder->p = u; + remainder->len = cp_end - u; + } else { + MG_FREE(lp); + } + } + +out: + LOG(LL_DEBUG, + ("'%.*s' -> '%s' + '%.*s'", (int) hm->uri.len, hm->uri.p, + *local_path ? *local_path : "", (int) remainder->len, remainder->p)); + return ok; +} + +static int mg_get_month_index(const char *s) { + static const char *month_names[] = {"Jan", "Feb", "Mar", "Apr", "May", "Jun", + "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"}; + size_t i; + + for (i = 0; i < ARRAY_SIZE(month_names); i++) + if (!strcmp(s, month_names[i])) return (int) i; + + return -1; +} + +static int mg_num_leap_years(int year) { + return year / 4 - year / 100 + year / 400; +} + +/* Parse UTC date-time string, and return the corresponding time_t value. */ +MG_INTERNAL time_t mg_parse_date_string(const char *datetime) { + static const unsigned short days_before_month[] = { + 0, 31, 59, 90, 120, 151, 181, 212, 243, 273, 304, 334}; + char month_str[32]; + int second, minute, hour, day, month, year, leap_days, days; + time_t result = (time_t) 0; + + if (((sscanf(datetime, "%d/%3s/%d %d:%d:%d", &day, month_str, &year, &hour, + &minute, &second) == 6) || + (sscanf(datetime, "%d %3s %d %d:%d:%d", &day, month_str, &year, &hour, + &minute, &second) == 6) || + (sscanf(datetime, "%*3s, %d %3s %d %d:%d:%d", &day, month_str, &year, + &hour, &minute, &second) == 6) || + (sscanf(datetime, "%d-%3s-%d %d:%d:%d", &day, month_str, &year, &hour, + &minute, &second) == 6)) && + year > 1970 && (month = mg_get_month_index(month_str)) != -1) { + leap_days = mg_num_leap_years(year) - mg_num_leap_years(1970); + year -= 1970; + days = year * 365 + days_before_month[month] + (day - 1) + leap_days; + result = days * 24 * 3600 + hour * 3600 + minute * 60 + second; + } + + return result; +} + +MG_INTERNAL int mg_is_not_modified(struct http_message *hm, cs_stat_t *st) { + struct mg_str *hdr; + if ((hdr = mg_get_http_header(hm, "If-None-Match")) != NULL) { + char etag[64]; + mg_http_construct_etag(etag, sizeof(etag), st); + return mg_vcasecmp(hdr, etag) == 0; + } else if ((hdr = mg_get_http_header(hm, "If-Modified-Since")) != NULL) { + return st->st_mtime <= mg_parse_date_string(hdr->p); + } else { + return 0; + } +} + +static void mg_http_send_digest_auth_request(struct mg_connection *c, + const char *domain) { + mg_printf(c, + "HTTP/1.1 401 Unauthorized\r\n" + "WWW-Authenticate: Digest qop=\"auth\", " + "realm=\"%s\", nonce=\"%lu\"\r\n" + "Content-Length: 0\r\n\r\n", + domain, (unsigned long) mg_time()); +} + +static void mg_http_send_options(struct mg_connection *nc) { + mg_printf(nc, "%s", + "HTTP/1.1 200 OK\r\nAllow: GET, POST, HEAD, CONNECT, OPTIONS" +#if MG_ENABLE_HTTP_WEBDAV + ", MKCOL, PUT, DELETE, PROPFIND, MOVE\r\nDAV: 1,2" +#endif + "\r\n\r\n"); + nc->flags |= MG_F_SEND_AND_CLOSE; +} + +static int mg_is_creation_request(const struct http_message *hm) { + return mg_vcmp(&hm->method, "MKCOL") == 0 || mg_vcmp(&hm->method, "PUT") == 0; +} + +MG_INTERNAL void mg_send_http_file(struct mg_connection *nc, char *path, + const struct mg_str *path_info, + struct http_message *hm, + struct mg_serve_http_opts *opts) { + int exists, is_directory, is_cgi; +#if MG_ENABLE_HTTP_WEBDAV + int is_dav = mg_is_dav_request(&hm->method); +#else + int is_dav = 0; +#endif + char *index_file = NULL; + cs_stat_t st; + + exists = (mg_stat(path, &st) == 0); + is_directory = exists && S_ISDIR(st.st_mode); + + if (is_directory) + mg_find_index_file(path, opts->index_files, &index_file, &st); + + is_cgi = + (mg_match_prefix(opts->cgi_file_pattern, strlen(opts->cgi_file_pattern), + index_file ? index_file : path) > 0); + + LOG(LL_DEBUG, + ("%p %.*s [%s] exists=%d is_dir=%d is_dav=%d is_cgi=%d index=%s", nc, + (int) hm->method.len, hm->method.p, path, exists, is_directory, is_dav, + is_cgi, index_file ? index_file : "")); + + if (is_directory && hm->uri.p[hm->uri.len - 1] != '/' && !is_dav) { + mg_printf(nc, + "HTTP/1.1 301 Moved\r\nLocation: %.*s/\r\n" + "Content-Length: 0\r\n\r\n", + (int) hm->uri.len, hm->uri.p); + MG_FREE(index_file); + return; + } + + /* If we have path_info, the only way to handle it is CGI. */ + if (path_info->len > 0 && !is_cgi) { + mg_http_send_error(nc, 501, NULL); + MG_FREE(index_file); + return; + } + + if (is_dav && opts->dav_document_root == NULL) { + mg_http_send_error(nc, 501, NULL); + } else if (!mg_http_is_authorized(hm, mg_mk_str(path), is_directory, + opts->auth_domain, opts->global_auth_file, + 1) || + !mg_http_is_authorized(hm, mg_mk_str(path), is_directory, + opts->auth_domain, + opts->per_directory_auth_file, 0)) { + mg_http_send_digest_auth_request(nc, opts->auth_domain); + } else if (is_cgi) { +#if MG_ENABLE_HTTP_CGI + mg_handle_cgi(nc, index_file ? index_file : path, path_info, hm, opts); +#else + mg_http_send_error(nc, 501, NULL); +#endif /* MG_ENABLE_HTTP_CGI */ + } else if ((!exists || + mg_is_file_hidden(path, opts, 0 /* specials are ok */)) && + !mg_is_creation_request(hm)) { + mg_http_send_error(nc, 404, NULL); +#if MG_ENABLE_HTTP_WEBDAV + } else if (!mg_vcmp(&hm->method, "PROPFIND")) { + mg_handle_propfind(nc, path, &st, hm, opts); +#if !MG_DISABLE_DAV_AUTH + } else if (is_dav && (opts->dav_auth_file == NULL || + (strcmp(opts->dav_auth_file, "-") != 0 && + !mg_http_is_authorized(hm, mg_mk_str(path), + is_directory, opts->auth_domain, + opts->dav_auth_file, 1)))) { + mg_http_send_digest_auth_request(nc, opts->auth_domain); +#endif + } else if (!mg_vcmp(&hm->method, "MKCOL")) { + mg_handle_mkcol(nc, path, hm); + } else if (!mg_vcmp(&hm->method, "DELETE")) { + mg_handle_delete(nc, opts, path); + } else if (!mg_vcmp(&hm->method, "PUT")) { + mg_handle_put(nc, path, hm); + } else if (!mg_vcmp(&hm->method, "MOVE")) { + mg_handle_move(nc, opts, path, hm); +#if MG_ENABLE_FAKE_DAVLOCK + } else if (!mg_vcmp(&hm->method, "LOCK")) { + mg_handle_lock(nc, path); +#endif +#endif /* MG_ENABLE_HTTP_WEBDAV */ + } else if (!mg_vcmp(&hm->method, "OPTIONS")) { + mg_http_send_options(nc); + } else if (is_directory && index_file == NULL) { +#if MG_ENABLE_DIRECTORY_LISTING + if (strcmp(opts->enable_directory_listing, "yes") == 0) { + mg_send_directory_listing(nc, path, hm, opts); + } else { + mg_http_send_error(nc, 403, NULL); + } +#else + mg_http_send_error(nc, 501, NULL); +#endif + } else if (mg_is_not_modified(hm, &st)) { + mg_http_send_error(nc, 304, "Not Modified"); + } else { + mg_http_serve_file2(nc, index_file ? index_file : path, hm, opts); + } + MG_FREE(index_file); +} + +void mg_serve_http(struct mg_connection *nc, struct http_message *hm, + struct mg_serve_http_opts opts) { + char *path = NULL; + struct mg_str *hdr, path_info; + uint32_t remote_ip = ntohl(*(uint32_t *) &nc->sa.sin.sin_addr); + + if (mg_check_ip_acl(opts.ip_acl, remote_ip) != 1) { + /* Not allowed to connect */ + mg_http_send_error(nc, 403, NULL); + nc->flags |= MG_F_SEND_AND_CLOSE; + return; + } + +#if MG_ENABLE_HTTP_URL_REWRITES + if (mg_http_handle_forwarding(nc, hm, &opts)) { + return; + } + + if (mg_http_send_port_based_redirect(nc, hm, &opts)) { + return; + } +#endif + + if (opts.document_root == NULL) { + opts.document_root = "."; + } + if (opts.per_directory_auth_file == NULL) { + opts.per_directory_auth_file = ".htpasswd"; + } + if (opts.enable_directory_listing == NULL) { + opts.enable_directory_listing = "yes"; + } + if (opts.cgi_file_pattern == NULL) { + opts.cgi_file_pattern = "**.cgi$|**.php$"; + } + if (opts.ssi_pattern == NULL) { + opts.ssi_pattern = "**.shtml$|**.shtm$"; + } + if (opts.index_files == NULL) { + opts.index_files = "index.html,index.htm,index.shtml,index.cgi,index.php"; + } + /* Normalize path - resolve "." and ".." (in-place). */ + if (!mg_normalize_uri_path(&hm->uri, &hm->uri)) { + mg_http_send_error(nc, 400, NULL); + return; + } + if (mg_uri_to_local_path(hm, &opts, &path, &path_info) == 0) { + mg_http_send_error(nc, 404, NULL); + return; + } + mg_send_http_file(nc, path, &path_info, hm, &opts); + + MG_FREE(path); + path = NULL; + + /* Close connection for non-keep-alive requests */ + if (mg_vcmp(&hm->proto, "HTTP/1.1") != 0 || + ((hdr = mg_get_http_header(hm, "Connection")) != NULL && + mg_vcmp(hdr, "keep-alive") != 0)) { +#if 0 + nc->flags |= MG_F_SEND_AND_CLOSE; +#endif + } +} + +#if MG_ENABLE_HTTP_STREAMING_MULTIPART +void mg_file_upload_handler(struct mg_connection *nc, int ev, void *ev_data, + mg_fu_fname_fn local_name_fn + MG_UD_ARG(void *user_data)) { + switch (ev) { + case MG_EV_HTTP_PART_BEGIN: { + struct mg_http_multipart_part *mp = + (struct mg_http_multipart_part *) ev_data; + struct file_upload_state *fus = + (struct file_upload_state *) MG_CALLOC(1, sizeof(*fus)); + struct mg_str lfn = local_name_fn(nc, mg_mk_str(mp->file_name)); + mp->user_data = NULL; + if (lfn.p == NULL || lfn.len == 0) { + LOG(LL_ERROR, ("%p Not allowed to upload %s", nc, mp->file_name)); + mg_printf(nc, + "HTTP/1.1 403 Not Allowed\r\n" + "Content-Type: text/plain\r\n" + "Connection: close\r\n\r\n" + "Not allowed to upload %s\r\n", + mp->file_name); + nc->flags |= MG_F_SEND_AND_CLOSE; + return; + } + fus->lfn = (char *) MG_MALLOC(lfn.len + 1); + memcpy(fus->lfn, lfn.p, lfn.len); + fus->lfn[lfn.len] = '\0'; + if (lfn.p != mp->file_name) MG_FREE((char *) lfn.p); + LOG(LL_DEBUG, + ("%p Receiving file %s -> %s", nc, mp->file_name, fus->lfn)); + fus->fp = mg_fopen(fus->lfn, "w"); + if (fus->fp == NULL) { + mg_printf(nc, + "HTTP/1.1 500 Internal Server Error\r\n" + "Content-Type: text/plain\r\n" + "Connection: close\r\n\r\n"); + LOG(LL_ERROR, ("Failed to open %s: %d\n", fus->lfn, mg_get_errno())); + mg_printf(nc, "Failed to open %s: %d\n", fus->lfn, mg_get_errno()); + /* Do not close the connection just yet, discard remainder of the data. + * This is because at the time of writing some browsers (Chrome) fail to + * render response before all the data is sent. */ + } + mp->user_data = (void *) fus; + break; + } + case MG_EV_HTTP_PART_DATA: { + struct mg_http_multipart_part *mp = + (struct mg_http_multipart_part *) ev_data; + struct file_upload_state *fus = + (struct file_upload_state *) mp->user_data; + if (fus == NULL || fus->fp == NULL) break; + if (mg_fwrite(mp->data.p, 1, mp->data.len, fus->fp) != mp->data.len) { + LOG(LL_ERROR, ("Failed to write to %s: %d, wrote %d", fus->lfn, + mg_get_errno(), (int) fus->num_recd)); + if (mg_get_errno() == ENOSPC +#ifdef SPIFFS_ERR_FULL + || mg_get_errno() == SPIFFS_ERR_FULL +#endif + ) { + mg_printf(nc, + "HTTP/1.1 413 Payload Too Large\r\n" + "Content-Type: text/plain\r\n" + "Connection: close\r\n\r\n"); + mg_printf(nc, "Failed to write to %s: no space left; wrote %d\r\n", + fus->lfn, (int) fus->num_recd); + } else { + mg_printf(nc, + "HTTP/1.1 500 Internal Server Error\r\n" + "Content-Type: text/plain\r\n" + "Connection: close\r\n\r\n"); + mg_printf(nc, "Failed to write to %s: %d, wrote %d", mp->file_name, + mg_get_errno(), (int) fus->num_recd); + } + fclose(fus->fp); + remove(fus->lfn); + fus->fp = NULL; + /* Do not close the connection just yet, discard remainder of the data. + * This is because at the time of writing some browsers (Chrome) fail to + * render response before all the data is sent. */ + return; + } + fus->num_recd += mp->data.len; + LOG(LL_DEBUG, ("%p rec'd %d bytes, %d total", nc, (int) mp->data.len, + (int) fus->num_recd)); + break; + } + case MG_EV_HTTP_PART_END: { + struct mg_http_multipart_part *mp = + (struct mg_http_multipart_part *) ev_data; + struct file_upload_state *fus = + (struct file_upload_state *) mp->user_data; + if (fus == NULL) break; + if (mp->status >= 0 && fus->fp != NULL) { + LOG(LL_DEBUG, ("%p Uploaded %s (%s), %d bytes", nc, mp->file_name, + fus->lfn, (int) fus->num_recd)); + mg_printf(nc, + "HTTP/1.1 200 OK\r\n" + "Content-Type: text/plain\r\n" + "Connection: close\r\n\r\n" + "Ok, %s - %d bytes.\r\n", + mp->file_name, (int) fus->num_recd); + } else { + LOG(LL_ERROR, ("Failed to store %s (%s)", mp->file_name, fus->lfn)); + /* + * mp->status < 0 means connection was terminated, so no reason to send + * HTTP reply + */ + } + if (fus->fp != NULL) fclose(fus->fp); + MG_FREE(fus->lfn); + MG_FREE(fus); + mp->user_data = NULL; + nc->flags |= MG_F_SEND_AND_CLOSE; + break; + } + } + +#if MG_ENABLE_CALLBACK_USERDATA + (void) user_data; +#endif +} + +#endif /* MG_ENABLE_HTTP_STREAMING_MULTIPART */ +#endif /* MG_ENABLE_FILESYSTEM */ + +struct mg_connection *mg_connect_http_base( + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), + struct mg_connect_opts opts, const char *scheme1, const char *scheme2, + const char *scheme_ssl1, const char *scheme_ssl2, const char *url, + struct mg_str *path, struct mg_str *user_info, struct mg_str *host) { + struct mg_connection *nc = NULL; + unsigned int port_i = 0; + int use_ssl = 0; + struct mg_str scheme, query, fragment; + char conn_addr_buf[2]; + char *conn_addr = conn_addr_buf; + + if (mg_parse_uri(mg_mk_str(url), &scheme, user_info, host, &port_i, path, + &query, &fragment) != 0) { + MG_SET_PTRPTR(opts.error_string, "cannot parse url"); + goto out; + } + + /* If query is present, do not strip it. Pass to the caller. */ + if (query.len > 0) path->len += query.len + 1; + + if (scheme.len == 0 || mg_vcmp(&scheme, scheme1) == 0 || + (scheme2 != NULL && mg_vcmp(&scheme, scheme2) == 0)) { + use_ssl = 0; + if (port_i == 0) port_i = 80; + } else if (mg_vcmp(&scheme, scheme_ssl1) == 0 || + (scheme2 != NULL && mg_vcmp(&scheme, scheme_ssl2) == 0)) { + use_ssl = 1; + if (port_i == 0) port_i = 443; + } else { + goto out; + } + + mg_asprintf(&conn_addr, sizeof(conn_addr_buf), "tcp://%.*s:%u", + (int) host->len, host->p, port_i); + if (conn_addr == NULL) goto out; + + LOG(LL_DEBUG, ("%s use_ssl? %d %s", url, use_ssl, conn_addr)); + if (use_ssl) { +#if MG_ENABLE_SSL + /* + * Schema requires SSL, but no SSL parameters were provided in opts. + * In order to maintain backward compatibility, use a faux-SSL with no + * verification. + */ + if (opts.ssl_ca_cert == NULL) { + opts.ssl_ca_cert = "*"; + } +#else + MG_SET_PTRPTR(opts.error_string, "ssl is disabled"); + goto out; +#endif + } + + if ((nc = mg_connect_opt(mgr, conn_addr, MG_CB(ev_handler, user_data), + opts)) != NULL) { + mg_set_protocol_http_websocket(nc); + } + +out: + if (conn_addr != NULL && conn_addr != conn_addr_buf) MG_FREE(conn_addr); + return nc; +} + +struct mg_connection *mg_connect_http_opt( + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), + struct mg_connect_opts opts, const char *url, const char *extra_headers, + const char *post_data) { + struct mg_str user = MG_NULL_STR, null_str = MG_NULL_STR; + struct mg_str host = MG_NULL_STR, path = MG_NULL_STR; + struct mbuf auth; + struct mg_connection *nc = + mg_connect_http_base(mgr, MG_CB(ev_handler, user_data), opts, "http", + NULL, "https", NULL, url, &path, &user, &host); + + if (nc == NULL) { + return NULL; + } + + mbuf_init(&auth, 0); + if (user.len > 0) { + mg_basic_auth_header(user, null_str, &auth); + } + + if (post_data == NULL) post_data = ""; + if (extra_headers == NULL) extra_headers = ""; + if (path.len == 0) path = mg_mk_str("/"); + + mg_printf(nc, "%s %.*s HTTP/1.1\r\nHost: %.*s\r\nContent-Length: %" SIZE_T_FMT + "\r\n%.*s%s\r\n%s", + (post_data[0] == '\0' ? "GET" : "POST"), (int) path.len, path.p, + (int) (path.p - host.p), host.p, strlen(post_data), (int) auth.len, + (auth.buf == NULL ? "" : auth.buf), extra_headers, post_data); + + mbuf_free(&auth); + return nc; +} + +struct mg_connection *mg_connect_http( + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), + const char *url, const char *extra_headers, const char *post_data) { + struct mg_connect_opts opts; + memset(&opts, 0, sizeof(opts)); + return mg_connect_http_opt(mgr, MG_CB(ev_handler, user_data), opts, url, + extra_headers, post_data); +} + +size_t mg_parse_multipart(const char *buf, size_t buf_len, char *var_name, + size_t var_name_len, char *file_name, + size_t file_name_len, const char **data, + size_t *data_len) { + static const char cd[] = "Content-Disposition: "; + size_t hl, bl, n, ll, pos, cdl = sizeof(cd) - 1; + + if (buf == NULL || buf_len <= 0) return 0; + if ((hl = mg_http_get_request_len(buf, buf_len)) <= 0) return 0; + if (buf[0] != '-' || buf[1] != '-' || buf[2] == '\n') return 0; + + /* Get boundary length */ + bl = mg_get_line_len(buf, buf_len); + + /* Loop through headers, fetch variable name and file name */ + var_name[0] = file_name[0] = '\0'; + for (n = bl; (ll = mg_get_line_len(buf + n, hl - n)) > 0; n += ll) { + if (mg_ncasecmp(cd, buf + n, cdl) == 0) { + struct mg_str header; + header.p = buf + n + cdl; + header.len = ll - (cdl + 2); + mg_http_parse_header(&header, "name", var_name, var_name_len); + mg_http_parse_header(&header, "filename", file_name, file_name_len); + } + } + + /* Scan through the body, search for terminating boundary */ + for (pos = hl; pos + (bl - 2) < buf_len; pos++) { + if (buf[pos] == '-' && !strncmp(buf, &buf[pos], bl - 2)) { + if (data_len != NULL) *data_len = (pos - 2) - hl; + if (data != NULL) *data = buf + hl; + return pos; + } + } + + return 0; +} + +void mg_register_http_endpoint_opt(struct mg_connection *nc, + const char *uri_path, + mg_event_handler_t handler, + struct mg_http_endpoint_opts opts) { + struct mg_http_proto_data *pd = NULL; + struct mg_http_endpoint *new_ep = NULL; + + if (nc == NULL) return; + new_ep = (struct mg_http_endpoint *) MG_CALLOC(1, sizeof(*new_ep)); + if (new_ep == NULL) return; + + pd = mg_http_get_proto_data(nc); + new_ep->uri_pattern = mg_strdup(mg_mk_str(uri_path)); + if (opts.auth_domain != NULL && opts.auth_file != NULL) { + new_ep->auth_domain = strdup(opts.auth_domain); + new_ep->auth_file = strdup(opts.auth_file); + } + new_ep->handler = handler; +#if MG_ENABLE_CALLBACK_USERDATA + new_ep->user_data = opts.user_data; +#endif + new_ep->next = pd->endpoints; + pd->endpoints = new_ep; +} + +static void mg_http_call_endpoint_handler(struct mg_connection *nc, int ev, + struct http_message *hm) { + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); + void *user_data = nc->user_data; + + if (ev == MG_EV_HTTP_REQUEST +#if MG_ENABLE_HTTP_STREAMING_MULTIPART + || ev == MG_EV_HTTP_MULTIPART_REQUEST +#endif + ) { + struct mg_http_endpoint *ep = + mg_http_get_endpoint_handler(nc->listener, &hm->uri); + if (ep != NULL) { +#if MG_ENABLE_FILESYSTEM && !MG_DISABLE_HTTP_DIGEST_AUTH + if (!mg_http_is_authorized(hm, hm->uri, 0 /* is_directory */, + ep->auth_domain, ep->auth_file, + 1 /* is_global_pass_file */)) { + mg_http_send_digest_auth_request(nc, ep->auth_domain); + return; + } +#endif + pd->endpoint_handler = ep->handler; +#if MG_ENABLE_CALLBACK_USERDATA + user_data = ep->user_data; +#endif + } + } + mg_call(nc, pd->endpoint_handler ? pd->endpoint_handler : nc->handler, + user_data, ev, hm); +} + +void mg_register_http_endpoint(struct mg_connection *nc, const char *uri_path, + MG_CB(mg_event_handler_t handler, + void *user_data)) { + struct mg_http_endpoint_opts opts; + memset(&opts, 0, sizeof(opts)); +#if MG_ENABLE_CALLBACK_USERDATA + opts.user_data = user_data; +#endif + mg_register_http_endpoint_opt(nc, uri_path, handler, opts); +} + +#endif /* MG_ENABLE_HTTP */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/http_cgi.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef _WIN32 +#include <signal.h> +#endif + +#if MG_ENABLE_HTTP && MG_ENABLE_HTTP_CGI + +#ifndef MG_MAX_CGI_ENVIR_VARS +#define MG_MAX_CGI_ENVIR_VARS 64 +#endif + +#ifndef MG_ENV_EXPORT_TO_CGI +#define MG_ENV_EXPORT_TO_CGI "MONGOOSE_CGI" +#endif + +#define MG_F_HTTP_CGI_PARSE_HEADERS MG_F_USER_1 + +/* + * This structure helps to create an environment for the spawned CGI program. + * Environment is an array of "VARIABLE=VALUE\0" ASCIIZ strings, + * last element must be NULL. + * However, on Windows there is a requirement that all these VARIABLE=VALUE\0 + * strings must reside in a contiguous buffer. The end of the buffer is + * marked by two '\0' characters. + * We satisfy both worlds: we create an envp array (which is vars), all + * entries are actually pointers inside buf. + */ +struct mg_cgi_env_block { + struct mg_connection *nc; + char buf[MG_CGI_ENVIRONMENT_SIZE]; /* Environment buffer */ + const char *vars[MG_MAX_CGI_ENVIR_VARS]; /* char *envp[] */ + int len; /* Space taken */ + int nvars; /* Number of variables in envp[] */ +}; + +#ifdef _WIN32 +struct mg_threadparam { + sock_t s; + HANDLE hPipe; +}; + +static int mg_wait_until_ready(sock_t sock, int for_read) { + fd_set set; + FD_ZERO(&set); + FD_SET(sock, &set); + return select(sock + 1, for_read ? &set : 0, for_read ? 0 : &set, 0, 0) == 1; +} + +static void *mg_push_to_stdin(void *arg) { + struct mg_threadparam *tp = (struct mg_threadparam *) arg; + int n, sent, stop = 0; + DWORD k; + char buf[BUFSIZ]; + + while (!stop && mg_wait_until_ready(tp->s, 1) && + (n = recv(tp->s, buf, sizeof(buf), 0)) > 0) { + if (n == -1 && GetLastError() == WSAEWOULDBLOCK) continue; + for (sent = 0; !stop && sent < n; sent += k) { + if (!WriteFile(tp->hPipe, buf + sent, n - sent, &k, 0)) stop = 1; + } + } + DBG(("%s", "FORWARED EVERYTHING TO CGI")); + CloseHandle(tp->hPipe); + MG_FREE(tp); + return NULL; +} + +static void *mg_pull_from_stdout(void *arg) { + struct mg_threadparam *tp = (struct mg_threadparam *) arg; + int k = 0, stop = 0; + DWORD n, sent; + char buf[BUFSIZ]; + + while (!stop && ReadFile(tp->hPipe, buf, sizeof(buf), &n, NULL)) { + for (sent = 0; !stop && sent < n; sent += k) { + if (mg_wait_until_ready(tp->s, 0) && + (k = send(tp->s, buf + sent, n - sent, 0)) <= 0) + stop = 1; + } + } + DBG(("%s", "EOF FROM CGI")); + CloseHandle(tp->hPipe); + shutdown(tp->s, 2); // Without this, IO thread may get truncated data + closesocket(tp->s); + MG_FREE(tp); + return NULL; +} + +static void mg_spawn_stdio_thread(sock_t sock, HANDLE hPipe, + void *(*func)(void *)) { + struct mg_threadparam *tp = (struct mg_threadparam *) MG_MALLOC(sizeof(*tp)); + if (tp != NULL) { + tp->s = sock; + tp->hPipe = hPipe; + mg_start_thread(func, tp); + } +} + +static void mg_abs_path(const char *utf8_path, char *abs_path, size_t len) { + wchar_t buf[MG_MAX_PATH], buf2[MG_MAX_PATH]; + to_wchar(utf8_path, buf, ARRAY_SIZE(buf)); + GetFullPathNameW(buf, ARRAY_SIZE(buf2), buf2, NULL); + WideCharToMultiByte(CP_UTF8, 0, buf2, wcslen(buf2) + 1, abs_path, len, 0, 0); +} + +static int mg_start_process(const char *interp, const char *cmd, + const char *env, const char *envp[], + const char *dir, sock_t sock) { + STARTUPINFOW si; + PROCESS_INFORMATION pi; + HANDLE a[2], b[2], me = GetCurrentProcess(); + wchar_t wcmd[MG_MAX_PATH], full_dir[MG_MAX_PATH]; + char buf[MG_MAX_PATH], buf2[MG_MAX_PATH], buf5[MG_MAX_PATH], + buf4[MG_MAX_PATH], cmdline[MG_MAX_PATH]; + DWORD flags = DUPLICATE_CLOSE_SOURCE | DUPLICATE_SAME_ACCESS; + FILE *fp; + + memset(&si, 0, sizeof(si)); + memset(&pi, 0, sizeof(pi)); + + si.cb = sizeof(si); + si.dwFlags = STARTF_USESTDHANDLES | STARTF_USESHOWWINDOW; + si.wShowWindow = SW_HIDE; + si.hStdError = GetStdHandle(STD_ERROR_HANDLE); + + CreatePipe(&a[0], &a[1], NULL, 0); + CreatePipe(&b[0], &b[1], NULL, 0); + DuplicateHandle(me, a[0], me, &si.hStdInput, 0, TRUE, flags); + DuplicateHandle(me, b[1], me, &si.hStdOutput, 0, TRUE, flags); + + if (interp == NULL && (fp = mg_fopen(cmd, "r")) != NULL) { + buf[0] = buf[1] = '\0'; + fgets(buf, sizeof(buf), fp); + buf[sizeof(buf) - 1] = '\0'; + if (buf[0] == '#' && buf[1] == '!') { + interp = buf + 2; + /* Trim leading spaces: https://github.com/cesanta/mongoose/issues/489 */ + while (*interp != '\0' && isspace(*(unsigned char *) interp)) { + interp++; + } + } + fclose(fp); + } + + snprintf(buf, sizeof(buf), "%s/%s", dir, cmd); + mg_abs_path(buf, buf2, ARRAY_SIZE(buf2)); + + mg_abs_path(dir, buf5, ARRAY_SIZE(buf5)); + to_wchar(dir, full_dir, ARRAY_SIZE(full_dir)); + + if (interp != NULL) { + mg_abs_path(interp, buf4, ARRAY_SIZE(buf4)); + snprintf(cmdline, sizeof(cmdline), "%s \"%s\"", buf4, buf2); + } else { + snprintf(cmdline, sizeof(cmdline), "\"%s\"", buf2); + } + to_wchar(cmdline, wcmd, ARRAY_SIZE(wcmd)); + + if (CreateProcessW(NULL, wcmd, NULL, NULL, TRUE, CREATE_NEW_PROCESS_GROUP, + (void *) env, full_dir, &si, &pi) != 0) { + mg_spawn_stdio_thread(sock, a[1], mg_push_to_stdin); + mg_spawn_stdio_thread(sock, b[0], mg_pull_from_stdout); + + CloseHandle(si.hStdOutput); + CloseHandle(si.hStdInput); + + CloseHandle(pi.hThread); + CloseHandle(pi.hProcess); + } else { + CloseHandle(a[1]); + CloseHandle(b[0]); + closesocket(sock); + } + DBG(("CGI command: [%ls] -> %p", wcmd, pi.hProcess)); + + /* Not closing a[0] and b[1] because we've used DUPLICATE_CLOSE_SOURCE */ + (void) envp; + return (pi.hProcess != NULL); +} +#else +static int mg_start_process(const char *interp, const char *cmd, + const char *env, const char *envp[], + const char *dir, sock_t sock) { + char buf[500]; + pid_t pid = fork(); + (void) env; + + if (pid == 0) { + /* + * In Linux `chdir` declared with `warn_unused_result` attribute + * To shutup compiler we have yo use result in some way + */ + int tmp = chdir(dir); + (void) tmp; + (void) dup2(sock, 0); + (void) dup2(sock, 1); + closesocket(sock); + + /* + * After exec, all signal handlers are restored to their default values, + * with one exception of SIGCHLD. According to POSIX.1-2001 and Linux's + * implementation, SIGCHLD's handler will leave unchanged after exec + * if it was set to be ignored. Restore it to default action. + */ + signal(SIGCHLD, SIG_DFL); + + if (interp == NULL) { + execle(cmd, cmd, (char *) 0, envp); /* (char *) 0 to squash warning */ + } else { + execle(interp, interp, cmd, (char *) 0, envp); + } + snprintf(buf, sizeof(buf), + "Status: 500\r\n\r\n" + "500 Server Error: %s%s%s: %s", + interp == NULL ? "" : interp, interp == NULL ? "" : " ", cmd, + strerror(errno)); + send(1, buf, strlen(buf), 0); + _exit(EXIT_FAILURE); /* exec call failed */ + } + + return (pid != 0); +} +#endif /* _WIN32 */ + +/* + * Append VARIABLE=VALUE\0 string to the buffer, and add a respective + * pointer into the vars array. + */ +static char *mg_addenv(struct mg_cgi_env_block *block, const char *fmt, ...) { + int n, space; + char *added = block->buf + block->len; + va_list ap; + + /* Calculate how much space is left in the buffer */ + space = sizeof(block->buf) - (block->len + 2); + if (space > 0) { + /* Copy VARIABLE=VALUE\0 string into the free space */ + va_start(ap, fmt); + n = vsnprintf(added, (size_t) space, fmt, ap); + va_end(ap); + + /* Make sure we do not overflow buffer and the envp array */ + if (n > 0 && n + 1 < space && + block->nvars < (int) ARRAY_SIZE(block->vars) - 2) { + /* Append a pointer to the added string into the envp array */ + block->vars[block->nvars++] = added; + /* Bump up used length counter. Include \0 terminator */ + block->len += n + 1; + } + } + + return added; +} + +static void mg_addenv2(struct mg_cgi_env_block *blk, const char *name) { + const char *s; + if ((s = getenv(name)) != NULL) mg_addenv(blk, "%s=%s", name, s); +} + +static void mg_prepare_cgi_environment(struct mg_connection *nc, + const char *prog, + const struct mg_str *path_info, + const struct http_message *hm, + const struct mg_serve_http_opts *opts, + struct mg_cgi_env_block *blk) { + const char *s; + struct mg_str *h; + char *p; + size_t i; + char buf[100]; + + blk->len = blk->nvars = 0; + blk->nc = nc; + + if ((s = getenv("SERVER_NAME")) != NULL) { + mg_addenv(blk, "SERVER_NAME=%s", s); + } else { + mg_sock_to_str(nc->sock, buf, sizeof(buf), 3); + mg_addenv(blk, "SERVER_NAME=%s", buf); + } + mg_addenv(blk, "SERVER_ROOT=%s", opts->document_root); + mg_addenv(blk, "DOCUMENT_ROOT=%s", opts->document_root); + mg_addenv(blk, "SERVER_SOFTWARE=%s/%s", "Mongoose", MG_VERSION); + + /* Prepare the environment block */ + mg_addenv(blk, "%s", "GATEWAY_INTERFACE=CGI/1.1"); + mg_addenv(blk, "%s", "SERVER_PROTOCOL=HTTP/1.1"); + mg_addenv(blk, "%s", "REDIRECT_STATUS=200"); /* For PHP */ + + mg_addenv(blk, "REQUEST_METHOD=%.*s", (int) hm->method.len, hm->method.p); + + mg_addenv(blk, "REQUEST_URI=%.*s%s%.*s", (int) hm->uri.len, hm->uri.p, + hm->query_string.len == 0 ? "" : "?", (int) hm->query_string.len, + hm->query_string.p); + + mg_conn_addr_to_str(nc, buf, sizeof(buf), + MG_SOCK_STRINGIFY_REMOTE | MG_SOCK_STRINGIFY_IP); + mg_addenv(blk, "REMOTE_ADDR=%s", buf); + mg_conn_addr_to_str(nc, buf, sizeof(buf), MG_SOCK_STRINGIFY_PORT); + mg_addenv(blk, "SERVER_PORT=%s", buf); + + s = hm->uri.p + hm->uri.len - path_info->len - 1; + if (*s == '/') { + const char *base_name = strrchr(prog, DIRSEP); + mg_addenv(blk, "SCRIPT_NAME=%.*s/%s", (int) (s - hm->uri.p), hm->uri.p, + (base_name != NULL ? base_name + 1 : prog)); + } else { + mg_addenv(blk, "SCRIPT_NAME=%.*s", (int) (s - hm->uri.p + 1), hm->uri.p); + } + mg_addenv(blk, "SCRIPT_FILENAME=%s", prog); + + if (path_info != NULL && path_info->len > 0) { + mg_addenv(blk, "PATH_INFO=%.*s", (int) path_info->len, path_info->p); + /* Not really translated... */ + mg_addenv(blk, "PATH_TRANSLATED=%.*s", (int) path_info->len, path_info->p); + } + +#if MG_ENABLE_SSL + mg_addenv(blk, "HTTPS=%s", (nc->flags & MG_F_SSL ? "on" : "off")); +#else + mg_addenv(blk, "HTTPS=off"); +#endif + + if ((h = mg_get_http_header((struct http_message *) hm, "Content-Type")) != + NULL) { + mg_addenv(blk, "CONTENT_TYPE=%.*s", (int) h->len, h->p); + } + + if (hm->query_string.len > 0) { + mg_addenv(blk, "QUERY_STRING=%.*s", (int) hm->query_string.len, + hm->query_string.p); + } + + if ((h = mg_get_http_header((struct http_message *) hm, "Content-Length")) != + NULL) { + mg_addenv(blk, "CONTENT_LENGTH=%.*s", (int) h->len, h->p); + } + + mg_addenv2(blk, "PATH"); + mg_addenv2(blk, "TMP"); + mg_addenv2(blk, "TEMP"); + mg_addenv2(blk, "TMPDIR"); + mg_addenv2(blk, "PERLLIB"); + mg_addenv2(blk, MG_ENV_EXPORT_TO_CGI); + +#ifdef _WIN32 + mg_addenv2(blk, "COMSPEC"); + mg_addenv2(blk, "SYSTEMROOT"); + mg_addenv2(blk, "SystemDrive"); + mg_addenv2(blk, "ProgramFiles"); + mg_addenv2(blk, "ProgramFiles(x86)"); + mg_addenv2(blk, "CommonProgramFiles(x86)"); +#else + mg_addenv2(blk, "LD_LIBRARY_PATH"); +#endif /* _WIN32 */ + + /* Add all headers as HTTP_* variables */ + for (i = 0; hm->header_names[i].len > 0; i++) { + p = mg_addenv(blk, "HTTP_%.*s=%.*s", (int) hm->header_names[i].len, + hm->header_names[i].p, (int) hm->header_values[i].len, + hm->header_values[i].p); + + /* Convert variable name into uppercase, and change - to _ */ + for (; *p != '=' && *p != '\0'; p++) { + if (*p == '-') *p = '_'; + *p = (char) toupper(*(unsigned char *) p); + } + } + + blk->vars[blk->nvars++] = NULL; + blk->buf[blk->len++] = '\0'; +} + +static void mg_cgi_ev_handler(struct mg_connection *cgi_nc, int ev, + void *ev_data MG_UD_ARG(void *user_data)) { +#if !MG_ENABLE_CALLBACK_USERDATA + void *user_data = cgi_nc->user_data; +#endif + struct mg_connection *nc = (struct mg_connection *) user_data; + (void) ev_data; + + if (nc == NULL) { + /* The corresponding network connection was closed. */ + cgi_nc->flags |= MG_F_CLOSE_IMMEDIATELY; + return; + } + + switch (ev) { + case MG_EV_RECV: + /* + * CGI script does not output reply line, like "HTTP/1.1 CODE XXXXX\n" + * It outputs headers, then body. Headers might include "Status" + * header, which changes CODE, and it might include "Location" header + * which changes CODE to 302. + * + * Therefore we do not send the output from the CGI script to the user + * until all CGI headers are received. + * + * Here we parse the output from the CGI script, and if all headers has + * been received, send appropriate reply line, and forward all + * received headers to the client. + */ + if (nc->flags & MG_F_HTTP_CGI_PARSE_HEADERS) { + struct mbuf *io = &cgi_nc->recv_mbuf; + int len = mg_http_get_request_len(io->buf, io->len); + + if (len == 0) break; + if (len < 0 || io->len > MG_MAX_HTTP_REQUEST_SIZE) { + cgi_nc->flags |= MG_F_CLOSE_IMMEDIATELY; + mg_http_send_error(nc, 500, "Bad headers"); + } else { + struct http_message hm; + struct mg_str *h; + mg_http_parse_headers(io->buf, io->buf + io->len, io->len, &hm); + if (mg_get_http_header(&hm, "Location") != NULL) { + mg_printf(nc, "%s", "HTTP/1.1 302 Moved\r\n"); + } else if ((h = mg_get_http_header(&hm, "Status")) != NULL) { + mg_printf(nc, "HTTP/1.1 %.*s\r\n", (int) h->len, h->p); + } else { + mg_printf(nc, "%s", "HTTP/1.1 200 OK\r\n"); + } + } + nc->flags &= ~MG_F_HTTP_CGI_PARSE_HEADERS; + } + if (!(nc->flags & MG_F_HTTP_CGI_PARSE_HEADERS)) { + mg_forward(cgi_nc, nc); + } + break; + case MG_EV_CLOSE: + DBG(("%p CLOSE", cgi_nc)); + mg_http_free_proto_data_cgi(&mg_http_get_proto_data(nc)->cgi); + nc->flags |= MG_F_SEND_AND_CLOSE; + break; + } +} + +MG_INTERNAL void mg_handle_cgi(struct mg_connection *nc, const char *prog, + const struct mg_str *path_info, + const struct http_message *hm, + const struct mg_serve_http_opts *opts) { + struct mg_cgi_env_block blk; + char dir[MG_MAX_PATH]; + const char *p; + sock_t fds[2]; + + DBG(("%p [%s]", nc, prog)); + mg_prepare_cgi_environment(nc, prog, path_info, hm, opts, &blk); + /* + * CGI must be executed in its own directory. 'dir' must point to the + * directory containing executable program, 'p' must point to the + * executable program name relative to 'dir'. + */ + if ((p = strrchr(prog, DIRSEP)) == NULL) { + snprintf(dir, sizeof(dir), "%s", "."); + } else { + snprintf(dir, sizeof(dir), "%.*s", (int) (p - prog), prog); + prog = p + 1; + } + + if (!mg_socketpair(fds, SOCK_STREAM)) { + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + return; + } + +#ifndef _WIN32 + struct sigaction sa; + + sigemptyset(&sa.sa_mask); + sa.sa_handler = SIG_IGN; + sa.sa_flags = 0; + sigaction(SIGCHLD, &sa, NULL); +#endif + + if (mg_start_process(opts->cgi_interpreter, prog, blk.buf, blk.vars, dir, + fds[1]) != 0) { + size_t n = nc->recv_mbuf.len - (hm->message.len - hm->body.len); + struct mg_connection *cgi_nc = + mg_add_sock(nc->mgr, fds[0], mg_cgi_ev_handler MG_UD_ARG(nc)); + struct mg_http_proto_data *cgi_pd = mg_http_get_proto_data(nc); + cgi_pd->cgi.cgi_nc = cgi_nc; +#if !MG_ENABLE_CALLBACK_USERDATA + cgi_pd->cgi.cgi_nc->user_data = nc; +#endif + nc->flags |= MG_F_HTTP_CGI_PARSE_HEADERS; + /* Push POST data to the CGI */ + if (n > 0 && n < nc->recv_mbuf.len) { + mg_send(cgi_pd->cgi.cgi_nc, hm->body.p, n); + } + mbuf_remove(&nc->recv_mbuf, nc->recv_mbuf.len); + } else { + closesocket(fds[0]); + mg_http_send_error(nc, 500, "CGI failure"); + } + +#ifndef _WIN32 + closesocket(fds[1]); /* On Windows, CGI stdio thread closes that socket */ +#endif +} + +MG_INTERNAL void mg_http_free_proto_data_cgi(struct mg_http_proto_data_cgi *d) { + if (d == NULL) return; + if (d->cgi_nc != NULL) { + d->cgi_nc->flags |= MG_F_CLOSE_IMMEDIATELY; + d->cgi_nc->user_data = NULL; + } + memset(d, 0, sizeof(*d)); +} + +#endif /* MG_ENABLE_HTTP && MG_ENABLE_HTTP_CGI */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/http_ssi.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_HTTP && MG_ENABLE_HTTP_SSI && MG_ENABLE_FILESYSTEM + +static void mg_send_ssi_file(struct mg_connection *nc, struct http_message *hm, + const char *path, FILE *fp, int include_level, + const struct mg_serve_http_opts *opts); + +static void mg_send_file_data(struct mg_connection *nc, FILE *fp) { + char buf[BUFSIZ]; + size_t n; + while ((n = mg_fread(buf, 1, sizeof(buf), fp)) > 0) { + mg_send(nc, buf, n); + } +} + +static void mg_do_ssi_include(struct mg_connection *nc, struct http_message *hm, + const char *ssi, char *tag, int include_level, + const struct mg_serve_http_opts *opts) { + char file_name[MG_MAX_PATH], path[MG_MAX_PATH], *p; + FILE *fp; + + /* + * sscanf() is safe here, since send_ssi_file() also uses buffer + * of size MG_BUF_LEN to get the tag. So strlen(tag) is always < MG_BUF_LEN. + */ + if (sscanf(tag, " virtual=\"%[^\"]\"", file_name) == 1) { + /* File name is relative to the webserver root */ + snprintf(path, sizeof(path), "%s/%s", opts->document_root, file_name); + } else if (sscanf(tag, " abspath=\"%[^\"]\"", file_name) == 1) { + /* + * File name is relative to the webserver working directory + * or it is absolute system path + */ + snprintf(path, sizeof(path), "%s", file_name); + } else if (sscanf(tag, " file=\"%[^\"]\"", file_name) == 1 || + sscanf(tag, " \"%[^\"]\"", file_name) == 1) { + /* File name is relative to the currect document */ + snprintf(path, sizeof(path), "%s", ssi); + if ((p = strrchr(path, DIRSEP)) != NULL) { + p[1] = '\0'; + } + snprintf(path + strlen(path), sizeof(path) - strlen(path), "%s", file_name); + } else { + mg_printf(nc, "Bad SSI #include: [%s]", tag); + return; + } + + if ((fp = mg_fopen(path, "rb")) == NULL) { + mg_printf(nc, "SSI include error: mg_fopen(%s): %s", path, + strerror(mg_get_errno())); + } else { + mg_set_close_on_exec((sock_t) fileno(fp)); + if (mg_match_prefix(opts->ssi_pattern, strlen(opts->ssi_pattern), path) > + 0) { + mg_send_ssi_file(nc, hm, path, fp, include_level + 1, opts); + } else { + mg_send_file_data(nc, fp); + } + fclose(fp); + } +} + +#if MG_ENABLE_HTTP_SSI_EXEC +static void do_ssi_exec(struct mg_connection *nc, char *tag) { + char cmd[BUFSIZ]; + FILE *fp; + + if (sscanf(tag, " \"%[^\"]\"", cmd) != 1) { + mg_printf(nc, "Bad SSI #exec: [%s]", tag); + } else if ((fp = popen(cmd, "r")) == NULL) { + mg_printf(nc, "Cannot SSI #exec: [%s]: %s", cmd, strerror(mg_get_errno())); + } else { + mg_send_file_data(nc, fp); + pclose(fp); + } +} +#endif /* MG_ENABLE_HTTP_SSI_EXEC */ + +/* + * SSI directive has the following format: + * <!--#directive parameter=value parameter=value --> + */ +static void mg_send_ssi_file(struct mg_connection *nc, struct http_message *hm, + const char *path, FILE *fp, int include_level, + const struct mg_serve_http_opts *opts) { + static const struct mg_str btag = MG_MK_STR("<!--#"); + static const struct mg_str d_include = MG_MK_STR("include"); + static const struct mg_str d_call = MG_MK_STR("call"); +#if MG_ENABLE_HTTP_SSI_EXEC + static const struct mg_str d_exec = MG_MK_STR("exec"); +#endif + char buf[BUFSIZ], *p = buf + btag.len; /* p points to SSI directive */ + int ch, len, in_ssi_tag; + + if (include_level > 10) { + mg_printf(nc, "SSI #include level is too deep (%s)", path); + return; + } + + in_ssi_tag = len = 0; + while ((ch = fgetc(fp)) != EOF) { + if (in_ssi_tag && ch == '>' && buf[len - 1] == '-' && buf[len - 2] == '-') { + size_t i = len - 2; + in_ssi_tag = 0; + + /* Trim closing --> */ + buf[i--] = '\0'; + while (i > 0 && buf[i] == ' ') { + buf[i--] = '\0'; + } + + /* Handle known SSI directives */ + if (strncmp(p, d_include.p, d_include.len) == 0) { + mg_do_ssi_include(nc, hm, path, p + d_include.len + 1, include_level, + opts); + } else if (strncmp(p, d_call.p, d_call.len) == 0) { + struct mg_ssi_call_ctx cctx; + memset(&cctx, 0, sizeof(cctx)); + cctx.req = hm; + cctx.file = mg_mk_str(path); + cctx.arg = mg_mk_str(p + d_call.len + 1); + mg_call(nc, NULL, nc->user_data, MG_EV_SSI_CALL, + (void *) cctx.arg.p); /* NUL added above */ + mg_call(nc, NULL, nc->user_data, MG_EV_SSI_CALL_CTX, &cctx); +#if MG_ENABLE_HTTP_SSI_EXEC + } else if (strncmp(p, d_exec.p, d_exec.len) == 0) { + do_ssi_exec(nc, p + d_exec.len + 1); +#endif + } else { + /* Silently ignore unknown SSI directive. */ + } + len = 0; + } else if (ch == '<') { + in_ssi_tag = 1; + if (len > 0) { + mg_send(nc, buf, (size_t) len); + } + len = 0; + buf[len++] = ch & 0xff; + } else if (in_ssi_tag) { + if (len == (int) btag.len && strncmp(buf, btag.p, btag.len) != 0) { + /* Not an SSI tag */ + in_ssi_tag = 0; + } else if (len == (int) sizeof(buf) - 2) { + mg_printf(nc, "%s: SSI tag is too large", path); + len = 0; + } + buf[len++] = ch & 0xff; + } else { + buf[len++] = ch & 0xff; + if (len == (int) sizeof(buf)) { + mg_send(nc, buf, (size_t) len); + len = 0; + } + } + } + + /* Send the rest of buffered data */ + if (len > 0) { + mg_send(nc, buf, (size_t) len); + } +} + +MG_INTERNAL void mg_handle_ssi_request(struct mg_connection *nc, + struct http_message *hm, + const char *path, + const struct mg_serve_http_opts *opts) { + FILE *fp; + struct mg_str mime_type; + DBG(("%p %s", nc, path)); + + if ((fp = mg_fopen(path, "rb")) == NULL) { + mg_http_send_error(nc, 404, NULL); + } else { + mg_set_close_on_exec((sock_t) fileno(fp)); + + mime_type = mg_get_mime_type(path, "text/plain", opts); + mg_send_response_line(nc, 200, opts->extra_headers); + mg_printf(nc, + "Content-Type: %.*s\r\n" + "Connection: close\r\n\r\n", + (int) mime_type.len, mime_type.p); + mg_send_ssi_file(nc, hm, path, fp, 0, opts); + fclose(fp); + nc->flags |= MG_F_SEND_AND_CLOSE; + } +} + +#endif /* MG_ENABLE_HTTP_SSI && MG_ENABLE_HTTP && MG_ENABLE_FILESYSTEM */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/http_webdav.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_HTTP && MG_ENABLE_HTTP_WEBDAV + +MG_INTERNAL int mg_is_dav_request(const struct mg_str *s) { + static const char *methods[] = { + "PUT", + "DELETE", + "MKCOL", + "PROPFIND", + "MOVE" +#if MG_ENABLE_FAKE_DAVLOCK + , + "LOCK", + "UNLOCK" +#endif + }; + size_t i; + + for (i = 0; i < ARRAY_SIZE(methods); i++) { + if (mg_vcmp(s, methods[i]) == 0) { + return 1; + } + } + + return 0; +} + +static int mg_mkdir(const char *path, uint32_t mode) { +#ifndef _WIN32 + return mkdir(path, mode); +#else + (void) mode; + return _mkdir(path); +#endif +} + +static void mg_print_props(struct mg_connection *nc, const char *name, + cs_stat_t *stp) { + char mtime[64]; + time_t t = stp->st_mtime; /* store in local variable for NDK compile */ + struct mg_str name_esc = mg_url_encode(mg_mk_str(name)); + mg_gmt_time_string(mtime, sizeof(mtime), &t); + mg_printf(nc, + "<d:response>" + "<d:href>%s</d:href>" + "<d:propstat>" + "<d:prop>" + "<d:resourcetype>%s</d:resourcetype>" + "<d:getcontentlength>%" INT64_FMT + "</d:getcontentlength>" + "<d:getlastmodified>%s</d:getlastmodified>" + "</d:prop>" + "<d:status>HTTP/1.1 200 OK</d:status>" + "</d:propstat>" + "</d:response>\n", + name_esc.p, S_ISDIR(stp->st_mode) ? "<d:collection/>" : "", + (int64_t) stp->st_size, mtime); + free((void *) name_esc.p); +} + +MG_INTERNAL void mg_handle_propfind(struct mg_connection *nc, const char *path, + cs_stat_t *stp, struct http_message *hm, + struct mg_serve_http_opts *opts) { + static const char header[] = + "HTTP/1.1 207 Multi-Status\r\n" + "Connection: close\r\n" + "Content-Type: text/xml; charset=utf-8\r\n\r\n" + "<?xml version=\"1.0\" encoding=\"utf-8\"?>" + "<d:multistatus xmlns:d='DAV:'>\n"; + static const char footer[] = "</d:multistatus>\n"; + const struct mg_str *depth = mg_get_http_header(hm, "Depth"); + + /* Print properties for the requested resource itself */ + if (S_ISDIR(stp->st_mode) && + strcmp(opts->enable_directory_listing, "yes") != 0) { + mg_printf(nc, "%s", "HTTP/1.1 403 Directory Listing Denied\r\n\r\n"); + } else { + char uri[MG_MAX_PATH]; + mg_send(nc, header, sizeof(header) - 1); + snprintf(uri, sizeof(uri), "%.*s", (int) hm->uri.len, hm->uri.p); + mg_print_props(nc, uri, stp); + if (S_ISDIR(stp->st_mode) && (depth == NULL || mg_vcmp(depth, "0") != 0)) { + mg_scan_directory(nc, path, opts, mg_print_props); + } + mg_send(nc, footer, sizeof(footer) - 1); + nc->flags |= MG_F_SEND_AND_CLOSE; + } +} + +#if MG_ENABLE_FAKE_DAVLOCK +/* + * Windows explorer (probably there are another WebDav clients like it) + * requires LOCK support in webdav. W/out this, it still works, but fails + * to save file: shows error message and offers "Save As". + * "Save as" works, but this message is very annoying. + * This is fake lock, which doesn't lock something, just returns LOCK token, + * UNLOCK always answers "OK". + * With this fake LOCK Windows Explorer looks happy and saves file. + * NOTE: that is not DAV LOCK imlementation, it is just a way to shut up + * Windows native DAV client. This is why FAKE LOCK is not enabed by default + */ +MG_INTERNAL void mg_handle_lock(struct mg_connection *nc, const char *path) { + static const char *reply = + "HTTP/1.1 207 Multi-Status\r\n" + "Connection: close\r\n" + "Content-Type: text/xml; charset=utf-8\r\n\r\n" + "<?xml version=\"1.0\" encoding=\"utf-8\"?>" + "<d:multistatus xmlns:d='DAV:'>\n" + "<D:lockdiscovery>\n" + "<D:activelock>\n" + "<D:locktoken>\n" + "<D:href>\n" + "opaquelocktoken:%s%u" + "</D:href>" + "</D:locktoken>" + "</D:activelock>\n" + "</D:lockdiscovery>" + "</d:multistatus>\n"; + mg_printf(nc, reply, path, (unsigned int) mg_time()); + nc->flags |= MG_F_SEND_AND_CLOSE; +} +#endif + +MG_INTERNAL void mg_handle_mkcol(struct mg_connection *nc, const char *path, + struct http_message *hm) { + int status_code = 500; + if (hm->body.len != (size_t) ~0 && hm->body.len > 0) { + status_code = 415; + } else if (!mg_mkdir(path, 0755)) { + status_code = 201; + } else if (errno == EEXIST) { + status_code = 405; + } else if (errno == EACCES) { + status_code = 403; + } else if (errno == ENOENT) { + status_code = 409; + } else { + status_code = 500; + } + mg_http_send_error(nc, status_code, NULL); +} + +static int mg_remove_directory(const struct mg_serve_http_opts *opts, + const char *dir) { + char path[MG_MAX_PATH]; + struct dirent *dp; + cs_stat_t st; + DIR *dirp; + + if ((dirp = opendir(dir)) == NULL) return 0; + + while ((dp = readdir(dirp)) != NULL) { + if (mg_is_file_hidden((const char *) dp->d_name, opts, 1)) { + continue; + } + snprintf(path, sizeof(path), "%s%c%s", dir, '/', dp->d_name); + mg_stat(path, &st); + if (S_ISDIR(st.st_mode)) { + mg_remove_directory(opts, path); + } else { + remove(path); + } + } + closedir(dirp); + rmdir(dir); + + return 1; +} + +MG_INTERNAL void mg_handle_move(struct mg_connection *c, + const struct mg_serve_http_opts *opts, + const char *path, struct http_message *hm) { + const struct mg_str *dest = mg_get_http_header(hm, "Destination"); + if (dest == NULL) { + mg_http_send_error(c, 411, NULL); + } else { + const char *p = (char *) memchr(dest->p, '/', dest->len); + if (p != NULL && p[1] == '/' && + (p = (char *) memchr(p + 2, '/', dest->p + dest->len - p)) != NULL) { + char buf[MG_MAX_PATH]; + snprintf(buf, sizeof(buf), "%s%.*s", opts->dav_document_root, + (int) (dest->p + dest->len - p), p); + if (rename(path, buf) == 0) { + mg_http_send_error(c, 200, NULL); + } else { + mg_http_send_error(c, 418, NULL); + } + } else { + mg_http_send_error(c, 500, NULL); + } + } +} + +MG_INTERNAL void mg_handle_delete(struct mg_connection *nc, + const struct mg_serve_http_opts *opts, + const char *path) { + cs_stat_t st; + if (mg_stat(path, &st) != 0) { + mg_http_send_error(nc, 404, NULL); + } else if (S_ISDIR(st.st_mode)) { + mg_remove_directory(opts, path); + mg_http_send_error(nc, 204, NULL); + } else if (remove(path) == 0) { + mg_http_send_error(nc, 204, NULL); + } else { + mg_http_send_error(nc, 423, NULL); + } +} + +/* Return -1 on error, 1 on success. */ +static int mg_create_itermediate_directories(const char *path) { + const char *s; + + /* Create intermediate directories if they do not exist */ + for (s = path + 1; *s != '\0'; s++) { + if (*s == '/') { + char buf[MG_MAX_PATH]; + cs_stat_t st; + snprintf(buf, sizeof(buf), "%.*s", (int) (s - path), path); + buf[sizeof(buf) - 1] = '\0'; + if (mg_stat(buf, &st) != 0 && mg_mkdir(buf, 0755) != 0) { + return -1; + } + } + } + + return 1; +} + +MG_INTERNAL void mg_handle_put(struct mg_connection *nc, const char *path, + struct http_message *hm) { + struct mg_http_proto_data *pd = mg_http_get_proto_data(nc); + cs_stat_t st; + const struct mg_str *cl_hdr = mg_get_http_header(hm, "Content-Length"); + int rc, status_code = mg_stat(path, &st) == 0 ? 200 : 201; + + mg_http_free_proto_data_file(&pd->file); + if ((rc = mg_create_itermediate_directories(path)) == 0) { + mg_printf(nc, "HTTP/1.1 %d OK\r\nContent-Length: 0\r\n\r\n", status_code); + } else if (rc == -1) { + mg_http_send_error(nc, 500, NULL); + } else if (cl_hdr == NULL) { + mg_http_send_error(nc, 411, NULL); + } else if ((pd->file.fp = mg_fopen(path, "w+b")) == NULL) { + mg_http_send_error(nc, 500, NULL); + } else { + const struct mg_str *range_hdr = mg_get_http_header(hm, "Content-Range"); + int64_t r1 = 0, r2 = 0; + pd->file.type = DATA_PUT; + mg_set_close_on_exec((sock_t) fileno(pd->file.fp)); + pd->file.cl = to64(cl_hdr->p); + if (range_hdr != NULL && + mg_http_parse_range_header(range_hdr, &r1, &r2) > 0) { + status_code = 206; + fseeko(pd->file.fp, r1, SEEK_SET); + pd->file.cl = r2 > r1 ? r2 - r1 + 1 : pd->file.cl - r1; + } + mg_printf(nc, "HTTP/1.1 %d OK\r\nContent-Length: 0\r\n\r\n", status_code); + /* Remove HTTP request from the mbuf, leave only payload */ + mbuf_remove(&nc->recv_mbuf, hm->message.len - hm->body.len); + mg_http_transfer_file_data(nc); + } +} + +#endif /* MG_ENABLE_HTTP && MG_ENABLE_HTTP_WEBDAV */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/http_websocket.c" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_HTTP && MG_ENABLE_HTTP_WEBSOCKET + +/* Amalgamated: #include "common/sha1.h" */ + +#ifndef MG_WEBSOCKET_PING_INTERVAL_SECONDS +#define MG_WEBSOCKET_PING_INTERVAL_SECONDS 5 +#endif + +static int mg_is_ws_fragment(unsigned char flags) { + return (flags & 0x80) == 0 || (flags & 0x0f) == 0; +} + +static int mg_is_ws_first_fragment(unsigned char flags) { + return (flags & 0x80) == 0 && (flags & 0x0f) != 0; +} + +static void mg_handle_incoming_websocket_frame(struct mg_connection *nc, + struct websocket_message *wsm) { + if (wsm->flags & 0x8) { + mg_call(nc, nc->handler, nc->user_data, MG_EV_WEBSOCKET_CONTROL_FRAME, wsm); + } else { + mg_call(nc, nc->handler, nc->user_data, MG_EV_WEBSOCKET_FRAME, wsm); + } +} + +static struct mg_ws_proto_data *mg_ws_get_proto_data(struct mg_connection *nc) { + struct mg_http_proto_data *htd = mg_http_get_proto_data(nc); + return (htd != NULL ? &htd->ws_data : NULL); +} + +static int mg_deliver_websocket_data(struct mg_connection *nc) { + /* Using unsigned char *, cause of integer arithmetic below */ + uint64_t i, data_len = 0, frame_len = 0, buf_len = nc->recv_mbuf.len, len, + mask_len = 0, header_len = 0; + unsigned char *p = (unsigned char *) nc->recv_mbuf.buf, *buf = p, + *e = p + buf_len; + struct mg_ws_proto_data *wsd = mg_ws_get_proto_data(nc); + int ok; + int reass = buf_len > 0 && mg_is_ws_fragment(p[0]) && + !(nc->flags & MG_F_WEBSOCKET_NO_DEFRAG); + + /* If that's a continuation frame that must be reassembled, handle it */ + if (reass && !mg_is_ws_first_fragment(p[0]) && buf_len >= 1 && + buf_len >= 1 + wsd->reass_len) { + buf += 1 + wsd->reass_len; + buf_len -= 1 + wsd->reass_len; + } + + if (buf_len >= 2) { + len = buf[1] & 0x7f; + mask_len = buf[1] & 0x80 ? 4 : 0; + if (len < 126 && buf_len >= mask_len) { + data_len = len; + header_len = 2 + mask_len; + } else if (len == 126 && buf_len >= 4 + mask_len) { + header_len = 4 + mask_len; + data_len = ntohs(*(uint16_t *) &buf[2]); + } else if (buf_len >= 10 + mask_len) { + header_len = 10 + mask_len; + data_len = (((uint64_t) ntohl(*(uint32_t *) &buf[2])) << 32) + + ntohl(*(uint32_t *) &buf[6]); + } + } + + frame_len = header_len + data_len; + ok = (frame_len > 0 && frame_len <= buf_len); + + /* Check for overflow */ + if (frame_len < header_len || frame_len < data_len) { + ok = 0; + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + } + + if (ok) { + struct websocket_message wsm; + + wsm.size = (size_t) data_len; + wsm.data = buf + header_len; + wsm.flags = buf[0]; + + /* Apply mask if necessary */ + if (mask_len > 0) { + for (i = 0; i < data_len; i++) { + buf[i + header_len] ^= (buf + header_len - mask_len)[i % 4]; + } + } + + if (reass) { + /* On first fragmented frame, nullify size */ + if (mg_is_ws_first_fragment(wsm.flags)) { + p[0] &= ~0x0f; /* Next frames will be treated as continuation */ + buf = p + 1; + wsd->reass_len = 0; + } + + /* Append this frame to the reassembled buffer */ + memmove(buf, wsm.data, e - wsm.data); + wsd->reass_len += wsm.size; + nc->recv_mbuf.len -= wsm.data - buf; + + /* On last fragmented frame - call user handler and remove data */ + if (wsm.flags & 0x80) { + wsm.data = p + 1; + wsm.size = wsd->reass_len; + mg_handle_incoming_websocket_frame(nc, &wsm); + mbuf_remove(&nc->recv_mbuf, 1 + wsd->reass_len); + wsd->reass_len = 0; + } + } else { + /* TODO(lsm): properly handle OOB control frames during defragmentation */ + mg_handle_incoming_websocket_frame(nc, &wsm); + mbuf_remove(&nc->recv_mbuf, (size_t) frame_len); /* Cleanup frame */ + wsd->reass_len = 0; + } + + /* If the frame is not reassembled - client closes and close too */ + if (!reass && (buf[0] & 0x0f) == WEBSOCKET_OP_CLOSE) { + nc->flags |= MG_F_SEND_AND_CLOSE; + } + } + + return ok; +} + +struct ws_mask_ctx { + size_t pos; /* zero means unmasked */ + uint32_t mask; +}; + +static uint32_t mg_ws_random_mask(void) { + uint32_t mask; +/* + * The spec requires WS client to generate hard to + * guess mask keys. From RFC6455, Section 5.3: + * + * The unpredictability of the masking key is essential to prevent + * authors of malicious applications from selecting the bytes that appear on + * the wire. + * + * Hence this feature is essential when the actual end user of this API + * is untrusted code that wouldn't have access to a lower level net API + * anyway (e.g. web browsers). Hence this feature is low prio for most + * mongoose use cases and thus can be disabled, e.g. when porting to a platform + * that lacks rand(). + */ +#if MG_DISABLE_WS_RANDOM_MASK + mask = 0xefbeadde; /* generated with a random number generator, I swear */ +#else + if (sizeof(long) >= 4) { + mask = (uint32_t) rand(); + } else if (sizeof(long) == 2) { + mask = (uint32_t) rand() << 16 | (uint32_t) rand(); + } +#endif + return mask; +} + +static void mg_send_ws_header(struct mg_connection *nc, int op, size_t len, + struct ws_mask_ctx *ctx) { + int header_len; + unsigned char header[10]; + + header[0] = (op & WEBSOCKET_DONT_FIN ? 0x0 : 0x80) + (op & 0x0f); + if (len < 126) { + header[1] = (unsigned char) len; + header_len = 2; + } else if (len < 65535) { + uint16_t tmp = htons((uint16_t) len); + header[1] = 126; + memcpy(&header[2], &tmp, sizeof(tmp)); + header_len = 4; + } else { + uint32_t tmp; + header[1] = 127; + tmp = htonl((uint32_t)((uint64_t) len >> 32)); + memcpy(&header[2], &tmp, sizeof(tmp)); + tmp = htonl((uint32_t)(len & 0xffffffff)); + memcpy(&header[6], &tmp, sizeof(tmp)); + header_len = 10; + } + + /* client connections enable masking */ + if (nc->listener == NULL) { + header[1] |= 1 << 7; /* set masking flag */ + mg_send(nc, header, header_len); + ctx->mask = mg_ws_random_mask(); + mg_send(nc, &ctx->mask, sizeof(ctx->mask)); + ctx->pos = nc->send_mbuf.len; + } else { + mg_send(nc, header, header_len); + ctx->pos = 0; + } +} + +static void mg_ws_mask_frame(struct mbuf *mbuf, struct ws_mask_ctx *ctx) { + size_t i; + if (ctx->pos == 0) return; + for (i = 0; i < (mbuf->len - ctx->pos); i++) { + mbuf->buf[ctx->pos + i] ^= ((char *) &ctx->mask)[i % 4]; + } +} + +void mg_send_websocket_frame(struct mg_connection *nc, int op, const void *data, + size_t len) { + struct ws_mask_ctx ctx; + DBG(("%p %d %d", nc, op, (int) len)); + mg_send_ws_header(nc, op, len, &ctx); + mg_send(nc, data, len); + + mg_ws_mask_frame(&nc->send_mbuf, &ctx); + + if (op == WEBSOCKET_OP_CLOSE) { + nc->flags |= MG_F_SEND_AND_CLOSE; + } +} + +void mg_send_websocket_framev(struct mg_connection *nc, int op, + const struct mg_str *strv, int strvcnt) { + struct ws_mask_ctx ctx; + int i; + int len = 0; + for (i = 0; i < strvcnt; i++) { + len += strv[i].len; + } + + mg_send_ws_header(nc, op, len, &ctx); + + for (i = 0; i < strvcnt; i++) { + mg_send(nc, strv[i].p, strv[i].len); + } + + mg_ws_mask_frame(&nc->send_mbuf, &ctx); + + if (op == WEBSOCKET_OP_CLOSE) { + nc->flags |= MG_F_SEND_AND_CLOSE; + } +} + +void mg_printf_websocket_frame(struct mg_connection *nc, int op, + const char *fmt, ...) { + char mem[MG_VPRINTF_BUFFER_SIZE], *buf = mem; + va_list ap; + int len; + + va_start(ap, fmt); + if ((len = mg_avprintf(&buf, sizeof(mem), fmt, ap)) > 0) { + mg_send_websocket_frame(nc, op, buf, len); + } + va_end(ap); + + if (buf != mem && buf != NULL) { + MG_FREE(buf); + } +} + +MG_INTERNAL void mg_ws_handler(struct mg_connection *nc, int ev, + void *ev_data MG_UD_ARG(void *user_data)) { + mg_call(nc, nc->handler, nc->user_data, ev, ev_data); + + switch (ev) { + case MG_EV_RECV: + do { + } while (mg_deliver_websocket_data(nc)); + break; + case MG_EV_POLL: + /* Ping idle websocket connections */ + { + time_t now = *(time_t *) ev_data; + if (nc->flags & MG_F_IS_WEBSOCKET && + now > nc->last_io_time + MG_WEBSOCKET_PING_INTERVAL_SECONDS) { + mg_send_websocket_frame(nc, WEBSOCKET_OP_PING, "", 0); + } + } + break; + default: + break; + } +#if MG_ENABLE_CALLBACK_USERDATA + (void) user_data; +#endif +} + +#ifndef MG_EXT_SHA1 +void mg_hash_sha1_v(size_t num_msgs, const uint8_t *msgs[], + const size_t *msg_lens, uint8_t *digest) { + size_t i; + cs_sha1_ctx sha_ctx; + cs_sha1_init(&sha_ctx); + for (i = 0; i < num_msgs; i++) { + cs_sha1_update(&sha_ctx, msgs[i], msg_lens[i]); + } + cs_sha1_final(digest, &sha_ctx); +} +#else +extern void mg_hash_sha1_v(size_t num_msgs, const uint8_t *msgs[], + const size_t *msg_lens, uint8_t *digest); +#endif + +MG_INTERNAL void mg_ws_handshake(struct mg_connection *nc, + const struct mg_str *key, + struct http_message *hm) { + static const char *magic = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; + const uint8_t *msgs[2] = {(const uint8_t *) key->p, (const uint8_t *) magic}; + const size_t msg_lens[2] = {key->len, 36}; + unsigned char sha[20]; + char b64_sha[30]; + struct mg_str *s; + + mg_hash_sha1_v(2, msgs, msg_lens, sha); + mg_base64_encode(sha, sizeof(sha), b64_sha); + mg_printf(nc, "%s", + "HTTP/1.1 101 Switching Protocols\r\n" + "Upgrade: websocket\r\n" + "Connection: Upgrade\r\n"); + + s = mg_get_http_header(hm, "Sec-WebSocket-Protocol"); + if (s != NULL) { + mg_printf(nc, "Sec-WebSocket-Protocol: %.*s\r\n", (int) s->len, s->p); + } + mg_printf(nc, "Sec-WebSocket-Accept: %s%s", b64_sha, "\r\n\r\n"); + + DBG(("%p %.*s %s", nc, (int) key->len, key->p, b64_sha)); +} + +void mg_send_websocket_handshake2(struct mg_connection *nc, const char *path, + const char *host, const char *protocol, + const char *extra_headers) { + mg_send_websocket_handshake3(nc, path, host, protocol, extra_headers, NULL, + NULL); +} + +void mg_send_websocket_handshake3(struct mg_connection *nc, const char *path, + const char *host, const char *protocol, + const char *extra_headers, const char *user, + const char *pass) { + mg_send_websocket_handshake3v(nc, mg_mk_str(path), mg_mk_str(host), + mg_mk_str(protocol), mg_mk_str(extra_headers), + mg_mk_str(user), mg_mk_str(pass)); +} + +void mg_send_websocket_handshake3v(struct mg_connection *nc, + const struct mg_str path, + const struct mg_str host, + const struct mg_str protocol, + const struct mg_str extra_headers, + const struct mg_str user, + const struct mg_str pass) { + struct mbuf auth; + char key[25]; + uint32_t nonce[4]; + nonce[0] = mg_ws_random_mask(); + nonce[1] = mg_ws_random_mask(); + nonce[2] = mg_ws_random_mask(); + nonce[3] = mg_ws_random_mask(); + mg_base64_encode((unsigned char *) &nonce, sizeof(nonce), key); + + mbuf_init(&auth, 0); + if (user.len > 0) { + mg_basic_auth_header(user, pass, &auth); + } + + /* + * NOTE: the (auth.buf == NULL ? "" : auth.buf) is because cc3200 libc is + * broken: it doesn't like zero length to be passed to %.*s + * i.e. sprintf("f%.*so", (int)0, NULL), yields `f\0o`. + * because it handles NULL specially (and incorrectly). + */ + mg_printf(nc, + "GET %.*s HTTP/1.1\r\n" + "Upgrade: websocket\r\n" + "Connection: Upgrade\r\n" + "%.*s" + "Sec-WebSocket-Version: 13\r\n" + "Sec-WebSocket-Key: %s\r\n", + (int) path.len, path.p, (int) auth.len, + (auth.buf == NULL ? "" : auth.buf), key); + + /* TODO(mkm): take default hostname from http proto data if host == NULL */ + if (host.len > 0) { + int host_len = (int) (path.p - host.p); /* Account for possible :PORT */ + mg_printf(nc, "Host: %.*s\r\n", host_len, host.p); + } + if (protocol.len > 0) { + mg_printf(nc, "Sec-WebSocket-Protocol: %.*s\r\n", (int) protocol.len, + protocol.p); + } + if (extra_headers.len > 0) { + mg_printf(nc, "%.*s", (int) extra_headers.len, extra_headers.p); + } + mg_printf(nc, "\r\n"); + + mbuf_free(&auth); +} + +void mg_send_websocket_handshake(struct mg_connection *nc, const char *path, + const char *extra_headers) { + struct mg_str null_str = MG_NULL_STR; + mg_send_websocket_handshake3v( + nc, mg_mk_str(path), null_str /* host */, null_str /* protocol */, + mg_mk_str(extra_headers), null_str /* user */, null_str /* pass */); +} + +struct mg_connection *mg_connect_ws_opt( + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), + struct mg_connect_opts opts, const char *url, const char *protocol, + const char *extra_headers) { + struct mg_str null_str = MG_NULL_STR; + struct mg_str host = MG_NULL_STR, path = MG_NULL_STR, user_info = MG_NULL_STR; + struct mg_connection *nc = + mg_connect_http_base(mgr, MG_CB(ev_handler, user_data), opts, "http", + "ws", "https", "wss", url, &path, &user_info, &host); + if (nc != NULL) { + mg_send_websocket_handshake3v(nc, path, host, mg_mk_str(protocol), + mg_mk_str(extra_headers), user_info, + null_str); + } + return nc; +} + +struct mg_connection *mg_connect_ws( + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), + const char *url, const char *protocol, const char *extra_headers) { + struct mg_connect_opts opts; + memset(&opts, 0, sizeof(opts)); + return mg_connect_ws_opt(mgr, MG_CB(ev_handler, user_data), opts, url, + protocol, extra_headers); +} +#endif /* MG_ENABLE_HTTP && MG_ENABLE_HTTP_WEBSOCKET */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/util.c" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +/* Amalgamated: #include "common/base64.h" */ +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/util.h" */ + +/* For platforms with limited libc */ +#ifndef MAX +#define MAX(a, b) ((a) > (b) ? (a) : (b)) +#endif + +const char *mg_skip(const char *s, const char *end, const char *delims, + struct mg_str *v) { + v->p = s; + while (s < end && strchr(delims, *(unsigned char *) s) == NULL) s++; + v->len = s - v->p; + while (s < end && strchr(delims, *(unsigned char *) s) != NULL) s++; + return s; +} + +#if MG_ENABLE_FILESYSTEM && !defined(MG_USER_FILE_FUNCTIONS) +int mg_stat(const char *path, cs_stat_t *st) { +#ifdef _WIN32 + wchar_t wpath[MG_MAX_PATH]; + to_wchar(path, wpath, ARRAY_SIZE(wpath)); + DBG(("[%ls] -> %d", wpath, _wstati64(wpath, st))); + return _wstati64(wpath, st); +#else + return stat(path, st); +#endif +} + +FILE *mg_fopen(const char *path, const char *mode) { +#ifdef _WIN32 + wchar_t wpath[MG_MAX_PATH], wmode[10]; + to_wchar(path, wpath, ARRAY_SIZE(wpath)); + to_wchar(mode, wmode, ARRAY_SIZE(wmode)); + return _wfopen(wpath, wmode); +#else + return fopen(path, mode); +#endif +} + +int mg_open(const char *path, int flag, int mode) { /* LCOV_EXCL_LINE */ +#if defined(_WIN32) && !defined(WINCE) + wchar_t wpath[MG_MAX_PATH]; + to_wchar(path, wpath, ARRAY_SIZE(wpath)); + return _wopen(wpath, flag, mode); +#else + return open(path, flag, mode); /* LCOV_EXCL_LINE */ +#endif +} + +size_t mg_fread(void *ptr, size_t size, size_t count, FILE *f) { + return fread(ptr, size, count, f); +} + +size_t mg_fwrite(const void *ptr, size_t size, size_t count, FILE *f) { + return fwrite(ptr, size, count, f); +} +#endif + +void mg_base64_encode(const unsigned char *src, int src_len, char *dst) { + cs_base64_encode(src, src_len, dst); +} + +int mg_base64_decode(const unsigned char *s, int len, char *dst) { + return cs_base64_decode(s, len, dst, NULL); +} + +#if MG_ENABLE_THREADS +void *mg_start_thread(void *(*f)(void *), void *p) { +#ifdef WINCE + return (void *) CreateThread(NULL, 0, (LPTHREAD_START_ROUTINE) f, p, 0, NULL); +#elif defined(_WIN32) + return (void *) _beginthread((void(__cdecl *) (void *) ) f, 0, p); +#else + pthread_t thread_id = (pthread_t) 0; + pthread_attr_t attr; + + (void) pthread_attr_init(&attr); + (void) pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED); + +#if defined(MG_STACK_SIZE) && MG_STACK_SIZE > 1 + (void) pthread_attr_setstacksize(&attr, MG_STACK_SIZE); +#endif + + pthread_create(&thread_id, &attr, f, p); + pthread_attr_destroy(&attr); + + return (void *) thread_id; +#endif +} +#endif /* MG_ENABLE_THREADS */ + +/* Set close-on-exec bit for a given socket. */ +void mg_set_close_on_exec(sock_t sock) { +#if defined(_WIN32) && !defined(WINCE) + (void) SetHandleInformation((HANDLE) sock, HANDLE_FLAG_INHERIT, 0); +#elif defined(__unix__) + fcntl(sock, F_SETFD, FD_CLOEXEC); +#else + (void) sock; +#endif +} + +int mg_sock_addr_to_str(const union socket_address *sa, char *buf, size_t len, + int flags) { + int is_v6; + if (buf == NULL || len <= 0) return 0; + memset(buf, 0, len); +#if MG_ENABLE_IPV6 + is_v6 = sa->sa.sa_family == AF_INET6; +#else + is_v6 = 0; +#endif + if (flags & MG_SOCK_STRINGIFY_IP) { +#if MG_ENABLE_IPV6 + const void *addr = NULL; + char *start = buf; + socklen_t capacity = len; + if (!is_v6) { + addr = &sa->sin.sin_addr; + } else { + addr = (void *) &sa->sin6.sin6_addr; + if (flags & MG_SOCK_STRINGIFY_PORT) { + *buf = '['; + start++; + capacity--; + } + } + if (inet_ntop(sa->sa.sa_family, addr, start, capacity) == NULL) { + goto cleanup; + } +#elif defined(_WIN32) || MG_LWIP || (MG_NET_IF == MG_NET_IF_PIC32) + /* Only Windoze Vista (and newer) have inet_ntop() */ + char *addr_str = inet_ntoa(sa->sin.sin_addr); + if (addr_str != NULL) { + strncpy(buf, inet_ntoa(sa->sin.sin_addr), len - 1); + } else { + goto cleanup; + } +#else + if (inet_ntop(AF_INET, (void *) &sa->sin.sin_addr, buf, len - 1) == NULL) { + goto cleanup; + } +#endif + } + if (flags & MG_SOCK_STRINGIFY_PORT) { + int port = ntohs(sa->sin.sin_port); + if (flags & MG_SOCK_STRINGIFY_IP) { + int buf_len = strlen(buf); + snprintf(buf + buf_len, len - (buf_len + 1), "%s:%d", (is_v6 ? "]" : ""), + port); + } else { + snprintf(buf, len, "%d", port); + } + } + + return strlen(buf); + +cleanup: + *buf = '\0'; + return 0; +} + +int mg_conn_addr_to_str(struct mg_connection *nc, char *buf, size_t len, + int flags) { + union socket_address sa; + memset(&sa, 0, sizeof(sa)); + mg_if_get_conn_addr(nc, flags & MG_SOCK_STRINGIFY_REMOTE, &sa); + return mg_sock_addr_to_str(&sa, buf, len, flags); +} + +#if MG_ENABLE_HEXDUMP +static int mg_hexdump_n(const void *buf, int len, char *dst, int dst_len, + int offset) { + const unsigned char *p = (const unsigned char *) buf; + char ascii[17] = ""; + int i, idx, n = 0; + + for (i = 0; i < len; i++) { + idx = i % 16; + if (idx == 0) { + if (i > 0) n += snprintf(dst + n, MAX(dst_len - n, 0), " %s\n", ascii); + n += snprintf(dst + n, MAX(dst_len - n, 0), "%04x ", i + offset); + } + if (dst_len - n < 0) { + return n; + } + n += snprintf(dst + n, MAX(dst_len - n, 0), " %02x", p[i]); + ascii[idx] = p[i] < 0x20 || p[i] > 0x7e ? '.' : p[i]; + ascii[idx + 1] = '\0'; + } + + while (i++ % 16) n += snprintf(dst + n, MAX(dst_len - n, 0), "%s", " "); + n += snprintf(dst + n, MAX(dst_len - n, 0), " %s\n", ascii); + + return n; +} + +int mg_hexdump(const void *buf, int len, char *dst, int dst_len) { + return mg_hexdump_n(buf, len, dst, dst_len, 0); +} + +void mg_hexdumpf(FILE *fp, const void *buf, int len) { + char tmp[80]; + int offset = 0, n; + while (len > 0) { + n = (len < 16 ? len : 16); + mg_hexdump_n(((const char *) buf) + offset, n, tmp, sizeof(tmp), offset); + fputs(tmp, fp); + offset += n; + len -= n; + } +} + +void mg_hexdump_connection(struct mg_connection *nc, const char *path, + const void *buf, int num_bytes, int ev) { + FILE *fp = NULL; + char src[60], dst[60]; + const char *tag = NULL; + switch (ev) { + case MG_EV_RECV: + tag = "<-"; + break; + case MG_EV_SEND: + tag = "->"; + break; + case MG_EV_ACCEPT: + tag = "<A"; + break; + case MG_EV_CONNECT: + tag = "C>"; + break; + case MG_EV_CLOSE: + tag = "XX"; + break; + } + if (tag == NULL) return; /* Don't log MG_EV_TIMER, etc */ + + if (strcmp(path, "-") == 0) { + fp = stdout; + } else if (strcmp(path, "--") == 0) { + fp = stderr; +#if MG_ENABLE_FILESYSTEM + } else { + fp = mg_fopen(path, "a"); +#endif + } + if (fp == NULL) return; + + mg_conn_addr_to_str(nc, src, sizeof(src), + MG_SOCK_STRINGIFY_IP | MG_SOCK_STRINGIFY_PORT); + mg_conn_addr_to_str(nc, dst, sizeof(dst), MG_SOCK_STRINGIFY_IP | + MG_SOCK_STRINGIFY_PORT | + MG_SOCK_STRINGIFY_REMOTE); + fprintf(fp, "%lu %p %s %s %s %d\n", (unsigned long) mg_time(), (void *) nc, + src, tag, dst, (int) num_bytes); + if (num_bytes > 0) { + mg_hexdumpf(fp, buf, num_bytes); + } + if (fp != stdout && fp != stderr) fclose(fp); +} +#endif + +int mg_is_big_endian(void) { + static const int n = 1; + /* TODO(mkm) use compiletime check with 4-byte char literal */ + return ((char *) &n)[0] == 0; +} + +DO_NOT_WARN_UNUSED MG_INTERNAL int mg_get_errno(void) { +#ifndef WINCE + return errno; +#else + /* TODO(alashkin): translate error codes? */ + return GetLastError(); +#endif +} + +void mg_mbuf_append_base64_putc(char ch, void *user_data) { + struct mbuf *mbuf = (struct mbuf *) user_data; + mbuf_append(mbuf, &ch, sizeof(ch)); +} + +void mg_mbuf_append_base64(struct mbuf *mbuf, const void *data, size_t len) { + struct cs_base64_ctx ctx; + cs_base64_init(&ctx, mg_mbuf_append_base64_putc, mbuf); + cs_base64_update(&ctx, (const char *) data, len); + cs_base64_finish(&ctx); +} + +void mg_basic_auth_header(const struct mg_str user, const struct mg_str pass, + struct mbuf *buf) { + const char *header_prefix = "Authorization: Basic "; + const char *header_suffix = "\r\n"; + + struct cs_base64_ctx ctx; + cs_base64_init(&ctx, mg_mbuf_append_base64_putc, buf); + + mbuf_append(buf, header_prefix, strlen(header_prefix)); + + cs_base64_update(&ctx, user.p, user.len); + if (pass.len > 0) { + cs_base64_update(&ctx, ":", 1); + cs_base64_update(&ctx, pass.p, pass.len); + } + cs_base64_finish(&ctx); + mbuf_append(buf, header_suffix, strlen(header_suffix)); +} + +struct mg_str mg_url_encode(const struct mg_str src) { + static const char *dont_escape = "._-$,;~()/"; + static const char *hex = "0123456789abcdef"; + size_t i = 0; + struct mbuf mb; + mbuf_init(&mb, src.len); + + for (i = 0; i < src.len; i++) { + const unsigned char c = *((const unsigned char *) src.p + i); + if (isalnum(c) || strchr(dont_escape, c) != NULL) { + mbuf_append(&mb, &c, 1); + } else { + mbuf_append(&mb, "%", 1); + mbuf_append(&mb, &hex[c >> 4], 1); + mbuf_append(&mb, &hex[c & 15], 1); + } + } + mbuf_append(&mb, "", 1); + mbuf_trim(&mb); + return mg_mk_str_n(mb.buf, mb.len - 1); +} +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/mqtt.c" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_MQTT + +#include <string.h> + +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/mqtt.h" */ + +static uint16_t getu16(const char *p) { + const uint8_t *up = (const uint8_t *) p; + return (up[0] << 8) + up[1]; +} + +static const char *scanto(const char *p, struct mg_str *s) { + s->len = getu16(p); + s->p = p + 2; + return s->p + s->len; +} + +MG_INTERNAL int parse_mqtt(struct mbuf *io, struct mg_mqtt_message *mm) { + uint8_t header; + size_t len = 0, len_len = 0; + const char *p, *end; + unsigned char lc = 0; + int cmd; + + if (io->len < 2) return -1; + header = io->buf[0]; + cmd = header >> 4; + + /* decode mqtt variable length */ + len = len_len = 0; + p = io->buf + 1; + while ((size_t)(p - io->buf) < io->len) { + lc = *((const unsigned char *) p++); + len += (lc & 0x7f) << 7 * len_len; + len_len++; + if (!(lc & 0x80)) break; + if (len_len > 4) return -2; + } + + end = p + len; + if (lc & 0x80 || len > (io->len - (p - io->buf))) { + return -1; + } + + mm->cmd = cmd; + mm->qos = MG_MQTT_GET_QOS(header); + + switch (cmd) { + case MG_MQTT_CMD_CONNECT: { + p = scanto(p, &mm->protocol_name); + if (p > end - 4) return -2; + mm->protocol_version = *(uint8_t *) p++; + mm->connect_flags = *(uint8_t *) p++; + mm->keep_alive_timer = getu16(p); + p += 2; + if (p >= end) return -2; + p = scanto(p, &mm->client_id); + if (p > end) return -2; + if (mm->connect_flags & MG_MQTT_HAS_WILL) { + if (p >= end) return -2; + p = scanto(p, &mm->will_topic); + } + if (mm->connect_flags & MG_MQTT_HAS_WILL) { + if (p >= end) return -2; + p = scanto(p, &mm->will_message); + } + if (mm->connect_flags & MG_MQTT_HAS_USER_NAME) { + if (p >= end) return -2; + p = scanto(p, &mm->user_name); + } + if (mm->connect_flags & MG_MQTT_HAS_PASSWORD) { + if (p >= end) return -2; + p = scanto(p, &mm->password); + } + if (p != end) return -2; + + LOG(LL_DEBUG, + ("%d %2x %d proto [%.*s] client_id [%.*s] will_topic [%.*s] " + "will_msg [%.*s] user_name [%.*s] password [%.*s]", + (int) len, (int) mm->connect_flags, (int) mm->keep_alive_timer, + (int) mm->protocol_name.len, mm->protocol_name.p, + (int) mm->client_id.len, mm->client_id.p, (int) mm->will_topic.len, + mm->will_topic.p, (int) mm->will_message.len, mm->will_message.p, + (int) mm->user_name.len, mm->user_name.p, (int) mm->password.len, + mm->password.p)); + break; + } + case MG_MQTT_CMD_CONNACK: + if (end - p < 2) return -2; + mm->connack_ret_code = p[1]; + break; + case MG_MQTT_CMD_PUBACK: + case MG_MQTT_CMD_PUBREC: + case MG_MQTT_CMD_PUBREL: + case MG_MQTT_CMD_PUBCOMP: + case MG_MQTT_CMD_SUBACK: + mm->message_id = getu16(p); + break; + case MG_MQTT_CMD_PUBLISH: { + p = scanto(p, &mm->topic); + if (p > end) return -2; + if (mm->qos > 0) { + if (end - p < 2) return -2; + mm->message_id = getu16(p); + p += 2; + } + mm->payload.p = p; + mm->payload.len = end - p; + break; + } + case MG_MQTT_CMD_SUBSCRIBE: + if (end - p < 2) return -2; + mm->message_id = getu16(p); + p += 2; + /* + * topic expressions are left in the payload and can be parsed with + * `mg_mqtt_next_subscribe_topic` + */ + mm->payload.p = p; + mm->payload.len = end - p; + break; + default: + /* Unhandled command */ + break; + } + + mm->len = end - io->buf; + return mm->len; +} + +static void mqtt_handler(struct mg_connection *nc, int ev, + void *ev_data MG_UD_ARG(void *user_data)) { + struct mbuf *io = &nc->recv_mbuf; + struct mg_mqtt_message mm; + memset(&mm, 0, sizeof(mm)); + + nc->handler(nc, ev, ev_data MG_UD_ARG(user_data)); + + switch (ev) { + case MG_EV_ACCEPT: + if (nc->proto_data == NULL) mg_set_protocol_mqtt(nc); + break; + case MG_EV_RECV: { + /* There can be multiple messages in the buffer, process them all. */ + while (1) { + int len = parse_mqtt(io, &mm); + if (len < 0) { + if (len == -1) break; /* not fully buffered */ + /* Protocol error. */ + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + break; + } + nc->handler(nc, MG_MQTT_EVENT_BASE + mm.cmd, &mm MG_UD_ARG(user_data)); + mbuf_remove(io, len); + } + break; + } + case MG_EV_POLL: { + struct mg_mqtt_proto_data *pd = + (struct mg_mqtt_proto_data *) nc->proto_data; + double now = mg_time(); + if (pd->keep_alive > 0 && pd->last_control_time > 0 && + (now - pd->last_control_time) > pd->keep_alive) { + LOG(LL_DEBUG, ("Send PINGREQ")); + mg_mqtt_ping(nc); + } + break; + } + } +} + +static void mg_mqtt_proto_data_destructor(void *proto_data) { + MG_FREE(proto_data); +} + +int mg_mqtt_match_topic_expression(struct mg_str exp, struct mg_str topic) { + /* TODO(mkm): implement real matching */ + if (memchr(exp.p, '#', exp.len)) { + /* exp `foo/#` will become `foo/` */ + exp.len -= 1; + /* + * topic should be longer than the expression: e.g. topic `foo/bar` does + * match `foo/#`, but neither `foo` nor `foo/` do. + */ + if (topic.len <= exp.len) { + return 0; + } + + /* Truncate topic so that it'll pass the next length check */ + topic.len = exp.len; + } + if (topic.len != exp.len) { + return 0; + } + return strncmp(topic.p, exp.p, exp.len) == 0; +} + +int mg_mqtt_vmatch_topic_expression(const char *exp, struct mg_str topic) { + return mg_mqtt_match_topic_expression(mg_mk_str(exp), topic); +} + +void mg_set_protocol_mqtt(struct mg_connection *nc) { + nc->proto_handler = mqtt_handler; + nc->proto_data = MG_CALLOC(1, sizeof(struct mg_mqtt_proto_data)); + nc->proto_data_destructor = mg_mqtt_proto_data_destructor; +} + +static void mg_mqtt_prepend_header(struct mg_connection *nc, uint8_t cmd, + uint8_t flags, size_t len) { + struct mg_mqtt_proto_data *pd = (struct mg_mqtt_proto_data *) nc->proto_data; + size_t off = nc->send_mbuf.len - len; + uint8_t header = cmd << 4 | (uint8_t) flags; + + uint8_t buf[1 + sizeof(size_t)]; + uint8_t *vlen = &buf[1]; + + assert(nc->send_mbuf.len >= len); + + buf[0] = header; + + /* mqtt variable length encoding */ + do { + *vlen = len % 0x80; + len /= 0x80; + if (len > 0) *vlen |= 0x80; + vlen++; + } while (len > 0); + + mbuf_insert(&nc->send_mbuf, off, buf, vlen - buf); + pd->last_control_time = mg_time(); +} + +void mg_send_mqtt_handshake(struct mg_connection *nc, const char *client_id) { + static struct mg_send_mqtt_handshake_opts opts; + mg_send_mqtt_handshake_opt(nc, client_id, opts); +} + +void mg_send_mqtt_handshake_opt(struct mg_connection *nc, const char *client_id, + struct mg_send_mqtt_handshake_opts opts) { + uint16_t hlen, nlen, rem_len = 0; + struct mg_mqtt_proto_data *pd = (struct mg_mqtt_proto_data *) nc->proto_data; + + mg_send(nc, "\00\04MQTT\04", 7); + rem_len += 7; + + if (opts.user_name != NULL) { + opts.flags |= MG_MQTT_HAS_USER_NAME; + } + if (opts.password != NULL) { + opts.flags |= MG_MQTT_HAS_PASSWORD; + } + if (opts.will_topic != NULL && opts.will_message != NULL) { + opts.flags |= MG_MQTT_HAS_WILL; + } + if (opts.keep_alive == 0) { + opts.keep_alive = 60; + } + + mg_send(nc, &opts.flags, 1); + rem_len += 1; + + nlen = htons(opts.keep_alive); + mg_send(nc, &nlen, 2); + rem_len += 2; + + hlen = strlen(client_id); + nlen = htons((uint16_t) hlen); + mg_send(nc, &nlen, 2); + mg_send(nc, client_id, hlen); + rem_len += 2 + hlen; + + if (opts.flags & MG_MQTT_HAS_WILL) { + hlen = strlen(opts.will_topic); + nlen = htons((uint16_t) hlen); + mg_send(nc, &nlen, 2); + mg_send(nc, opts.will_topic, hlen); + rem_len += 2 + hlen; + + hlen = strlen(opts.will_message); + nlen = htons((uint16_t) hlen); + mg_send(nc, &nlen, 2); + mg_send(nc, opts.will_message, hlen); + rem_len += 2 + hlen; + } + + if (opts.flags & MG_MQTT_HAS_USER_NAME) { + hlen = strlen(opts.user_name); + nlen = htons((uint16_t) hlen); + mg_send(nc, &nlen, 2); + mg_send(nc, opts.user_name, hlen); + rem_len += 2 + hlen; + } + if (opts.flags & MG_MQTT_HAS_PASSWORD) { + hlen = strlen(opts.password); + nlen = htons((uint16_t) hlen); + mg_send(nc, &nlen, 2); + mg_send(nc, opts.password, hlen); + rem_len += 2 + hlen; + } + + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_CONNECT, 0, rem_len); + + if (pd != NULL) { + pd->keep_alive = opts.keep_alive; + } +} + +void mg_mqtt_publish(struct mg_connection *nc, const char *topic, + uint16_t message_id, int flags, const void *data, + size_t len) { + size_t old_len = nc->send_mbuf.len; + + uint16_t topic_len = htons((uint16_t) strlen(topic)); + uint16_t message_id_net = htons(message_id); + + mg_send(nc, &topic_len, 2); + mg_send(nc, topic, strlen(topic)); + if (MG_MQTT_GET_QOS(flags) > 0) { + mg_send(nc, &message_id_net, 2); + } + mg_send(nc, data, len); + + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_PUBLISH, flags, + nc->send_mbuf.len - old_len); +} + +void mg_mqtt_subscribe(struct mg_connection *nc, + const struct mg_mqtt_topic_expression *topics, + size_t topics_len, uint16_t message_id) { + size_t old_len = nc->send_mbuf.len; + + uint16_t message_id_n = htons(message_id); + size_t i; + + mg_send(nc, (char *) &message_id_n, 2); + for (i = 0; i < topics_len; i++) { + uint16_t topic_len_n = htons((uint16_t) strlen(topics[i].topic)); + mg_send(nc, &topic_len_n, 2); + mg_send(nc, topics[i].topic, strlen(topics[i].topic)); + mg_send(nc, &topics[i].qos, 1); + } + + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_SUBSCRIBE, MG_MQTT_QOS(1), + nc->send_mbuf.len - old_len); +} + +int mg_mqtt_next_subscribe_topic(struct mg_mqtt_message *msg, + struct mg_str *topic, uint8_t *qos, int pos) { + unsigned char *buf = (unsigned char *) msg->payload.p + pos; + int new_pos; + + if ((size_t) pos >= msg->payload.len) return -1; + + topic->len = buf[0] << 8 | buf[1]; + topic->p = (char *) buf + 2; + new_pos = pos + 2 + topic->len + 1; + if ((size_t) new_pos > msg->payload.len) return -1; + *qos = buf[2 + topic->len]; + return new_pos; +} + +void mg_mqtt_unsubscribe(struct mg_connection *nc, char **topics, + size_t topics_len, uint16_t message_id) { + size_t old_len = nc->send_mbuf.len; + + uint16_t message_id_n = htons(message_id); + size_t i; + + mg_send(nc, (char *) &message_id_n, 2); + for (i = 0; i < topics_len; i++) { + uint16_t topic_len_n = htons((uint16_t) strlen(topics[i])); + mg_send(nc, &topic_len_n, 2); + mg_send(nc, topics[i], strlen(topics[i])); + } + + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_UNSUBSCRIBE, MG_MQTT_QOS(1), + nc->send_mbuf.len - old_len); +} + +void mg_mqtt_connack(struct mg_connection *nc, uint8_t return_code) { + uint8_t unused = 0; + mg_send(nc, &unused, 1); + mg_send(nc, &return_code, 1); + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_CONNACK, 0, 2); +} + +/* + * Sends a command which contains only a `message_id` and a QoS level of 1. + * + * Helper function. + */ +static void mg_send_mqtt_short_command(struct mg_connection *nc, uint8_t cmd, + uint16_t message_id) { + uint16_t message_id_net = htons(message_id); + uint8_t flags = (cmd == MG_MQTT_CMD_PUBREL ? 2 : 0); + mg_send(nc, &message_id_net, 2); + mg_mqtt_prepend_header(nc, cmd, flags, 2 /* len */); +} + +void mg_mqtt_puback(struct mg_connection *nc, uint16_t message_id) { + mg_send_mqtt_short_command(nc, MG_MQTT_CMD_PUBACK, message_id); +} + +void mg_mqtt_pubrec(struct mg_connection *nc, uint16_t message_id) { + mg_send_mqtt_short_command(nc, MG_MQTT_CMD_PUBREC, message_id); +} + +void mg_mqtt_pubrel(struct mg_connection *nc, uint16_t message_id) { + mg_send_mqtt_short_command(nc, MG_MQTT_CMD_PUBREL, message_id); +} + +void mg_mqtt_pubcomp(struct mg_connection *nc, uint16_t message_id) { + mg_send_mqtt_short_command(nc, MG_MQTT_CMD_PUBCOMP, message_id); +} + +void mg_mqtt_suback(struct mg_connection *nc, uint8_t *qoss, size_t qoss_len, + uint16_t message_id) { + size_t i; + uint16_t message_id_net = htons(message_id); + mg_send(nc, &message_id_net, 2); + for (i = 0; i < qoss_len; i++) { + mg_send(nc, &qoss[i], 1); + } + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_SUBACK, MG_MQTT_QOS(1), 2 + qoss_len); +} + +void mg_mqtt_unsuback(struct mg_connection *nc, uint16_t message_id) { + mg_send_mqtt_short_command(nc, MG_MQTT_CMD_UNSUBACK, message_id); +} + +void mg_mqtt_ping(struct mg_connection *nc) { + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_PINGREQ, 0, 0); +} + +void mg_mqtt_pong(struct mg_connection *nc) { + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_PINGRESP, 0, 0); +} + +void mg_mqtt_disconnect(struct mg_connection *nc) { + mg_mqtt_prepend_header(nc, MG_MQTT_CMD_DISCONNECT, 0, 0); +} + +#endif /* MG_ENABLE_MQTT */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/mqtt_server.c" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/mqtt-server.h" */ + +#if MG_ENABLE_MQTT_BROKER + +static void mg_mqtt_session_init(struct mg_mqtt_broker *brk, + struct mg_mqtt_session *s, + struct mg_connection *nc) { + s->brk = brk; + s->subscriptions = NULL; + s->num_subscriptions = 0; + s->nc = nc; +} + +static void mg_mqtt_add_session(struct mg_mqtt_session *s) { + LIST_INSERT_HEAD(&s->brk->sessions, s, link); +} + +static void mg_mqtt_remove_session(struct mg_mqtt_session *s) { + LIST_REMOVE(s, link); +} + +static void mg_mqtt_destroy_session(struct mg_mqtt_session *s) { + size_t i; + for (i = 0; i < s->num_subscriptions; i++) { + MG_FREE((void *) s->subscriptions[i].topic); + } + MG_FREE(s->subscriptions); + MG_FREE(s); +} + +static void mg_mqtt_close_session(struct mg_mqtt_session *s) { + mg_mqtt_remove_session(s); + mg_mqtt_destroy_session(s); +} + +void mg_mqtt_broker_init(struct mg_mqtt_broker *brk, void *user_data) { + LIST_INIT(&brk->sessions); + brk->user_data = user_data; +} + +static void mg_mqtt_broker_handle_connect(struct mg_mqtt_broker *brk, + struct mg_connection *nc) { + struct mg_mqtt_session *s = + (struct mg_mqtt_session *) MG_CALLOC(1, sizeof *s); + if (s == NULL) { + /* LCOV_EXCL_START */ + mg_mqtt_connack(nc, MG_EV_MQTT_CONNACK_SERVER_UNAVAILABLE); + return; + /* LCOV_EXCL_STOP */ + } + + /* TODO(mkm): check header (magic and version) */ + + mg_mqtt_session_init(brk, s, nc); + s->user_data = nc->user_data; + nc->user_data = s; + mg_mqtt_add_session(s); + + mg_mqtt_connack(nc, MG_EV_MQTT_CONNACK_ACCEPTED); +} + +static void mg_mqtt_broker_handle_subscribe(struct mg_connection *nc, + struct mg_mqtt_message *msg) { + struct mg_mqtt_session *ss = (struct mg_mqtt_session *) nc->user_data; + uint8_t qoss[MG_MQTT_MAX_SESSION_SUBSCRIPTIONS]; + size_t num_subs = 0; + struct mg_str topic; + uint8_t qos; + int pos; + struct mg_mqtt_topic_expression *te; + + for (pos = 0; + (pos = mg_mqtt_next_subscribe_topic(msg, &topic, &qos, pos)) != -1;) { + if (num_subs >= sizeof(MG_MQTT_MAX_SESSION_SUBSCRIPTIONS) || + (ss->num_subscriptions + num_subs >= + MG_MQTT_MAX_SESSION_SUBSCRIPTIONS)) { + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + return; + } + qoss[num_subs++] = qos; + } + + if (num_subs > 0) { + te = (struct mg_mqtt_topic_expression *) MG_REALLOC( + ss->subscriptions, + sizeof(*ss->subscriptions) * (ss->num_subscriptions + num_subs)); + if (te == NULL) { + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + return; + } + ss->subscriptions = te; + for (pos = 0; + pos < (int) msg->payload.len && + (pos = mg_mqtt_next_subscribe_topic(msg, &topic, &qos, pos)) != -1; + ss->num_subscriptions++) { + te = &ss->subscriptions[ss->num_subscriptions]; + te->topic = (char *) MG_MALLOC(topic.len + 1); + te->qos = qos; + memcpy((char *) te->topic, topic.p, topic.len); + ((char *) te->topic)[topic.len] = '\0'; + } + } + + if (pos == (int) msg->payload.len) { + mg_mqtt_suback(nc, qoss, num_subs, msg->message_id); + } else { + /* We did not fully parse the payload, something must be wrong. */ + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + } +} + +static void mg_mqtt_broker_handle_publish(struct mg_mqtt_broker *brk, + struct mg_mqtt_message *msg) { + struct mg_mqtt_session *s; + size_t i; + + for (s = mg_mqtt_next(brk, NULL); s != NULL; s = mg_mqtt_next(brk, s)) { + for (i = 0; i < s->num_subscriptions; i++) { + if (mg_mqtt_vmatch_topic_expression(s->subscriptions[i].topic, + msg->topic)) { + char buf[100], *p = buf; + mg_asprintf(&p, sizeof(buf), "%.*s", (int) msg->topic.len, + msg->topic.p); + if (p == NULL) { + return; + } + mg_mqtt_publish(s->nc, p, 0, 0, msg->payload.p, msg->payload.len); + if (p != buf) { + MG_FREE(p); + } + break; + } + } + } +} + +void mg_mqtt_broker(struct mg_connection *nc, int ev, void *data) { + struct mg_mqtt_message *msg = (struct mg_mqtt_message *) data; + struct mg_mqtt_broker *brk; + + if (nc->listener) { + brk = (struct mg_mqtt_broker *) nc->listener->user_data; + } else { + brk = (struct mg_mqtt_broker *) nc->user_data; + } + + switch (ev) { + case MG_EV_ACCEPT: + if (nc->proto_data == NULL) mg_set_protocol_mqtt(nc); + nc->user_data = NULL; /* Clear up the inherited pointer to broker */ + break; + case MG_EV_MQTT_CONNECT: + if (nc->user_data == NULL) { + mg_mqtt_broker_handle_connect(brk, nc); + } else { + /* Repeated CONNECT */ + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + } + break; + case MG_EV_MQTT_SUBSCRIBE: + if (nc->user_data != NULL) { + mg_mqtt_broker_handle_subscribe(nc, msg); + } else { + /* Subscribe before CONNECT */ + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + } + break; + case MG_EV_MQTT_PUBLISH: + if (nc->user_data != NULL) { + mg_mqtt_broker_handle_publish(brk, msg); + } else { + /* Publish before CONNECT */ + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + } + break; + case MG_EV_CLOSE: + if (nc->listener && nc->user_data != NULL) { + mg_mqtt_close_session((struct mg_mqtt_session *) nc->user_data); + } + break; + } +} + +struct mg_mqtt_session *mg_mqtt_next(struct mg_mqtt_broker *brk, + struct mg_mqtt_session *s) { + return s == NULL ? LIST_FIRST(&brk->sessions) : LIST_NEXT(s, link); +} + +#endif /* MG_ENABLE_MQTT_BROKER */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/dns.c" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_DNS + +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/dns.h" */ + +static int mg_dns_tid = 0xa0; + +struct mg_dns_header { + uint16_t transaction_id; + uint16_t flags; + uint16_t num_questions; + uint16_t num_answers; + uint16_t num_authority_prs; + uint16_t num_other_prs; +}; + +struct mg_dns_resource_record *mg_dns_next_record( + struct mg_dns_message *msg, int query, + struct mg_dns_resource_record *prev) { + struct mg_dns_resource_record *rr; + + for (rr = (prev == NULL ? msg->answers : prev + 1); + rr - msg->answers < msg->num_answers; rr++) { + if (rr->rtype == query) { + return rr; + } + } + return NULL; +} + +int mg_dns_parse_record_data(struct mg_dns_message *msg, + struct mg_dns_resource_record *rr, void *data, + size_t data_len) { + switch (rr->rtype) { + case MG_DNS_A_RECORD: + if (data_len < sizeof(struct in_addr)) { + return -1; + } + if (rr->rdata.p + data_len > msg->pkt.p + msg->pkt.len) { + return -1; + } + memcpy(data, rr->rdata.p, data_len); + return 0; +#if MG_ENABLE_IPV6 + case MG_DNS_AAAA_RECORD: + if (data_len < sizeof(struct in6_addr)) { + return -1; /* LCOV_EXCL_LINE */ + } + memcpy(data, rr->rdata.p, data_len); + return 0; +#endif + case MG_DNS_CNAME_RECORD: + mg_dns_uncompress_name(msg, &rr->rdata, (char *) data, data_len); + return 0; + } + + return -1; +} + +int mg_dns_insert_header(struct mbuf *io, size_t pos, + struct mg_dns_message *msg) { + struct mg_dns_header header; + + memset(&header, 0, sizeof(header)); + header.transaction_id = msg->transaction_id; + header.flags = htons(msg->flags); + header.num_questions = htons(msg->num_questions); + header.num_answers = htons(msg->num_answers); + + return mbuf_insert(io, pos, &header, sizeof(header)); +} + +int mg_dns_copy_questions(struct mbuf *io, struct mg_dns_message *msg) { + unsigned char *begin, *end; + struct mg_dns_resource_record *last_q; + if (msg->num_questions <= 0) return 0; + begin = (unsigned char *) msg->pkt.p + sizeof(struct mg_dns_header); + last_q = &msg->questions[msg->num_questions - 1]; + end = (unsigned char *) last_q->name.p + last_q->name.len + 4; + return mbuf_append(io, begin, end - begin); +} + +int mg_dns_encode_name(struct mbuf *io, const char *name, size_t len) { + const char *s; + unsigned char n; + size_t pos = io->len; + + do { + if ((s = strchr(name, '.')) == NULL) { + s = name + len; + } + + if (s - name > 127) { + return -1; /* TODO(mkm) cover */ + } + n = s - name; /* chunk length */ + mbuf_append(io, &n, 1); /* send length */ + mbuf_append(io, name, n); + + if (*s == '.') { + n++; + } + + name += n; + len -= n; + } while (*s != '\0'); + mbuf_append(io, "\0", 1); /* Mark end of host name */ + + return io->len - pos; +} + +int mg_dns_encode_record(struct mbuf *io, struct mg_dns_resource_record *rr, + const char *name, size_t nlen, const void *rdata, + size_t rlen) { + size_t pos = io->len; + uint16_t u16; + uint32_t u32; + + if (rr->kind == MG_DNS_INVALID_RECORD) { + return -1; /* LCOV_EXCL_LINE */ + } + + if (mg_dns_encode_name(io, name, nlen) == -1) { + return -1; + } + + u16 = htons(rr->rtype); + mbuf_append(io, &u16, 2); + u16 = htons(rr->rclass); + mbuf_append(io, &u16, 2); + + if (rr->kind == MG_DNS_ANSWER) { + u32 = htonl(rr->ttl); + mbuf_append(io, &u32, 4); + + if (rr->rtype == MG_DNS_CNAME_RECORD) { + int clen; + /* fill size after encoding */ + size_t off = io->len; + mbuf_append(io, &u16, 2); + if ((clen = mg_dns_encode_name(io, (const char *) rdata, rlen)) == -1) { + return -1; + } + u16 = clen; + io->buf[off] = u16 >> 8; + io->buf[off + 1] = u16 & 0xff; + } else { + u16 = htons((uint16_t) rlen); + mbuf_append(io, &u16, 2); + mbuf_append(io, rdata, rlen); + } + } + + return io->len - pos; +} + +void mg_send_dns_query(struct mg_connection *nc, const char *name, + int query_type) { + struct mg_dns_message *msg = + (struct mg_dns_message *) MG_CALLOC(1, sizeof(*msg)); + struct mbuf pkt; + struct mg_dns_resource_record *rr = &msg->questions[0]; + + DBG(("%s %d", name, query_type)); + + mbuf_init(&pkt, 64 /* Start small, it'll grow as needed. */); + + msg->transaction_id = ++mg_dns_tid; + msg->flags = 0x100; + msg->num_questions = 1; + + mg_dns_insert_header(&pkt, 0, msg); + + rr->rtype = query_type; + rr->rclass = 1; /* Class: inet */ + rr->kind = MG_DNS_QUESTION; + + if (mg_dns_encode_record(&pkt, rr, name, strlen(name), NULL, 0) == -1) { + /* TODO(mkm): return an error code */ + goto cleanup; /* LCOV_EXCL_LINE */ + } + + /* TCP DNS requires messages to be prefixed with len */ + if (!(nc->flags & MG_F_UDP)) { + uint16_t len = htons((uint16_t) pkt.len); + mbuf_insert(&pkt, 0, &len, 2); + } + + mg_send(nc, pkt.buf, pkt.len); + mbuf_free(&pkt); + +cleanup: + MG_FREE(msg); +} + +static unsigned char *mg_parse_dns_resource_record( + unsigned char *data, unsigned char *end, struct mg_dns_resource_record *rr, + int reply) { + unsigned char *name = data; + int chunk_len, data_len; + + while (data < end && (chunk_len = *data)) { + if (((unsigned char *) data)[0] & 0xc0) { + data += 1; + break; + } + data += chunk_len + 1; + } + + if (data > end - 5) { + return NULL; + } + + rr->name.p = (char *) name; + rr->name.len = data - name + 1; + data++; + + rr->rtype = data[0] << 8 | data[1]; + data += 2; + + rr->rclass = data[0] << 8 | data[1]; + data += 2; + + rr->kind = reply ? MG_DNS_ANSWER : MG_DNS_QUESTION; + if (reply) { + if (data >= end - 6) { + return NULL; + } + + rr->ttl = (uint32_t) data[0] << 24 | (uint32_t) data[1] << 16 | + data[2] << 8 | data[3]; + data += 4; + + data_len = *data << 8 | *(data + 1); + data += 2; + + rr->rdata.p = (char *) data; + rr->rdata.len = data_len; + data += data_len; + } + return data; +} + +int mg_parse_dns(const char *buf, int len, struct mg_dns_message *msg) { + struct mg_dns_header *header = (struct mg_dns_header *) buf; + unsigned char *data = (unsigned char *) buf + sizeof(*header); + unsigned char *end = (unsigned char *) buf + len; + int i; + + memset(msg, 0, sizeof(*msg)); + msg->pkt.p = buf; + msg->pkt.len = len; + + if (len < (int) sizeof(*header)) return -1; + + msg->transaction_id = header->transaction_id; + msg->flags = ntohs(header->flags); + msg->num_questions = ntohs(header->num_questions); + if (msg->num_questions > (int) ARRAY_SIZE(msg->questions)) { + msg->num_questions = (int) ARRAY_SIZE(msg->questions); + } + msg->num_answers = ntohs(header->num_answers); + if (msg->num_answers > (int) ARRAY_SIZE(msg->answers)) { + msg->num_answers = (int) ARRAY_SIZE(msg->answers); + } + + for (i = 0; i < msg->num_questions; i++) { + data = mg_parse_dns_resource_record(data, end, &msg->questions[i], 0); + if (data == NULL) return -1; + } + + for (i = 0; i < msg->num_answers; i++) { + data = mg_parse_dns_resource_record(data, end, &msg->answers[i], 1); + if (data == NULL) return -1; + } + + return 0; +} + +size_t mg_dns_uncompress_name(struct mg_dns_message *msg, struct mg_str *name, + char *dst, int dst_len) { + int chunk_len, num_ptrs = 0; + char *old_dst = dst; + const unsigned char *data = (unsigned char *) name->p; + const unsigned char *end = (unsigned char *) msg->pkt.p + msg->pkt.len; + + if (data >= end) { + return 0; + } + + while ((chunk_len = *data++)) { + int leeway = dst_len - (dst - old_dst); + if (data >= end) { + return 0; + } + + if ((chunk_len & 0xc0) == 0xc0) { + uint16_t off = (data[-1] & (~0xc0)) << 8 | data[0]; + if (off >= msg->pkt.len) { + return 0; + } + /* Basic circular loop avoidance: allow up to 16 pointer hops. */ + if (++num_ptrs > 15) { + return 0; + } + data = (unsigned char *) msg->pkt.p + off; + continue; + } + if (chunk_len > 63) { + return 0; + } + if (chunk_len > leeway) { + chunk_len = leeway; + } + + if (data + chunk_len >= end) { + return 0; + } + + memcpy(dst, data, chunk_len); + data += chunk_len; + dst += chunk_len; + leeway -= chunk_len; + if (leeway == 0) { + return dst - old_dst; + } + *dst++ = '.'; + } + + if (dst != old_dst) { + *--dst = 0; + } + return dst - old_dst; +} + +static void dns_handler(struct mg_connection *nc, int ev, + void *ev_data MG_UD_ARG(void *user_data)) { + struct mbuf *io = &nc->recv_mbuf; + struct mg_dns_message msg; + + /* Pass low-level events to the user handler */ + nc->handler(nc, ev, ev_data MG_UD_ARG(user_data)); + + switch (ev) { + case MG_EV_RECV: + if (!(nc->flags & MG_F_UDP)) { + mbuf_remove(&nc->recv_mbuf, 2); + } + if (mg_parse_dns(nc->recv_mbuf.buf, nc->recv_mbuf.len, &msg) == -1) { + /* reply + recursion allowed + format error */ + memset(&msg, 0, sizeof(msg)); + msg.flags = 0x8081; + mg_dns_insert_header(io, 0, &msg); + if (!(nc->flags & MG_F_UDP)) { + uint16_t len = htons((uint16_t) io->len); + mbuf_insert(io, 0, &len, 2); + } + mg_send(nc, io->buf, io->len); + } else { + /* Call user handler with parsed message */ + nc->handler(nc, MG_DNS_MESSAGE, &msg MG_UD_ARG(user_data)); + } + mbuf_remove(io, io->len); + break; + } +} + +void mg_set_protocol_dns(struct mg_connection *nc) { + nc->proto_handler = dns_handler; +} + +#endif /* MG_ENABLE_DNS */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/dns_server.c" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_DNS_SERVER + +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/dns-server.h" */ + +struct mg_dns_reply mg_dns_create_reply(struct mbuf *io, + struct mg_dns_message *msg) { + struct mg_dns_reply rep; + rep.msg = msg; + rep.io = io; + rep.start = io->len; + + /* reply + recursion allowed */ + msg->flags |= 0x8080; + mg_dns_copy_questions(io, msg); + + msg->num_answers = 0; + return rep; +} + +void mg_dns_send_reply(struct mg_connection *nc, struct mg_dns_reply *r) { + size_t sent = r->io->len - r->start; + mg_dns_insert_header(r->io, r->start, r->msg); + if (!(nc->flags & MG_F_UDP)) { + uint16_t len = htons((uint16_t) sent); + mbuf_insert(r->io, r->start, &len, 2); + } + + if (&nc->send_mbuf != r->io) { + mg_send(nc, r->io->buf + r->start, r->io->len - r->start); + r->io->len = r->start; + } +} + +int mg_dns_reply_record(struct mg_dns_reply *reply, + struct mg_dns_resource_record *question, + const char *name, int rtype, int ttl, const void *rdata, + size_t rdata_len) { + struct mg_dns_message *msg = (struct mg_dns_message *) reply->msg; + char rname[512]; + struct mg_dns_resource_record *ans = &msg->answers[msg->num_answers]; + if (msg->num_answers >= MG_MAX_DNS_ANSWERS) { + return -1; /* LCOV_EXCL_LINE */ + } + + if (name == NULL) { + name = rname; + rname[511] = 0; + mg_dns_uncompress_name(msg, &question->name, rname, sizeof(rname) - 1); + } + + *ans = *question; + ans->kind = MG_DNS_ANSWER; + ans->rtype = rtype; + ans->ttl = ttl; + + if (mg_dns_encode_record(reply->io, ans, name, strlen(name), rdata, + rdata_len) == -1) { + return -1; /* LCOV_EXCL_LINE */ + }; + + msg->num_answers++; + return 0; +} + +#endif /* MG_ENABLE_DNS_SERVER */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/resolv.c" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_ASYNC_RESOLVER + +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/resolv.h" */ + +#ifndef MG_DEFAULT_NAMESERVER +#define MG_DEFAULT_NAMESERVER "8.8.8.8" +#endif + +struct mg_resolve_async_request { + char name[1024]; + int query; + mg_resolve_callback_t callback; + void *data; + time_t timeout; + int max_retries; + enum mg_resolve_err err; + + /* state */ + time_t last_time; + int retries; +}; + +/* + * Find what nameserver to use. + * + * Return 0 if OK, -1 if error + */ +static int mg_get_ip_address_of_nameserver(char *name, size_t name_len) { + int ret = -1; + +#ifdef _WIN32 + int i; + LONG err; + HKEY hKey, hSub; + wchar_t subkey[512], value[128], + *key = L"SYSTEM\\ControlSet001\\Services\\Tcpip\\Parameters\\Interfaces"; + + if ((err = RegOpenKeyExW(HKEY_LOCAL_MACHINE, key, 0, KEY_READ, &hKey)) != + ERROR_SUCCESS) { + fprintf(stderr, "cannot open reg key %S: %ld\n", key, err); + ret = -1; + } else { + for (ret = -1, i = 0; 1; i++) { + DWORD subkey_size = sizeof(subkey), type, len = sizeof(value); + if (RegEnumKeyExW(hKey, i, subkey, &subkey_size, NULL, NULL, NULL, + NULL) != ERROR_SUCCESS) { + break; + } + if (RegOpenKeyExW(hKey, subkey, 0, KEY_READ, &hSub) == ERROR_SUCCESS && + ((RegQueryValueExW(hSub, L"NameServer", 0, &type, (void *) value, + &len) == ERROR_SUCCESS && + value[0] != '\0') || + (RegQueryValueExW(hSub, L"DhcpNameServer", 0, &type, (void *) value, + &len) == ERROR_SUCCESS && + value[0] != '\0'))) { + /* + * See https://github.com/cesanta/mongoose/issues/176 + * The value taken from the registry can be empty, a single + * IP address, or multiple IP addresses separated by comma. + * If it's empty, check the next interface. + * If it's multiple IP addresses, take the first one. + */ + wchar_t *comma = wcschr(value, ','); + if (comma != NULL) { + *comma = '\0'; + } + /* %S will convert wchar_t -> char */ + snprintf(name, name_len, "%S", value); + ret = 0; + RegCloseKey(hSub); + break; + } + } + RegCloseKey(hKey); + } +#elif MG_ENABLE_FILESYSTEM && defined(MG_RESOLV_CONF_FILE_NAME) + FILE *fp; + char line[512]; + + if ((fp = mg_fopen(MG_RESOLV_CONF_FILE_NAME, "r")) == NULL) { + ret = -1; + } else { + /* Try to figure out what nameserver to use */ + for (ret = -1; fgets(line, sizeof(line), fp) != NULL;) { + unsigned int a, b, c, d; + if (sscanf(line, "nameserver %u.%u.%u.%u", &a, &b, &c, &d) == 4) { + snprintf(name, name_len, "%u.%u.%u.%u", a, b, c, d); + ret = 0; + break; + } + } + (void) fclose(fp); + } +#else + snprintf(name, name_len, "%s", MG_DEFAULT_NAMESERVER); +#endif /* _WIN32 */ + + return ret; +} + +int mg_resolve_from_hosts_file(const char *name, union socket_address *usa) { +#if MG_ENABLE_FILESYSTEM && defined(MG_HOSTS_FILE_NAME) + /* TODO(mkm) cache /etc/hosts */ + FILE *fp; + char line[1024]; + char *p; + char alias[256]; + unsigned int a, b, c, d; + int len = 0; + + if ((fp = mg_fopen(MG_HOSTS_FILE_NAME, "r")) == NULL) { + return -1; + } + + for (; fgets(line, sizeof(line), fp) != NULL;) { + if (line[0] == '#') continue; + + if (sscanf(line, "%u.%u.%u.%u%n", &a, &b, &c, &d, &len) == 0) { + /* TODO(mkm): handle ipv6 */ + continue; + } + for (p = line + len; sscanf(p, "%s%n", alias, &len) == 1; p += len) { + if (strcmp(alias, name) == 0) { + usa->sin.sin_addr.s_addr = htonl(a << 24 | b << 16 | c << 8 | d); + fclose(fp); + return 0; + } + } + } + + fclose(fp); +#else + (void) name; + (void) usa; +#endif + + return -1; +} + +static void mg_resolve_async_eh(struct mg_connection *nc, int ev, + void *data MG_UD_ARG(void *user_data)) { + time_t now = (time_t) mg_time(); + struct mg_resolve_async_request *req; + struct mg_dns_message *msg; + int first = 0; +#if !MG_ENABLE_CALLBACK_USERDATA + void *user_data = nc->user_data; +#endif + + if (ev != MG_EV_POLL) DBG(("ev=%d user_data=%p", ev, user_data)); + + req = (struct mg_resolve_async_request *) user_data; + + if (req == NULL) { + return; + } + + switch (ev) { + case MG_EV_CONNECT: + /* don't depend on timer not being at epoch for sending out first req */ + first = 1; + /* fallthrough */ + case MG_EV_POLL: + if (req->retries > req->max_retries) { + req->err = MG_RESOLVE_EXCEEDED_RETRY_COUNT; + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + break; + } + if (first || now - req->last_time >= req->timeout) { + mg_send_dns_query(nc, req->name, req->query); + req->last_time = now; + req->retries++; + } + break; + case MG_EV_RECV: + msg = (struct mg_dns_message *) MG_MALLOC(sizeof(*msg)); + if (mg_parse_dns(nc->recv_mbuf.buf, *(int *) data, msg) == 0 && + msg->num_answers > 0) { + req->callback(msg, req->data, MG_RESOLVE_OK); + nc->user_data = NULL; + MG_FREE(req); + } else { + req->err = MG_RESOLVE_NO_ANSWERS; + } + MG_FREE(msg); + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + break; + case MG_EV_SEND: + /* + * If a send error occurs, prevent closing of the connection by the core. + * We will retry after timeout. + */ + nc->flags &= ~MG_F_CLOSE_IMMEDIATELY; + mbuf_remove(&nc->send_mbuf, nc->send_mbuf.len); + break; + case MG_EV_TIMER: + req->err = MG_RESOLVE_TIMEOUT; + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + break; + case MG_EV_CLOSE: + /* If we got here with request still not done, fire an error callback. */ + if (req != NULL) { + char addr[32]; + mg_sock_addr_to_str(&nc->sa, addr, sizeof(addr), MG_SOCK_STRINGIFY_IP); +#ifdef MG_LOG_DNS_FAILURES + LOG(LL_ERROR, ("Failed to resolve '%s', server %s", req->name, addr)); +#endif + req->callback(NULL, req->data, req->err); + nc->user_data = NULL; + MG_FREE(req); + } + break; + } } -static int pthread_cond_broadcast(pthread_cond_t *cv) { - // Implementation with PulseEvent() has race condition, see - // http://www.cs.wustl.edu/~schmidt/win32-cv-1.html - return PulseEvent(cv->broadcast) == 0 ? -1 : 0; +int mg_resolve_async(struct mg_mgr *mgr, const char *name, int query, + mg_resolve_callback_t cb, void *data) { + struct mg_resolve_async_opts opts; + memset(&opts, 0, sizeof(opts)); + return mg_resolve_async_opt(mgr, name, query, cb, data, opts); } -static int pthread_cond_destroy(pthread_cond_t *cv) { - return CloseHandle(cv->signal) && CloseHandle(cv->broadcast) ? 0 : -1; -} +int mg_resolve_async_opt(struct mg_mgr *mgr, const char *name, int query, + mg_resolve_callback_t cb, void *data, + struct mg_resolve_async_opts opts) { + struct mg_resolve_async_request *req; + struct mg_connection *dns_nc; + const char *nameserver = opts.nameserver; + char dns_server_buff[17], nameserver_url[26]; -// For Windows, change all slashes to backslashes in path names. -static void change_slashes_to_backslashes(char *path) { - int i; + if (nameserver == NULL) { + nameserver = mgr->nameserver; + } + + DBG(("%s %d %p", name, query, opts.dns_conn)); - for (i = 0; path[i] != '\0'; i++) { - if (path[i] == '/') - path[i] = '\\'; - // i > 0 check is to preserve UNC paths, like \\server\file.txt - if (path[i] == '\\' && i > 0) - while (path[i + 1] == '\\' || path[i + 1] == '/') - (void) memmove(path + i + 1, - path + i + 2, strlen(path + i + 1)); + /* resolve with DNS */ + req = (struct mg_resolve_async_request *) MG_CALLOC(1, sizeof(*req)); + if (req == NULL) { + return -1; + } + + strncpy(req->name, name, sizeof(req->name)); + req->query = query; + req->callback = cb; + req->data = data; + /* TODO(mkm): parse defaults out of resolve.conf */ + req->max_retries = opts.max_retries ? opts.max_retries : 2; + req->timeout = opts.timeout ? opts.timeout : 5; + + /* Lazily initialize dns server */ + if (nameserver == NULL) { + if (mg_get_ip_address_of_nameserver(dns_server_buff, + sizeof(dns_server_buff)) != -1) { + nameserver = dns_server_buff; + } else { + nameserver = MG_DEFAULT_NAMESERVER; + } } -} -// Encode 'path' which is assumed UTF-8 string, into UNICODE string. -// wbuf and wbuf_len is a target buffer and its length. -static void to_unicode(const char *path, wchar_t *wbuf, size_t wbuf_len) { - char buf[PATH_MAX], buf2[PATH_MAX]; + snprintf(nameserver_url, sizeof(nameserver_url), "udp://%s:53", nameserver); - mg_strlcpy(buf, path, sizeof(buf)); - change_slashes_to_backslashes(buf); + dns_nc = mg_connect(mgr, nameserver_url, MG_CB(mg_resolve_async_eh, NULL)); + if (dns_nc == NULL) { + MG_FREE(req); + return -1; + } + dns_nc->user_data = req; + if (opts.dns_conn != NULL) { + *opts.dns_conn = dns_nc; + } - // Convert to Unicode and back. If doubly-converted string does not - // match the original, something is fishy, reject. - memset(wbuf, 0, wbuf_len * sizeof(wchar_t)); - MultiByteToWideChar(CP_UTF8, 0, buf, -1, wbuf, (int) wbuf_len); - WideCharToMultiByte(CP_UTF8, 0, wbuf, (int) wbuf_len, buf2, sizeof(buf2), - NULL, NULL); - if (strcmp(buf, buf2) != 0) { - wbuf[0] = L'\0'; + return 0; +} + +void mg_set_nameserver(struct mg_mgr *mgr, const char *nameserver) { + MG_FREE((char *) mgr->nameserver); + mgr->nameserver = NULL; + if (nameserver != NULL) { + mgr->nameserver = strdup(nameserver); } } -#if defined(_WIN32_WCE) -static time_t time(time_t *ptime) { - time_t t; - SYSTEMTIME st; - FILETIME ft; +#endif /* MG_ENABLE_ASYNC_RESOLVER */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/coap.c" +#endif +/* + * Copyright (c) 2015 Cesanta Software Limited + * All rights reserved + * This software is dual-licensed: you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 as + * published by the Free Software Foundation. For the terms of this + * license, see <http://www.gnu.org/licenses/>. + * + * You are free to use this software under the terms of the GNU General + * Public License, but WITHOUT ANY WARRANTY; without even the implied + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. + * See the GNU General Public License for more details. + * + * Alternatively, you can license this software under a commercial + * license, as set out in <https://www.cesanta.com/license>. + */ + +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/coap.h" */ + +#if MG_ENABLE_COAP + +void mg_coap_free_options(struct mg_coap_message *cm) { + while (cm->options != NULL) { + struct mg_coap_option *next = cm->options->next; + MG_FREE(cm->options); + cm->options = next; + } +} + +struct mg_coap_option *mg_coap_add_option(struct mg_coap_message *cm, + uint32_t number, char *value, + size_t len) { + struct mg_coap_option *new_option = + (struct mg_coap_option *) MG_CALLOC(1, sizeof(*new_option)); + + new_option->number = number; + new_option->value.p = value; + new_option->value.len = len; + + if (cm->options == NULL) { + cm->options = cm->optiomg_tail = new_option; + } else { + /* + * A very simple attention to help clients to compose options: + * CoAP wants to see options ASC ordered. + * Could be change by using sort in coap_compose + */ + if (cm->optiomg_tail->number <= new_option->number) { + /* if option is already ordered just add it */ + cm->optiomg_tail = cm->optiomg_tail->next = new_option; + } else { + /* looking for appropriate position */ + struct mg_coap_option *current_opt = cm->options; + struct mg_coap_option *prev_opt = 0; - GetSystemTime(&st); - SystemTimeToFileTime(&st, &ft); - t = SYS2UNIX_TIME(ft.dwLowDateTime, ft.dwHighDateTime); + while (current_opt != NULL) { + if (current_opt->number > new_option->number) { + break; + } + prev_opt = current_opt; + current_opt = current_opt->next; + } - if (ptime != NULL) { - *ptime = t; + if (prev_opt != NULL) { + prev_opt->next = new_option; + new_option->next = current_opt; + } else { + /* insert new_option to the beginning */ + new_option->next = cm->options; + cm->options = new_option; + } + } } - return t; + return new_option; } -static struct tm *localtime(const time_t *ptime, struct tm *ptm) { - int64_t t = ((int64_t) *ptime) * RATE_DIFF + EPOCH_DIFF; - FILETIME ft, lft; - SYSTEMTIME st; - TIME_ZONE_INFORMATION tzinfo; +/* + * Fills CoAP header in mg_coap_message. + * + * Helper function. + */ +static char *coap_parse_header(char *ptr, struct mbuf *io, + struct mg_coap_message *cm) { + if (io->len < sizeof(uint32_t)) { + cm->flags |= MG_COAP_NOT_ENOUGH_DATA; + return NULL; + } + + /* + * Version (Ver): 2-bit unsigned integer. Indicates the CoAP version + * number. Implementations of this specification MUST set this field + * to 1 (01 binary). Other values are reserved for future versions. + * Messages with unknown version numbers MUST be silently ignored. + */ + if (((uint8_t) *ptr >> 6) != 1) { + cm->flags |= MG_COAP_IGNORE; + return NULL; + } - if (ptm == NULL) { + /* + * Type (T): 2-bit unsigned integer. Indicates if this message is of + * type Confirmable (0), Non-confirmable (1), Acknowledgement (2), or + * Reset (3). + */ + cm->msg_type = ((uint8_t) *ptr & 0x30) >> 4; + cm->flags |= MG_COAP_MSG_TYPE_FIELD; + + /* + * Token Length (TKL): 4-bit unsigned integer. Indicates the length of + * the variable-length Token field (0-8 bytes). Lengths 9-15 are + * reserved, MUST NOT be sent, and MUST be processed as a message + * format error. + */ + cm->token.len = *ptr & 0x0F; + if (cm->token.len > 8) { + cm->flags |= MG_COAP_FORMAT_ERROR; return NULL; } - * (int64_t *) &ft = t; - FileTimeToLocalFileTime(&ft, &lft); - FileTimeToSystemTime(&lft, &st); - ptm->tm_year = st.wYear - 1900; - ptm->tm_mon = st.wMonth - 1; - ptm->tm_wday = st.wDayOfWeek; - ptm->tm_mday = st.wDay; - ptm->tm_hour = st.wHour; - ptm->tm_min = st.wMinute; - ptm->tm_sec = st.wSecond; - ptm->tm_yday = 0; // hope nobody uses this - ptm->tm_isdst = - GetTimeZoneInformation(&tzinfo) == TIME_ZONE_ID_DAYLIGHT ? 1 : 0; + ptr++; - return ptm; -} + /* + * Code: 8-bit unsigned integer, split into a 3-bit class (most + * significant bits) and a 5-bit detail (least significant bits) + */ + cm->code_class = (uint8_t) *ptr >> 5; + cm->code_detail = *ptr & 0x1F; + cm->flags |= (MG_COAP_CODE_CLASS_FIELD | MG_COAP_CODE_DETAIL_FIELD); -static struct tm *gmtime(const time_t *ptime, struct tm *ptm) { - // FIXME(lsm): fix this. - return localtime(ptime, ptm); -} + ptr++; -static size_t strftime(char *dst, size_t dst_size, const char *fmt, - const struct tm *tm) { - (void) snprintf(dst, dst_size, "implement strftime() for WinCE"); - return 0; + /* Message ID: 16-bit unsigned integer in network byte order. */ + cm->msg_id = (uint8_t) *ptr << 8 | (uint8_t) * (ptr + 1); + cm->flags |= MG_COAP_MSG_ID_FIELD; + + ptr += 2; + + return ptr; } -#endif -// Windows happily opens files with some garbage at the end of file name. -// For example, fopen("a.cgi ", "r") on Windows successfully opens -// "a.cgi", despite one would expect an error back. -// This function returns non-0 if path ends with some garbage. -static int path_cannot_disclose_cgi(const char *path) { - static const char *allowed_last_characters = "_-"; - int last = path[strlen(path) - 1]; - return isalnum(last) || strchr(allowed_last_characters, last) != NULL; +/* + * Fills token information in mg_coap_message. + * + * Helper function. + */ +static char *coap_get_token(char *ptr, struct mbuf *io, + struct mg_coap_message *cm) { + if (cm->token.len != 0) { + if (ptr + cm->token.len > io->buf + io->len) { + cm->flags |= MG_COAP_NOT_ENOUGH_DATA; + return NULL; + } else { + cm->token.p = ptr; + ptr += cm->token.len; + cm->flags |= MG_COAP_TOKEN_FIELD; + } + } + + return ptr; } -static int mg_stat(struct mg_connection *conn, const char *path, - struct file *filep) { - wchar_t wbuf[PATH_MAX]; - WIN32_FILE_ATTRIBUTE_DATA info; +/* + * Returns Option Delta or Length. + * + * Helper function. + */ +static int coap_get_ext_opt(char *ptr, struct mbuf *io, uint16_t *opt_info) { + int ret = 0; - if (!is_file_in_memory(conn, path, filep)) { - to_unicode(path, wbuf, ARRAY_SIZE(wbuf)); - if (GetFileAttributesExW(wbuf, GetFileExInfoStandard, &info) != 0) { - filep->size = MAKEUQUAD(info.nFileSizeLow, info.nFileSizeHigh); - filep->modification_time = SYS2UNIX_TIME( - info.ftLastWriteTime.dwLowDateTime, - info.ftLastWriteTime.dwHighDateTime); - filep->is_directory = info.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY; - // If file name is fishy, reset the file structure and return error. - // Note it is important to reset, not just return the error, cause - // functions like is_file_opened() check the struct. - if (!filep->is_directory && !path_cannot_disclose_cgi(path)) { - memset(filep, 0, sizeof(*filep)); - } + if (*opt_info == 13) { + /* + * 13: An 8-bit unsigned integer follows the initial byte and + * indicates the Option Delta/Length minus 13. + */ + if (ptr < io->buf + io->len) { + *opt_info = (uint8_t) *ptr + 13; + ret = sizeof(uint8_t); + } else { + ret = -1; /* LCOV_EXCL_LINE */ + } + } else if (*opt_info == 14) { + /* + * 14: A 16-bit unsigned integer in network byte order follows the + * initial byte and indicates the Option Delta/Length minus 269. + */ + if (ptr + sizeof(uint8_t) < io->buf + io->len) { + *opt_info = ((uint8_t) *ptr << 8 | (uint8_t) * (ptr + 1)) + 269; + ret = sizeof(uint16_t); + } else { + ret = -1; /* LCOV_EXCL_LINE */ } } - return filep->membuf != NULL || filep->modification_time != 0; + return ret; } -static int mg_remove(const char *path) { - wchar_t wbuf[PATH_MAX]; - to_unicode(path, wbuf, ARRAY_SIZE(wbuf)); - return DeleteFileW(wbuf) ? 0 : -1; -} +/* + * Fills options in mg_coap_message. + * + * Helper function. + * + * General options format: + * +---------------+---------------+ + * | Option Delta | Option Length | 1 byte + * +---------------+---------------+ + * \ Option Delta (extended) \ 0-2 bytes + * +-------------------------------+ + * / Option Length (extended) \ 0-2 bytes + * +-------------------------------+ + * \ Option Value \ 0 or more bytes + * +-------------------------------+ + */ +static char *coap_get_options(char *ptr, struct mbuf *io, + struct mg_coap_message *cm) { + uint16_t prev_opt = 0; + + if (ptr == io->buf + io->len) { + /* end of packet, ok */ + return NULL; + } -static int mg_mkdir(const char *path, int mode) { - char buf[PATH_MAX]; - wchar_t wbuf[PATH_MAX]; + /* 0xFF is payload marker */ + while (ptr < io->buf + io->len && (uint8_t) *ptr != 0xFF) { + uint16_t option_delta, option_lenght; + int optinfo_len; - (void) mode; - mg_strlcpy(buf, path, sizeof(buf)); - change_slashes_to_backslashes(buf); + /* Option Delta: 4-bit unsigned integer */ + option_delta = ((uint8_t) *ptr & 0xF0) >> 4; + /* Option Length: 4-bit unsigned integer */ + option_lenght = *ptr & 0x0F; - (void) MultiByteToWideChar(CP_UTF8, 0, buf, -1, wbuf, ARRAY_SIZE(wbuf)); + if (option_delta == 15 || option_lenght == 15) { + /* + * 15: Reserved for future use. If the field is set to this value, + * it MUST be processed as a message format error + */ + cm->flags |= MG_COAP_FORMAT_ERROR; + break; + } - return CreateDirectoryW(wbuf, NULL) ? 0 : -1; -} + ptr++; -// Implementation of POSIX opendir/closedir/readdir for Windows. -static DIR * opendir(const char *name) { - DIR *dir = NULL; - wchar_t wpath[PATH_MAX]; - DWORD attrs; + /* check for extended option delta */ + optinfo_len = coap_get_ext_opt(ptr, io, &option_delta); + if (optinfo_len == -1) { + cm->flags |= MG_COAP_NOT_ENOUGH_DATA; /* LCOV_EXCL_LINE */ + break; /* LCOV_EXCL_LINE */ + } - if (name == NULL) { - SetLastError(ERROR_BAD_ARGUMENTS); - } else if ((dir = (DIR *) malloc(sizeof(*dir))) == NULL) { - SetLastError(ERROR_NOT_ENOUGH_MEMORY); - } else { - to_unicode(name, wpath, ARRAY_SIZE(wpath)); - attrs = GetFileAttributesW(wpath); - if (attrs != 0xFFFFFFFF && - ((attrs & FILE_ATTRIBUTE_DIRECTORY) == FILE_ATTRIBUTE_DIRECTORY)) { - (void) wcscat(wpath, L"\\*"); - dir->handle = FindFirstFileW(wpath, &dir->info); - dir->result.d_name[0] = '\0'; - } else { - free(dir); - dir = NULL; + ptr += optinfo_len; + + /* check or extended option lenght */ + optinfo_len = coap_get_ext_opt(ptr, io, &option_lenght); + if (optinfo_len == -1) { + cm->flags |= MG_COAP_NOT_ENOUGH_DATA; /* LCOV_EXCL_LINE */ + break; /* LCOV_EXCL_LINE */ } - } - return dir; -} + ptr += optinfo_len; -static int closedir(DIR *dir) { - int result = 0; + /* + * Instead of specifying the Option Number directly, the instances MUST + * appear in order of their Option Numbers and a delta encoding is used + * between them. + */ + option_delta += prev_opt; - if (dir != NULL) { - if (dir->handle != INVALID_HANDLE_VALUE) - result = FindClose(dir->handle) ? 0 : -1; + mg_coap_add_option(cm, option_delta, ptr, option_lenght); - free(dir); - } else { - result = -1; - SetLastError(ERROR_BAD_ARGUMENTS); - } + prev_opt = option_delta; - return result; -} + if (ptr + option_lenght > io->buf + io->len) { + cm->flags |= MG_COAP_NOT_ENOUGH_DATA; /* LCOV_EXCL_LINE */ + break; /* LCOV_EXCL_LINE */ + } -static struct dirent *readdir(DIR *dir) { - struct dirent *result = 0; + ptr += option_lenght; + } - if (dir) { - if (dir->handle != INVALID_HANDLE_VALUE) { - result = &dir->result; - (void) WideCharToMultiByte(CP_UTF8, 0, - dir->info.cFileName, -1, result->d_name, - sizeof(result->d_name), NULL, NULL); + if ((cm->flags & MG_COAP_ERROR) != 0) { + mg_coap_free_options(cm); + return NULL; + } - if (!FindNextFileW(dir->handle, &dir->info)) { - (void) FindClose(dir->handle); - dir->handle = INVALID_HANDLE_VALUE; - } + cm->flags |= MG_COAP_OPTIOMG_FIELD; - } else { - SetLastError(ERROR_FILE_NOT_FOUND); - } - } else { - SetLastError(ERROR_BAD_ARGUMENTS); + if (ptr == io->buf + io->len) { + /* end of packet, ok */ + return NULL; } - return result; + ptr++; + + return ptr; } -#ifndef HAVE_POLL -static int poll(struct pollfd *pfd, int n, int milliseconds) { - struct timeval tv; - fd_set set; - int i, result; +uint32_t mg_coap_parse(struct mbuf *io, struct mg_coap_message *cm) { + char *ptr; - tv.tv_sec = milliseconds / 1000; - tv.tv_usec = (milliseconds % 1000) * 1000; - FD_ZERO(&set); + memset(cm, 0, sizeof(*cm)); - for (i = 0; i < n; i++) { - FD_SET((SOCKET) pfd[i].fd, &set); - pfd[i].revents = 0; + if ((ptr = coap_parse_header(io->buf, io, cm)) == NULL) { + return cm->flags; } - if ((result = select(0, &set, NULL, NULL, &tv)) > 0) { - for (i = 0; i < n; i++) { - if (FD_ISSET(pfd[i].fd, &set)) { - pfd[i].revents = POLLIN; - } - } + if ((ptr = coap_get_token(ptr, io, cm)) == NULL) { + return cm->flags; } - return result; + if ((ptr = coap_get_options(ptr, io, cm)) == NULL) { + return cm->flags; + } + + /* the rest is payload */ + cm->payload.len = io->len - (ptr - io->buf); + if (cm->payload.len != 0) { + cm->payload.p = ptr; + cm->flags |= MG_COAP_PAYLOAD_FIELD; + } + + return cm->flags; } -#endif // HAVE_POLL -#define set_close_on_exec(x) // No FD_CLOEXEC on Windows +/* + * Calculates extended size of given Opt Number/Length in coap message. + * + * Helper function. + */ +static size_t coap_get_ext_opt_size(uint32_t value) { + int ret = 0; + + if (value >= 13 && value <= 0xFF + 13) { + ret = sizeof(uint8_t); + } else if (value > 0xFF + 13 && value <= 0xFFFF + 269) { + ret = sizeof(uint16_t); + } -int mg_start_thread(mg_thread_func_t f, void *p) { - return (long)_beginthread((void (__cdecl *)(void *)) f, 0, p) == -1L ? -1 : 0; + return ret; } -static HANDLE dlopen(const char *dll_name, int flags) { - wchar_t wbuf[PATH_MAX]; - (void) flags; - to_unicode(dll_name, wbuf, ARRAY_SIZE(wbuf)); - return LoadLibraryW(wbuf); +/* + * Splits given Opt Number/Length into base and ext values. + * + * Helper function. + */ +static int coap_split_opt(uint32_t value, uint8_t *base, uint16_t *ext) { + int ret = 0; + + if (value < 13) { + *base = value; + } else if (value >= 13 && value <= 0xFF + 13) { + *base = 13; + *ext = value - 13; + ret = sizeof(uint8_t); + } else if (value > 0xFF + 13 && value <= 0xFFFF + 269) { + *base = 14; + *ext = value - 269; + ret = sizeof(uint16_t); + } + + return ret; } -#if !defined(NO_CGI) -#define SIGKILL 0 -static int kill(pid_t pid, int sig_num) { - (void) TerminateProcess(pid, sig_num); - (void) CloseHandle(pid); +/* + * Puts uint16_t (in network order) into given char stream. + * + * Helper function. + */ +static char *coap_add_uint16(char *ptr, uint16_t val) { + *ptr = val >> 8; + ptr++; + *ptr = val & 0x00FF; + ptr++; + return ptr; +} + +/* + * Puts extended value of Opt Number/Length into given char stream. + * + * Helper function. + */ +static char *coap_add_opt_info(char *ptr, uint16_t val, size_t len) { + if (len == sizeof(uint8_t)) { + *ptr = (char) val; + ptr++; + } else if (len == sizeof(uint16_t)) { + ptr = coap_add_uint16(ptr, val); + } + + return ptr; +} + +/* + * Verifies given mg_coap_message and calculates message size for it. + * + * Helper function. + */ +static uint32_t coap_calculate_packet_size(struct mg_coap_message *cm, + size_t *len) { + struct mg_coap_option *opt; + uint32_t prev_opt_number; + + *len = 4; /* header */ + if (cm->msg_type > MG_COAP_MSG_MAX) { + return MG_COAP_ERROR | MG_COAP_MSG_TYPE_FIELD; + } + if (cm->token.len > 8) { + return MG_COAP_ERROR | MG_COAP_TOKEN_FIELD; + } + if (cm->code_class > 7) { + return MG_COAP_ERROR | MG_COAP_CODE_CLASS_FIELD; + } + if (cm->code_detail > 31) { + return MG_COAP_ERROR | MG_COAP_CODE_DETAIL_FIELD; + } + + *len += cm->token.len; + if (cm->payload.len != 0) { + *len += cm->payload.len + 1; /* ... + 1; add payload marker */ + } + + opt = cm->options; + prev_opt_number = 0; + while (opt != NULL) { + *len += 1; /* basic delta/length */ + *len += coap_get_ext_opt_size(opt->number - prev_opt_number); + *len += coap_get_ext_opt_size((uint32_t) opt->value.len); + /* + * Current implementation performs check if + * option_number > previous option_number and produces an error + * TODO(alashkin): write design doc with limitations + * May be resorting is more suitable solution. + */ + if ((opt->next != NULL && opt->number > opt->next->number) || + opt->value.len > 0xFFFF + 269 || + opt->number - prev_opt_number > 0xFFFF + 269) { + return MG_COAP_ERROR | MG_COAP_OPTIOMG_FIELD; + } + *len += opt->value.len; + prev_opt_number = opt->number; + opt = opt->next; + } + return 0; } -static void trim_trailing_whitespaces(char *s) { - char *e = s + strlen(s) - 1; - while (e > s && isspace(* (unsigned char *) e)) { - *e-- = '\0'; +uint32_t mg_coap_compose(struct mg_coap_message *cm, struct mbuf *io) { + struct mg_coap_option *opt; + uint32_t res, prev_opt_number; + size_t prev_io_len, packet_size; + char *ptr; + + res = coap_calculate_packet_size(cm, &packet_size); + if (res != 0) { + return res; } -} -static pid_t spawn_process(struct mg_connection *conn, const char *prog, - char *envblk, char *envp[], int fd_stdin, - int fd_stdout, const char *dir) { - HANDLE me; - char *p, *interp, full_interp[PATH_MAX], full_dir[PATH_MAX], - cmdline[PATH_MAX], buf[PATH_MAX]; - struct file file = STRUCT_FILE_INITIALIZER; - STARTUPINFOA si; - PROCESS_INFORMATION pi = { 0 }; + /* saving previous lenght to handle non-empty mbuf */ + prev_io_len = io->len; + if (mbuf_append(io, NULL, packet_size) == 0) return MG_COAP_ERROR; + ptr = io->buf + prev_io_len; - (void) envp; + /* + * since cm is verified, it is possible to use bits shift operator + * without additional zeroing of unused bits + */ - memset(&si, 0, sizeof(si)); - si.cb = sizeof(si); + /* ver: 2 bits, msg_type: 2 bits, toklen: 4 bits */ + *ptr = (1 << 6) | (cm->msg_type << 4) | (uint8_t)(cm->token.len); + ptr++; - // TODO(lsm): redirect CGI errors to the error log file - si.dwFlags = STARTF_USESTDHANDLES | STARTF_USESHOWWINDOW; - si.wShowWindow = SW_HIDE; + /* code class: 3 bits, code detail: 5 bits */ + *ptr = (cm->code_class << 5) | (cm->code_detail); + ptr++; - me = GetCurrentProcess(); - DuplicateHandle(me, (HANDLE) _get_osfhandle(fd_stdin), me, - &si.hStdInput, 0, TRUE, DUPLICATE_SAME_ACCESS); - DuplicateHandle(me, (HANDLE) _get_osfhandle(fd_stdout), me, - &si.hStdOutput, 0, TRUE, DUPLICATE_SAME_ACCESS); + ptr = coap_add_uint16(ptr, cm->msg_id); - // If CGI file is a script, try to read the interpreter line - interp = conn->ctx->config[CGI_INTERPRETER]; - if (interp == NULL) { - buf[0] = buf[1] = '\0'; + if (cm->token.len != 0) { + memcpy(ptr, cm->token.p, cm->token.len); + ptr += cm->token.len; + } - // Read the first line of the script into the buffer - snprintf(cmdline, sizeof(cmdline), "%s%c%s", dir, '/', prog); - if (mg_fopen(conn, cmdline, "r", &file)) { - p = (char *) file.membuf; - mg_fgets(buf, sizeof(buf), &file, &p); - mg_fclose(&file); - buf[sizeof(buf) - 1] = '\0'; - } + opt = cm->options; + prev_opt_number = 0; + while (opt != NULL) { + uint8_t delta_base = 0, length_base = 0; + uint16_t delta_ext = 0, length_ext = 0; - if (buf[0] == '#' && buf[1] == '!') { - trim_trailing_whitespaces(buf + 2); - } else { - buf[2] = '\0'; + size_t opt_delta_len = + coap_split_opt(opt->number - prev_opt_number, &delta_base, &delta_ext); + size_t opt_lenght_len = + coap_split_opt((uint32_t) opt->value.len, &length_base, &length_ext); + + *ptr = (delta_base << 4) | length_base; + ptr++; + + ptr = coap_add_opt_info(ptr, delta_ext, opt_delta_len); + ptr = coap_add_opt_info(ptr, length_ext, opt_lenght_len); + + if (opt->value.len != 0) { + memcpy(ptr, opt->value.p, opt->value.len); + ptr += opt->value.len; } - interp = buf + 2; + + prev_opt_number = opt->number; + opt = opt->next; } - if (interp[0] != '\0') { - GetFullPathNameA(interp, sizeof(full_interp), full_interp, NULL); - interp = full_interp; + if (cm->payload.len != 0) { + *ptr = (char) -1; + ptr++; + memcpy(ptr, cm->payload.p, cm->payload.len); } - GetFullPathNameA(dir, sizeof(full_dir), full_dir, NULL); - mg_snprintf(conn, cmdline, sizeof(cmdline), "%s%s%s\\%s", - interp, interp[0] == '\0' ? "" : " ", full_dir, prog); + return 0; +} + +uint32_t mg_coap_send_message(struct mg_connection *nc, + struct mg_coap_message *cm) { + struct mbuf packet_out; + uint32_t compose_res; - DEBUG_TRACE(("Running [%s]", cmdline)); - if (CreateProcessA(NULL, cmdline, NULL, NULL, TRUE, - CREATE_NEW_PROCESS_GROUP, envblk, NULL, &si, &pi) == 0) { - cry(conn, "%s: CreateProcess(%s): %ld", - __func__, cmdline, ERRNO); - pi.hProcess = (pid_t) -1; + mbuf_init(&packet_out, 0); + compose_res = mg_coap_compose(cm, &packet_out); + if (compose_res != 0) { + return compose_res; /* LCOV_EXCL_LINE */ } - // Always close these to prevent handle leakage. - (void) close(fd_stdin); - (void) close(fd_stdout); - - (void) CloseHandle(si.hStdOutput); - (void) CloseHandle(si.hStdInput); - (void) CloseHandle(pi.hThread); + mg_send(nc, packet_out.buf, (int) packet_out.len); + mbuf_free(&packet_out); - return (pid_t) pi.hProcess; + return 0; } -#endif // !NO_CGI -static int set_non_blocking_mode(SOCKET sock) { - unsigned long on = 1; - return ioctlsocket(sock, FIONBIO, &on); +uint32_t mg_coap_send_ack(struct mg_connection *nc, uint16_t msg_id) { + struct mg_coap_message cm; + memset(&cm, 0, sizeof(cm)); + cm.msg_type = MG_COAP_MSG_ACK; + cm.msg_id = msg_id; + + return mg_coap_send_message(nc, &cm); } -#else -static int mg_stat(struct mg_connection *conn, const char *path, - struct file *filep) { - struct stat st; - - if (!is_file_in_memory(conn, path, filep) && !stat(path, &st)) { - filep->size = st.st_size; - filep->modification_time = st.st_mtime; - filep->is_directory = S_ISDIR(st.st_mode); - } else { - filep->modification_time = (time_t) 0; +static void coap_handler(struct mg_connection *nc, int ev, + void *ev_data MG_UD_ARG(void *user_data)) { + struct mbuf *io = &nc->recv_mbuf; + struct mg_coap_message cm; + uint32_t parse_res; + + memset(&cm, 0, sizeof(cm)); + + nc->handler(nc, ev, ev_data MG_UD_ARG(user_data)); + + switch (ev) { + case MG_EV_RECV: + parse_res = mg_coap_parse(io, &cm); + if ((parse_res & MG_COAP_IGNORE) == 0) { + if ((cm.flags & MG_COAP_NOT_ENOUGH_DATA) != 0) { + /* + * Since we support UDP only + * MG_COAP_NOT_ENOUGH_DATA == MG_COAP_FORMAT_ERROR + */ + cm.flags |= MG_COAP_FORMAT_ERROR; /* LCOV_EXCL_LINE */ + } /* LCOV_EXCL_LINE */ + nc->handler(nc, MG_COAP_EVENT_BASE + cm.msg_type, + &cm MG_UD_ARG(user_data)); + } + + mg_coap_free_options(&cm); + mbuf_remove(io, io->len); + break; + } +} +/* + * Attach built-in CoAP event handler to the given connection. + * + * The user-defined event handler will receive following extra events: + * + * - MG_EV_COAP_CON + * - MG_EV_COAP_NOC + * - MG_EV_COAP_ACK + * - MG_EV_COAP_RST + */ +int mg_set_protocol_coap(struct mg_connection *nc) { + /* supports UDP only */ + if ((nc->flags & MG_F_UDP) == 0) { + return -1; } - return filep->membuf != NULL || filep->modification_time != (time_t) 0; + nc->proto_handler = coap_handler; + + return 0; } -static void set_close_on_exec(int fd) { - fcntl(fd, F_SETFD, FD_CLOEXEC); +#endif /* MG_ENABLE_COAP */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/tun.c" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_TUN + +/* Amalgamated: #include "common/cs_dbg.h" */ +/* Amalgamated: #include "mongoose/src/http.h" */ +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/net.h" */ +/* Amalgamated: #include "mongoose/src/net_if_tun.h" */ +/* Amalgamated: #include "mongoose/src/tun.h" */ +/* Amalgamated: #include "mongoose/src/util.h" */ + +static void mg_tun_reconnect(struct mg_tun_client *client, int timeout); + +static void mg_tun_init_client(struct mg_tun_client *client, struct mg_mgr *mgr, + struct mg_iface *iface, const char *dispatcher, + struct mg_tun_ssl_opts ssl) { + client->mgr = mgr; + client->iface = iface; + client->disp_url = dispatcher; + client->last_stream_id = 0; + client->ssl = ssl; + + client->disp = NULL; /* will be set by mg_tun_reconnect */ + client->listener = NULL; /* will be set by mg_do_bind */ + client->reconnect = NULL; /* will be set by mg_tun_reconnect */ +} + +void mg_tun_log_frame(struct mg_tun_frame *frame) { + LOG(LL_DEBUG, ("Got TUN frame: type=0x%x, flags=0x%x stream_id=0x%x, " + "len=%d", + frame->type, frame->flags, (unsigned int) frame->stream_id, + (int) frame->body.len)); +#if MG_ENABLE_HEXDUMP + { + char hex[512]; + mg_hexdump(frame->body.p, frame->body.len, hex, sizeof(hex) - 1); + hex[sizeof(hex) - 1] = '\0'; + LOG(LL_DEBUG, ("body:\n%s", hex)); + } +#else + LOG(LL_DEBUG, ("body: '%.*s'", (int) frame->body.len, frame->body.p)); +#endif } -int mg_start_thread(mg_thread_func_t func, void *param) { - pthread_t thread_id; - pthread_attr_t attr; +static void mg_tun_close_all(struct mg_tun_client *client) { + struct mg_connection *nc; + for (nc = client->mgr->active_connections; nc != NULL; nc = nc->next) { + if (nc->iface == client->iface && !(nc->flags & MG_F_LISTENING)) { + LOG(LL_DEBUG, ("Closing tunneled connection %p", nc)); + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + /* mg_close_conn(nc); */ + } + } +} - (void) pthread_attr_init(&attr); - (void) pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED); - // TODO(lsm): figure out why mongoose dies on Linux if next line is enabled - // (void) pthread_attr_setstacksize(&attr, sizeof(struct mg_connection) * 5); - - return pthread_create(&thread_id, &attr, func, param); -} - -#ifndef NO_CGI -static pid_t spawn_process(struct mg_connection *conn, const char *prog, - char *envblk, char *envp[], int fd_stdin, - int fd_stdout, const char *dir) { - pid_t pid; - const char *interp; - - (void) envblk; - - if ((pid = fork()) == -1) { - // Parent - send_http_error(conn, 500, http_500_error, "fork(): %s", strerror(ERRNO)); - } else if (pid == 0) { - // Child - if (chdir(dir) != 0) { - cry(conn, "%s: chdir(%s): %s", __func__, dir, strerror(ERRNO)); - } else if (dup2(fd_stdin, 0) == -1) { - cry(conn, "%s: dup2(%d, 0): %s", __func__, fd_stdin, strerror(ERRNO)); - } else if (dup2(fd_stdout, 1) == -1) { - cry(conn, "%s: dup2(%d, 1): %s", __func__, fd_stdout, strerror(ERRNO)); - } else { - (void) dup2(fd_stdout, 2); - (void) close(fd_stdin); - (void) close(fd_stdout); - - // After exec, all signal handlers are restored to their default values, - // with one exception of SIGCHLD. According to POSIX.1-2001 and Linux's - // implementation, SIGCHLD's handler will leave unchanged after exec - // if it was set to be ignored. Restore it to default action. - signal(SIGCHLD, SIG_DFL); - - interp = conn->ctx->config[CGI_INTERPRETER]; - if (interp == NULL) { - (void) execle(prog, prog, NULL, envp); - cry(conn, "%s: execle(%s): %s", __func__, prog, strerror(ERRNO)); +static void mg_tun_client_handler(struct mg_connection *nc, int ev, + void *ev_data MG_UD_ARG(void *user_data)) { +#if !MG_ENABLE_CALLBACK_USERDATA + void *user_data = nc->user_data; +#else + (void) nc; +#endif + struct mg_tun_client *client = (struct mg_tun_client *) user_data; + + switch (ev) { + case MG_EV_CONNECT: { + int err = *(int *) ev_data; + + if (err) { + LOG(LL_ERROR, ("Cannot connect to the tunnel dispatcher: %d", err)); } else { - (void) execle(interp, interp, prog, NULL, envp); - cry(conn, "%s: execle(%s %s): %s", __func__, interp, prog, - strerror(ERRNO)); + LOG(LL_INFO, ("Connected to the tunnel dispatcher")); } + break; } - exit(EXIT_FAILURE); - } + case MG_EV_HTTP_REPLY: { + struct http_message *hm = (struct http_message *) ev_data; - // Parent. Close stdio descriptors - (void) close(fd_stdin); - (void) close(fd_stdout); - - return pid; -} -#endif // !NO_CGI + if (hm->resp_code != 200) { + LOG(LL_ERROR, + ("Tunnel dispatcher reply non-OK status code %d", hm->resp_code)); + } + break; + } + case MG_EV_WEBSOCKET_HANDSHAKE_DONE: { + LOG(LL_INFO, ("Tunnel dispatcher handshake done")); + break; + } + case MG_EV_WEBSOCKET_FRAME: { + struct websocket_message *wm = (struct websocket_message *) ev_data; + struct mg_connection *tc; + struct mg_tun_frame frame; -static int set_non_blocking_mode(SOCKET sock) { - int flags; + if (mg_tun_parse_frame(wm->data, wm->size, &frame) == -1) { + LOG(LL_ERROR, ("Got invalid tun frame dropping")); + break; + } - flags = fcntl(sock, F_GETFL, 0); - (void) fcntl(sock, F_SETFL, flags | O_NONBLOCK); + mg_tun_log_frame(&frame); - return 0; + tc = mg_tun_if_find_conn(client, frame.stream_id); + if (tc == NULL) { + if (frame.body.len > 0) { + LOG(LL_DEBUG, ("Got frame after receiving end has been closed")); + } + break; + } + if (frame.body.len > 0) { + mg_if_recv_tcp_cb(tc, (void *) frame.body.p, frame.body.len, + 0 /* own */); + } + if (frame.flags & MG_TUN_F_END_STREAM) { + LOG(LL_DEBUG, ("Closing tunneled connection because got end of stream " + "from other end")); + tc->flags |= MG_F_CLOSE_IMMEDIATELY; + mg_close_conn(tc); + } + break; + } + case MG_EV_CLOSE: { + LOG(LL_DEBUG, ("Closing all tunneled connections")); + /* + * The client might have been already freed when the listening socket is + * closed. + */ + if (client != NULL) { + mg_tun_close_all(client); + client->disp = NULL; + LOG(LL_INFO, ("Dispatcher connection is no more, reconnecting")); + /* TODO(mkm): implement exp back off */ + mg_tun_reconnect(client, MG_TUN_RECONNECT_INTERVAL); + } + break; + } + default: + break; + } } -#endif // _WIN32 -// Write data to the IO channel - opened file descriptor, socket or SSL -// descriptor. Return number of bytes written. -static int64_t push(FILE *fp, SOCKET sock, SSL *ssl, const char *buf, - int64_t len) { - int64_t sent; - int n, k; - - (void) ssl; // Get rid of warning - sent = 0; - while (sent < len) { +static void mg_tun_do_reconnect(struct mg_tun_client *client) { + struct mg_connection *dc; + struct mg_connect_opts opts; + memset(&opts, 0, sizeof(opts)); +#if MG_ENABLE_SSL + opts.ssl_cert = client->ssl.ssl_cert; + opts.ssl_key = client->ssl.ssl_key; + opts.ssl_ca_cert = client->ssl.ssl_ca_cert; +#endif + /* HTTP/Websocket listener */ + if ((dc = mg_connect_ws_opt(client->mgr, MG_CB(mg_tun_client_handler, client), + opts, client->disp_url, MG_TUN_PROTO_NAME, + NULL)) == NULL) { + LOG(LL_ERROR, + ("Cannot connect to WS server on addr [%s]\n", client->disp_url)); + return; + } - // How many bytes we send in this iteration - k = len - sent > INT_MAX ? INT_MAX : (int) (len - sent); + client->disp = dc; +#if !MG_ENABLE_CALLBACK_USERDATA + dc->user_data = client; +#endif +} -#ifndef NO_SSL - if (ssl != NULL) { - n = SSL_write(ssl, buf + sent, k); - } else +void mg_tun_reconnect_ev_handler(struct mg_connection *nc, int ev, + void *ev_data MG_UD_ARG(void *user_data)) { +#if !MG_ENABLE_CALLBACK_USERDATA + void *user_data = nc->user_data; +#else + (void) nc; #endif - if (fp != NULL) { - n = (int) fwrite(buf + sent, 1, (size_t) k, fp); - if (ferror(fp)) - n = -1; - } else { - n = send(sock, buf + sent, (size_t) k, MSG_NOSIGNAL); - } + struct mg_tun_client *client = (struct mg_tun_client *) user_data; + (void) ev_data; - if (n <= 0) + switch (ev) { + case MG_EV_TIMER: + if (!(client->listener->flags & MG_F_TUN_DO_NOT_RECONNECT)) { + mg_tun_do_reconnect(client); + } else { + /* Reconnecting is suppressed, we'll check again at the next poll */ + mg_tun_reconnect(client, 0); + } break; + } +} + +static void mg_tun_reconnect(struct mg_tun_client *client, int timeout) { + if (client->reconnect == NULL) { + client->reconnect = mg_add_sock(client->mgr, INVALID_SOCKET, + MG_CB(mg_tun_reconnect_ev_handler, client)); +#if !MG_ENABLE_CALLBACK_USERDATA + client->reconnect->user_data = client; +#endif + } + client->reconnect->ev_timer_time = mg_time() + timeout; +} - sent += n; +static struct mg_tun_client *mg_tun_create_client(struct mg_mgr *mgr, + const char *dispatcher, + struct mg_tun_ssl_opts ssl) { + struct mg_tun_client *client = NULL; + struct mg_iface *iface = mg_find_iface(mgr, &mg_tun_iface_vtable, NULL); + if (iface == NULL) { + LOG(LL_ERROR, ("The tun feature requires the manager to have a tun " + "interface enabled")); + return NULL; } - return sent; + client = (struct mg_tun_client *) MG_MALLOC(sizeof(*client)); + mg_tun_init_client(client, mgr, iface, dispatcher, ssl); + iface->data = client; + + /* + * We need to give application a chance to set MG_F_TUN_DO_NOT_RECONNECT on a + * listening connection right after mg_tun_bind_opt() returned it, so we + * should use mg_tun_reconnect() here, instead of mg_tun_do_reconnect() + */ + mg_tun_reconnect(client, 0); + return client; } -// Read from IO channel - opened file descriptor, socket, or SSL descriptor. -// Return negative value on error, or number of bytes read on success. -static int pull(FILE *fp, struct mg_connection *conn, char *buf, int len) { - int nread; +void mg_tun_destroy_client(struct mg_tun_client *client) { + /* + * NOTE: + * `client` is NULL in case of OOM + * `client->disp` is NULL if connection failed + * `client->iface is NULL is `mg_find_iface` failed + */ - if (fp != NULL) { - // Use read() instead of fread(), because if we're reading from the CGI - // pipe, fread() may block until IO buffer is filled up. We cannot afford - // to block and must pass all read bytes immediately to the client. - nread = read(fileno(fp), buf, (size_t) len); -#ifndef NO_SSL - } else if (conn->ssl != NULL) { - nread = SSL_read(conn->ssl, buf, len); -#endif - } else { - nread = recv(conn->client.sock, buf, (size_t) len, 0); + if (client != NULL && client->disp != NULL) { + /* the dispatcher connection handler will in turn close all tunnels */ + client->disp->flags |= MG_F_CLOSE_IMMEDIATELY; + /* this is used as a signal to other tun handlers that the party is over */ + client->disp->user_data = NULL; } - return conn->ctx->stop_flag ? -1 : nread; -} + if (client != NULL && client->reconnect != NULL) { + client->reconnect->flags |= MG_F_CLOSE_IMMEDIATELY; + } -int mg_read(struct mg_connection *conn, void *buf, size_t len) { - int n, buffered_len, nread; - const char *body; + if (client != NULL && client->iface != NULL) { + client->iface->data = NULL; + } - nread = 0; - if (conn->consumed_content < conn->content_len) { - // Adjust number of bytes to read. - int64_t to_read = conn->content_len - conn->consumed_content; - if (to_read < (int64_t) len) { - len = (size_t) to_read; - } + MG_FREE(client); +} - // Return buffered data - body = conn->buf + conn->request_len + conn->consumed_content; - buffered_len = &conn->buf[conn->data_len] - body; - if (buffered_len > 0) { - if (len < (size_t) buffered_len) { - buffered_len = (int) len; - } - memcpy(buf, body, (size_t) buffered_len); - len -= buffered_len; - conn->consumed_content += buffered_len; - nread += buffered_len; - buf = (char *) buf + buffered_len; - } +static struct mg_connection *mg_tun_do_bind(struct mg_tun_client *client, + MG_CB(mg_event_handler_t handler, + void *user_data), + struct mg_bind_opts opts) { + struct mg_connection *lc; + opts.iface = client->iface; + lc = mg_bind_opt(client->mgr, ":1234" /* dummy port */, + MG_CB(handler, user_data), opts); + client->listener = lc; + return lc; +} - // We have returned all buffered data. Read new data from the remote socket. - while (len > 0) { - n = pull(NULL, conn, (char *) buf, (int) len); - if (n < 0) { - nread = n; // Propagate the error - break; - } else if (n == 0) { - break; // No more data to read - } else { - buf = (char *) buf + n; - conn->consumed_content += n; - nread += n; - len -= n; - } - } +struct mg_connection *mg_tun_bind_opt(struct mg_mgr *mgr, + const char *dispatcher, + MG_CB(mg_event_handler_t handler, + void *user_data), + struct mg_bind_opts opts) { +#if MG_ENABLE_SSL + struct mg_tun_ssl_opts ssl = {opts.ssl_cert, opts.ssl_key, opts.ssl_ca_cert}; +#else + struct mg_tun_ssl_opts ssl = {0}; +#endif + struct mg_tun_client *client = mg_tun_create_client(mgr, dispatcher, ssl); + if (client == NULL) { + return NULL; } - return nread; +#if MG_ENABLE_SSL + /* these options don't make sense in the local mouth of the tunnel */ + opts.ssl_cert = NULL; + opts.ssl_key = NULL; + opts.ssl_ca_cert = NULL; +#endif + return mg_tun_do_bind(client, MG_CB(handler, user_data), opts); } -int mg_write(struct mg_connection *conn, const void *buf, size_t len) { - time_t now; - int64_t n, total, allowed; +int mg_tun_parse_frame(void *data, size_t len, struct mg_tun_frame *frame) { + const size_t header_size = sizeof(uint32_t) + sizeof(uint8_t) * 2; + if (len < header_size) { + return -1; + } - if (conn->throttle > 0) { - if ((now = time(NULL)) != conn->last_throttle_time) { - conn->last_throttle_time = now; - conn->last_throttle_bytes = 0; - } - allowed = conn->throttle - conn->last_throttle_bytes; - if (allowed > (int64_t) len) { - allowed = len; - } - if ((total = push(NULL, conn->client.sock, conn->ssl, (const char *) buf, - (int64_t) allowed)) == allowed) { - buf = (char *) buf + total; - conn->last_throttle_bytes += total; - while (total < (int64_t) len && conn->ctx->stop_flag == 0) { - allowed = conn->throttle > (int64_t) len - total ? - (int64_t) len - total : conn->throttle; - if ((n = push(NULL, conn->client.sock, conn->ssl, (const char *) buf, - (int64_t) allowed)) != allowed) { - break; - } - sleep(1); - conn->last_throttle_bytes = allowed; - conn->last_throttle_time = time(NULL); - buf = (char *) buf + n; - total += n; - } - } - } else { - total = push(NULL, conn->client.sock, conn->ssl, (const char *) buf, - (int64_t) len); + frame->type = *(uint8_t *) (data); + frame->flags = *(uint8_t *) ((char *) data + 1); + memcpy(&frame->stream_id, (char *) data + 2, sizeof(uint32_t)); + frame->stream_id = ntohl(frame->stream_id); + frame->body.p = (char *) data + header_size; + frame->body.len = len - header_size; + return 0; +} + +void mg_tun_send_frame(struct mg_connection *ws, uint32_t stream_id, + uint8_t type, uint8_t flags, struct mg_str msg) { + stream_id = htonl(stream_id); + { + struct mg_str parts[] = { + {(char *) &type, sizeof(type)}, + {(char *) &flags, sizeof(flags)}, + {(char *) &stream_id, sizeof(stream_id)}, + {msg.p, msg.len} /* vc6 doesn't like just `msg` here */}; + mg_send_websocket_framev(ws, WEBSOCKET_OP_BINARY, parts, + sizeof(parts) / sizeof(parts[0])); } - return (int) total; } -// Print message to buffer. If buffer is large enough to hold the message, -// return buffer. If buffer is to small, allocate large enough buffer on heap, -// and return allocated buffer. -static int alloc_vprintf(char **buf, size_t size, const char *fmt, va_list ap) { - va_list ap_copy; - int len; +#endif /* MG_ENABLE_TUN */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/sntp.c" +#endif +/* + * Copyright (c) 2016 Cesanta Software Limited + * All rights reserved + */ - // Windows is not standard-compliant, and vsnprintf() returns -1 if - // buffer is too small. Also, older versions of msvcrt.dll do not have - // _vscprintf(). However, if size is 0, vsnprintf() behaves correctly. - // Therefore, we make two passes: on first pass, get required message length. - // On second pass, actually print the message. - va_copy(ap_copy, ap); - len = vsnprintf(NULL, 0, fmt, ap_copy); +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/sntp.h" */ +/* Amalgamated: #include "mongoose/src/util.h" */ - if (len > (int) size && - (size = len + 1) > 0 && - (*buf = (char *) malloc(size)) == NULL) { - len = -1; // Allocation failed, mark failure - } else { - va_copy(ap_copy, ap); - vsnprintf(*buf, size, fmt, ap_copy); - } +#if MG_ENABLE_SNTP - return len; -} +#define SNTP_TIME_OFFSET 2208988800 -int mg_vprintf(struct mg_connection *conn, const char *fmt, va_list ap) { - char mem[MG_BUF_LEN], *buf = mem; - int len; +#ifndef SNTP_TIMEOUT +#define SNTP_TIMEOUT 10 +#endif - if ((len = alloc_vprintf(&buf, sizeof(mem), fmt, ap)) > 0) { - len = mg_write(conn, buf, (size_t) len); - } - if (buf != mem && buf != NULL) { - free(buf); - } +#ifndef SNTP_ATTEMPTS +#define SNTP_ATTEMPTS 3 +#endif - return len; +static uint64_t mg_get_sec(uint64_t val) { + return (val & 0xFFFFFFFF00000000) >> 32; +} + +static uint64_t mg_get_usec(uint64_t val) { + uint64_t tmp = (val & 0x00000000FFFFFFFF); + tmp *= 1000000; + tmp >>= 32; + return tmp; +} + +static void mg_ntp_to_tv(uint64_t val, struct timeval *tv) { + uint64_t tmp; + tmp = mg_get_sec(val); + tmp -= SNTP_TIME_OFFSET; + tv->tv_sec = tmp; + tv->tv_usec = mg_get_usec(val); +} + +static void mg_get_ntp_ts(const char *ntp, uint64_t *val) { + uint32_t tmp; + memcpy(&tmp, ntp, sizeof(tmp)); + tmp = ntohl(tmp); + *val = (uint64_t) tmp << 32; + memcpy(&tmp, ntp + 4, sizeof(tmp)); + tmp = ntohl(tmp); + *val |= tmp; +} + +void mg_sntp_send_request(struct mg_connection *c) { + uint8_t buf[48] = {0}; + /* + * header - 8 bit: + * LI (2 bit) - 3 (not in sync), VN (3 bit) - 4 (version), + * mode (3 bit) - 3 (client) + */ + buf[0] = (3 << 6) | (4 << 3) | 3; + +/* + * Next fields should be empty in client request + * stratum, 8 bit + * poll interval, 8 bit + * rrecision, 8 bit + * root delay, 32 bit + * root dispersion, 32 bit + * ref id, 32 bit + * ref timestamp, 64 bit + * originate Timestamp, 64 bit + * receive Timestamp, 64 bit +*/ + +/* + * convert time to sntp format (sntp starts from 00:00:00 01.01.1900) + * according to rfc868 it is 2208988800L sec + * this information is used to correct roundtrip delay + * but if local clock is absolutely broken (and doesn't work even + * as simple timer), it is better to disable it +*/ +#ifndef MG_SNTP_NO_DELAY_CORRECTION + uint32_t sec; + sec = htonl((uint32_t)(mg_time() + SNTP_TIME_OFFSET)); + memcpy(&buf[40], &sec, sizeof(sec)); +#endif + + mg_send(c, buf, sizeof(buf)); } -int mg_printf(struct mg_connection *conn, const char *fmt, ...) { - va_list ap; - va_start(ap, fmt); - return mg_vprintf(conn, fmt, ap); +#ifndef MG_SNTP_NO_DELAY_CORRECTION +static uint64_t mg_calculate_delay(uint64_t t1, uint64_t t2, uint64_t t3) { + /* roundloop delay = (T4 - T1) - (T3 - T2) */ + uint64_t d1 = ((mg_time() + SNTP_TIME_OFFSET) * 1000000) - + (mg_get_sec(t1) * 1000000 + mg_get_usec(t1)); + uint64_t d2 = (mg_get_sec(t3) * 1000000 + mg_get_usec(t3)) - + (mg_get_sec(t2) * 1000000 + mg_get_usec(t2)); + + return (d1 > d2) ? d1 - d2 : 0; } +#endif -// URL-decode input buffer into destination buffer. -// 0-terminate the destination buffer. Return the length of decoded data. -// form-url-encoded data differs from URI encoding in a way that it -// uses '+' as character for space, see RFC 1866 section 8.2.1 -// http://ftp.ics.uci.edu/pub/ietf/html/rfc1866.txt -static int url_decode(const char *src, int src_len, char *dst, - int dst_len, int is_form_url_encoded) { - int i, j, a, b; -#define HEXTOI(x) (isdigit(x) ? x - '0' : x - 'W') +MG_INTERNAL int mg_sntp_parse_reply(const char *buf, int len, + struct mg_sntp_message *msg) { + uint8_t hdr; + uint64_t trsm_ts_T3, delay = 0; + int mode; + struct timeval tv; - for (i = j = 0; i < src_len && j < dst_len - 1; i++, j++) { - if (src[i] == '%' && i < src_len - 2 && - isxdigit(* (const unsigned char *) (src + i + 1)) && - isxdigit(* (const unsigned char *) (src + i + 2))) { - a = tolower(* (const unsigned char *) (src + i + 1)); - b = tolower(* (const unsigned char *) (src + i + 2)); - dst[j] = (char) ((HEXTOI(a) << 4) | HEXTOI(b)); - i += 2; - } else if (is_form_url_encoded && src[i] == '+') { - dst[j] = ' '; - } else { - dst[j] = src[i]; - } + if (len < 48) { + return -1; } - dst[j] = '\0'; // Null-terminate the destination + hdr = buf[0]; - return i >= src_len ? j : -1; -} + if ((hdr & 0x38) >> 3 != 4) { + /* Wrong version */ + return -1; + } -int mg_get_var(const char *data, size_t data_len, const char *name, - char *dst, size_t dst_len) { - const char *p, *e, *s; - size_t name_len; - int len; + mode = hdr & 0x7; + if (mode != 4 && mode != 5) { + /* Not a server reply */ + return -1; + } - if (dst == NULL || dst_len == 0) { - len = -2; - } else if (data == NULL || name == NULL || data_len == 0) { - len = -1; - dst[0] = '\0'; - } else { - name_len = strlen(name); - e = data + data_len; - len = -1; - dst[0] = '\0'; + memset(msg, 0, sizeof(*msg)); - // data is "var1=val1&var2=val2...". Find variable first - for (p = data; p + name_len < e; p++) { - if ((p == data || p[-1] == '&') && p[name_len] == '=' && - !mg_strncasecmp(name, p, name_len)) { + msg->kiss_of_death = (buf[1] == 0); /* Server asks to not send requests */ - // Point p to variable value - p += name_len + 1; + mg_get_ntp_ts(&buf[40], &trsm_ts_T3); - // Point s to the end of the value - s = (const char *) memchr(p, '&', (size_t)(e - p)); - if (s == NULL) { - s = e; - } - assert(s >= p); +#ifndef MG_SNTP_NO_DELAY_CORRECTION + { + uint64_t orig_ts_T1, recv_ts_T2; + mg_get_ntp_ts(&buf[24], &orig_ts_T1); + mg_get_ntp_ts(&buf[32], &recv_ts_T2); + delay = mg_calculate_delay(orig_ts_T1, recv_ts_T2, trsm_ts_T3); + } +#endif - // Decode variable into destination buffer - len = url_decode(p, (size_t)(s - p), dst, dst_len, 1); + mg_ntp_to_tv(trsm_ts_T3, &tv); - // Redirect error code from -1 to -2 (destination buffer too small). - if (len == -1) { - len = -2; - } - break; - } - } - } + msg->time = (double) tv.tv_sec + (((double) tv.tv_usec + delay) / 1000000.0); - return len; + return 0; } -int mg_get_cookie(const char *cookie_header, const char *var_name, - char *dst, size_t dst_size) { - const char *s, *p, *end; - int name_len, len = -1; +static void mg_sntp_handler(struct mg_connection *c, int ev, + void *ev_data MG_UD_ARG(void *user_data)) { + struct mbuf *io = &c->recv_mbuf; + struct mg_sntp_message msg; - if (dst == NULL || dst_size == 0) { - len = -2; - } else if (var_name == NULL || (s = cookie_header) == NULL) { - len = -1; - dst[0] = '\0'; - } else { - name_len = (int) strlen(var_name); - end = s + strlen(s); - dst[0] = '\0'; + c->handler(c, ev, ev_data MG_UD_ARG(user_data)); - for (; (s = mg_strcasestr(s, var_name)) != NULL; s += name_len) { - if (s[name_len] == '=') { - s += name_len + 1; - if ((p = strchr(s, ' ')) == NULL) - p = end; - if (p[-1] == ';') - p--; - if (*s == '"' && p[-1] == '"' && p > s + 1) { - s++; - p--; - } - if ((size_t) (p - s) < dst_size) { - len = p - s; - mg_strlcpy(dst, s, (size_t) len + 1); - } else { - len = -3; - } - break; + switch (ev) { + case MG_EV_RECV: { + if (mg_sntp_parse_reply(io->buf, io->len, &msg) < 0) { + DBG(("Invalid SNTP packet received (%d)", (int) io->len)); + c->handler(c, MG_SNTP_MALFORMED_REPLY, NULL MG_UD_ARG(user_data)); + } else { + c->handler(c, MG_SNTP_REPLY, (void *) &msg MG_UD_ARG(user_data)); } - } - } - return len; -} -static void convert_uri_to_file_name(struct mg_connection *conn, char *buf, - size_t buf_len, struct file *filep) { - struct vec a, b; - const char *rewrite, *uri = conn->request_info.uri; - char *p; - int match_len; - - // Using buf_len - 1 because memmove() for PATH_INFO may shift part - // of the path one byte on the right. - mg_snprintf(conn, buf, buf_len - 1, "%s%s", conn->ctx->config[DOCUMENT_ROOT], - uri); - - rewrite = conn->ctx->config[REWRITE]; - while ((rewrite = next_option(rewrite, &a, &b)) != NULL) { - if ((match_len = match_prefix(a.ptr, a.len, uri)) > 0) { - mg_snprintf(conn, buf, buf_len - 1, "%.*s%s", (int) b.len, b.ptr, - uri + match_len); + mbuf_remove(io, io->len); break; } } - - if (!mg_stat(conn, buf, filep)) { - // Support PATH_INFO for CGI scripts. - for (p = buf + strlen(buf); p > buf + 1; p--) { - if (*p == '/') { - *p = '\0'; - if (match_prefix(conn->ctx->config[CGI_EXTENSIONS], - strlen(conn->ctx->config[CGI_EXTENSIONS]), buf) > 0 && - mg_stat(conn, buf, filep)) { - // Shift PATH_INFO block one character right, e.g. - // "/x.cgi/foo/bar\x00" => "/x.cgi\x00/foo/bar\x00" - // conn->path_info is pointing to the local variable "path" declared - // in handle_request(), so PATH_INFO is not valid after - // handle_request returns. - conn->path_info = p + 1; - memmove(p + 2, p + 1, strlen(p + 1) + 1); // +1 is for trailing \0 - p[1] = '/'; - break; - } else { - *p = '/'; - } - } - } - } } -// Check whether full request is buffered. Return: -// -1 if request is malformed -// 0 if request is not yet fully buffered -// >0 actual request length, including last \r\n\r\n -int get_request_len(const char *buf, int buflen) { - const char *s, *e; - int len = 0; +int mg_set_protocol_sntp(struct mg_connection *c) { + if ((c->flags & MG_F_UDP) == 0) { + return -1; + } - for (s = buf, e = s + buflen - 1; len <= 0 && s < e; s++) - // Control characters are not allowed but >=128 is. - if (!isprint(* (const unsigned char *) s) && *s != '\r' && - *s != '\n' && * (const unsigned char *) s < 128) { - len = -1; - break; // [i_a] abort scan as soon as one malformed character is found; - // don't let subsequent \r\n\r\n win us over anyhow - } else if (s[0] == '\n' && s[1] == '\n') { - len = (int) (s - buf) + 2; - } else if (s[0] == '\n' && &s[1] < e && - s[1] == '\r' && s[2] == '\n') { - len = (int) (s - buf) + 3; - } + c->proto_handler = mg_sntp_handler; - return len; + return 0; } -// Convert month to the month number. Return -1 on error, or month number -static int get_month_index(const char *s) { - size_t i; +struct mg_connection *mg_sntp_connect(struct mg_mgr *mgr, + MG_CB(mg_event_handler_t event_handler, + void *user_data), + const char *sntp_server_name) { + struct mg_connection *c = NULL; + char url[100], *p_url = url; + const char *proto = "", *port = "", *tmp; - for (i = 0; i < ARRAY_SIZE(month_names); i++) - if (!strcmp(s, month_names[i])) - return (int) i; + /* If port is not specified, use default (123) */ + tmp = strchr(sntp_server_name, ':'); + if (tmp != NULL && *(tmp + 1) == '/') { + tmp = strchr(tmp + 1, ':'); + } - return -1; -} + if (tmp == NULL) { + port = ":123"; + } -static int num_leap_years(int year) { - return year / 4 - year / 100 + year / 400; -} + /* Add udp:// if needed */ + if (strncmp(sntp_server_name, "udp://", 6) != 0) { + proto = "udp://"; + } -// Parse UTC date-time string, and return the corresponding time_t value. -static time_t parse_date_string(const char *datetime) { - static const unsigned short days_before_month[] = { - 0, 31, 59, 90, 120, 151, 181, 212, 243, 273, 304, 334 - }; - char month_str[32]; - int second, minute, hour, day, month, year, leap_days, days; - time_t result = (time_t) 0; + mg_asprintf(&p_url, sizeof(url), "%s%s%s", proto, sntp_server_name, port); - if (((sscanf(datetime, "%d/%3s/%d %d:%d:%d", - &day, month_str, &year, &hour, &minute, &second) == 6) || - (sscanf(datetime, "%d %3s %d %d:%d:%d", - &day, month_str, &year, &hour, &minute, &second) == 6) || - (sscanf(datetime, "%*3s, %d %3s %d %d:%d:%d", - &day, month_str, &year, &hour, &minute, &second) == 6) || - (sscanf(datetime, "%d-%3s-%d %d:%d:%d", - &day, month_str, &year, &hour, &minute, &second) == 6)) && - year > 1970 && - (month = get_month_index(month_str)) != -1) { - leap_days = num_leap_years(year) - num_leap_years(1970); - year -= 1970; - days = year * 365 + days_before_month[month] + (day - 1) + leap_days; - result = days * 24 * 3600 + hour * 3600 + minute * 60 + second; + c = mg_connect(mgr, p_url, event_handler MG_UD_ARG(user_data)); + + if (c == NULL) { + goto cleanup; } - return result; -} + mg_set_protocol_sntp(c); -// Protect against directory disclosure attack by removing '..', -// excessive '/' and '\' characters -static void remove_double_dots_and_double_slashes(char *s) { - char *p = s; - - while (*s != '\0') { - *p++ = *s++; - if (s[-1] == '/' || s[-1] == '\\') { - // Skip all following slashes, backslashes and double-dots - while (s[0] != '\0') { - if (s[0] == '/' || s[0] == '\\') { - s++; - } else if (s[0] == '.' && s[1] == '.') { - s += 2; - } else { - break; - } - } - } +cleanup: + if (p_url != url) { + MG_FREE(p_url); } - *p = '\0'; + + return c; } -static const struct { - const char *extension; - size_t ext_len; - const char *mime_type; -} builtin_mime_types[] = { - {".html", 5, "text/html"}, - {".htm", 4, "text/html"}, - {".shtm", 5, "text/html"}, - {".shtml", 6, "text/html"}, - {".css", 4, "text/css"}, - {".js", 3, "application/x-javascript"}, - {".ico", 4, "image/x-icon"}, - {".gif", 4, "image/gif"}, - {".jpg", 4, "image/jpeg"}, - {".jpeg", 5, "image/jpeg"}, - {".png", 4, "image/png"}, - {".svg", 4, "image/svg+xml"}, - {".txt", 4, "text/plain"}, - {".torrent", 8, "application/x-bittorrent"}, - {".wav", 4, "audio/x-wav"}, - {".mp3", 4, "audio/x-mp3"}, - {".mid", 4, "audio/mid"}, - {".m3u", 4, "audio/x-mpegurl"}, - {".ogg", 4, "audio/ogg"}, - {".ram", 4, "audio/x-pn-realaudio"}, - {".xml", 4, "text/xml"}, - {".json", 5, "text/json"}, - {".xslt", 5, "application/xml"}, - {".xsl", 4, "application/xml"}, - {".ra", 3, "audio/x-pn-realaudio"}, - {".doc", 4, "application/msword"}, - {".exe", 4, "application/octet-stream"}, - {".zip", 4, "application/x-zip-compressed"}, - {".xls", 4, "application/excel"}, - {".tgz", 4, "application/x-tar-gz"}, - {".tar", 4, "application/x-tar"}, - {".gz", 3, "application/x-gunzip"}, - {".arj", 4, "application/x-arj-compressed"}, - {".rar", 4, "application/x-arj-compressed"}, - {".rtf", 4, "application/rtf"}, - {".pdf", 4, "application/pdf"}, - {".swf", 4, "application/x-shockwave-flash"}, - {".mpg", 4, "video/mpeg"}, - {".webm", 5, "video/webm"}, - {".mpeg", 5, "video/mpeg"}, - {".mp4", 4, "video/mp4"}, - {".m4v", 4, "video/x-m4v"}, - {".asf", 4, "video/x-ms-asf"}, - {".avi", 4, "video/x-msvideo"}, - {".bmp", 4, "image/bmp"}, - {NULL, 0, NULL} +struct sntp_data { + mg_event_handler_t hander; + int count; }; -const char *mg_get_builtin_mime_type(const char *path) { - const char *ext; - size_t i, path_len; +static void mg_sntp_util_ev_handler(struct mg_connection *c, int ev, + void *ev_data MG_UD_ARG(void *user_data)) { +#if !MG_ENABLE_CALLBACK_USERDATA + void *user_data = c->user_data; +#endif + struct sntp_data *sd = (struct sntp_data *) user_data; - path_len = strlen(path); + switch (ev) { + case MG_EV_CONNECT: + if (*(int *) ev_data != 0) { + mg_call(c, sd->hander, c->user_data, MG_SNTP_FAILED, NULL); + break; + } + /* fallthrough */ + case MG_EV_TIMER: + if (sd->count <= SNTP_ATTEMPTS) { + mg_sntp_send_request(c); + mg_set_timer(c, mg_time() + 10); + sd->count++; + } else { + mg_call(c, sd->hander, c->user_data, MG_SNTP_FAILED, NULL); + c->flags |= MG_F_CLOSE_IMMEDIATELY; + } + break; + case MG_SNTP_MALFORMED_REPLY: + mg_call(c, sd->hander, c->user_data, MG_SNTP_FAILED, NULL); + c->flags |= MG_F_CLOSE_IMMEDIATELY; + break; + case MG_SNTP_REPLY: + mg_call(c, sd->hander, c->user_data, MG_SNTP_REPLY, ev_data); + c->flags |= MG_F_CLOSE_IMMEDIATELY; + break; + case MG_EV_CLOSE: + MG_FREE(user_data); + c->user_data = NULL; + break; + } +} - for (i = 0; builtin_mime_types[i].extension != NULL; i++) { - ext = path + (path_len - builtin_mime_types[i].ext_len); - if (path_len > builtin_mime_types[i].ext_len && - mg_strcasecmp(ext, builtin_mime_types[i].extension) == 0) { - return builtin_mime_types[i].mime_type; - } +struct mg_connection *mg_sntp_get_time(struct mg_mgr *mgr, + mg_event_handler_t event_handler, + const char *sntp_server_name) { + struct mg_connection *c; + struct sntp_data *sd = (struct sntp_data *) MG_CALLOC(1, sizeof(*sd)); + if (sd == NULL) { + return NULL; } - return "text/plain"; -} + c = mg_sntp_connect(mgr, MG_CB(mg_sntp_util_ev_handler, sd), + sntp_server_name); + if (c == NULL) { + MG_FREE(sd); + return NULL; + } -// Look at the "path" extension and figure what mime type it has. -// Store mime type in the vector. -static void get_mime_type(struct mg_context *ctx, const char *path, - struct vec *vec) { - struct vec ext_vec, mime_vec; - const char *list, *ext; - size_t path_len; + sd->hander = event_handler; +#if !MG_ENABLE_CALLBACK_USERDATA + c->user_data = sd; +#endif - path_len = strlen(path); + return c; +} - // Scan user-defined mime types first, in case user wants to - // override default mime types. - list = ctx->config[EXTRA_MIME_TYPES]; - while ((list = next_option(list, &ext_vec, &mime_vec)) != NULL) { - // ext now points to the path suffix - ext = path + path_len - ext_vec.len; - if (mg_strncasecmp(ext, ext_vec.ptr, ext_vec.len) == 0) { - *vec = mime_vec; - return; +#endif /* MG_ENABLE_SNTP */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/socks.c" +#endif +/* + * Copyright (c) 2017 Cesanta Software Limited + * All rights reserved + */ + +#if MG_ENABLE_SOCKS + +/* Amalgamated: #include "mongoose/src/socks.h" */ +/* Amalgamated: #include "mongoose/src/internal.h" */ + +/* + * https://www.ietf.org/rfc/rfc1928.txt paragraph 3, handle client handshake + * + * +----+----------+----------+ + * |VER | NMETHODS | METHODS | + * +----+----------+----------+ + * | 1 | 1 | 1 to 255 | + * +----+----------+----------+ + */ +static void mg_socks5_handshake(struct mg_connection *c) { + struct mbuf *r = &c->recv_mbuf; + if (r->buf[0] != MG_SOCKS_VERSION) { + c->flags |= MG_F_CLOSE_IMMEDIATELY; + } else if (r->len > 2 && (size_t) r->buf[1] + 2 <= r->len) { + /* https://www.ietf.org/rfc/rfc1928.txt paragraph 3 */ + unsigned char reply[2] = {MG_SOCKS_VERSION, MG_SOCKS_HANDSHAKE_FAILURE}; + int i; + for (i = 2; i < r->buf[1] + 2; i++) { + /* TODO(lsm): support other auth methods */ + if (r->buf[i] == MG_SOCKS_HANDSHAKE_NOAUTH) reply[1] = r->buf[i]; } + mbuf_remove(r, 2 + r->buf[1]); + mg_send(c, reply, sizeof(reply)); + c->flags |= MG_SOCKS_HANDSHAKE_DONE; /* Mark handshake done */ } - - vec->ptr = mg_get_builtin_mime_type(path); - vec->len = strlen(vec->ptr); } -static int is_big_endian(void) { - static const int n = 1; - return ((char *) &n)[0] == 0; +static void disband(struct mg_connection *c) { + struct mg_connection *c2 = (struct mg_connection *) c->user_data; + if (c2 != NULL) { + c2->flags |= MG_F_SEND_AND_CLOSE; + c2->user_data = NULL; + } + c->flags |= MG_F_SEND_AND_CLOSE; + c->user_data = NULL; } -#ifndef HAVE_MD5 -typedef struct MD5Context { - uint32_t buf[4]; - uint32_t bits[2]; - unsigned char in[64]; -} MD5_CTX; - -static void byteReverse(unsigned char *buf, unsigned longs) { - uint32_t t; - - // Forrest: MD5 expect LITTLE_ENDIAN, swap if BIG_ENDIAN - if (is_big_endian()) { - do { - t = (uint32_t) ((unsigned) buf[3] << 8 | buf[2]) << 16 | - ((unsigned) buf[1] << 8 | buf[0]); - * (uint32_t *) buf = t; - buf += 4; - } while (--longs); +static void relay_data(struct mg_connection *c) { + struct mg_connection *c2 = (struct mg_connection *) c->user_data; + if (c2 != NULL) { + mg_send(c2, c->recv_mbuf.buf, c->recv_mbuf.len); + mbuf_remove(&c->recv_mbuf, c->recv_mbuf.len); + } else { + c->flags |= MG_F_SEND_AND_CLOSE; + } +} + +static void serv_ev_handler(struct mg_connection *c, int ev, void *ev_data) { + if (ev == MG_EV_CLOSE) { + disband(c); + } else if (ev == MG_EV_RECV) { + relay_data(c); + } else if (ev == MG_EV_CONNECT) { + int res = *(int *) ev_data; + if (res != 0) LOG(LL_ERROR, ("connect error: %d", res)); + } +} + +static void mg_socks5_connect(struct mg_connection *c, const char *addr) { + struct mg_connection *serv = mg_connect(c->mgr, addr, serv_ev_handler); + serv->user_data = c; + c->user_data = serv; +} + +/* + * Request, https://www.ietf.org/rfc/rfc1928.txt paragraph 4 + * + * +----+-----+-------+------+----------+----------+ + * |VER | CMD | RSV | ATYP | DST.ADDR | DST.PORT | + * +----+-----+-------+------+----------+----------+ + * | 1 | 1 | X'00' | 1 | Variable | 2 | + * +----+-----+-------+------+----------+----------+ + */ +static void mg_socks5_handle_request(struct mg_connection *c) { + struct mbuf *r = &c->recv_mbuf; + unsigned char *p = (unsigned char *) r->buf; + unsigned char addr_len = 4, reply = MG_SOCKS_SUCCESS; + int ver, cmd, atyp; + char addr[300]; + + if (r->len < 8) return; /* return if not fully buffered. min DST.ADDR is 2 */ + ver = p[0]; + cmd = p[1]; + atyp = p[3]; + + /* TODO(lsm): support other commands */ + if (ver != MG_SOCKS_VERSION || cmd != MG_SOCKS_CMD_CONNECT) { + reply = MG_SOCKS_CMD_NOT_SUPPORTED; + } else if (atyp == MG_SOCKS_ADDR_IPV4) { + addr_len = 4; + if (r->len < (size_t) addr_len + 6) return; /* return if not buffered */ + snprintf(addr, sizeof(addr), "%d.%d.%d.%d:%d", p[4], p[5], p[6], p[7], + p[8] << 8 | p[9]); + mg_socks5_connect(c, addr); + } else if (atyp == MG_SOCKS_ADDR_IPV6) { + addr_len = 16; + if (r->len < (size_t) addr_len + 6) return; /* return if not buffered */ + snprintf(addr, sizeof(addr), "[%x:%x:%x:%x:%x:%x:%x:%x]:%d", + p[4] << 8 | p[5], p[6] << 8 | p[7], p[8] << 8 | p[9], + p[10] << 8 | p[11], p[12] << 8 | p[13], p[14] << 8 | p[15], + p[16] << 8 | p[17], p[18] << 8 | p[19], p[20] << 8 | p[21]); + mg_socks5_connect(c, addr); + } else if (atyp == MG_SOCKS_ADDR_DOMAIN) { + addr_len = p[4] + 1; + if (r->len < (size_t) addr_len + 6) return; /* return if not buffered */ + snprintf(addr, sizeof(addr), "%.*s:%d", p[4], p + 5, + p[4 + addr_len] << 8 | p[4 + addr_len + 1]); + mg_socks5_connect(c, addr); + } else { + reply = MG_SOCKS_ADDR_NOT_SUPPORTED; + } + + /* + * Reply, https://www.ietf.org/rfc/rfc1928.txt paragraph 5 + * + * +----+-----+-------+------+----------+----------+ + * |VER | REP | RSV | ATYP | BND.ADDR | BND.PORT | + * +----+-----+-------+------+----------+----------+ + * | 1 | 1 | X'00' | 1 | Variable | 2 | + * +----+-----+-------+------+----------+----------+ + */ + { + unsigned char buf[] = {MG_SOCKS_VERSION, reply, 0}; + mg_send(c, buf, sizeof(buf)); + } + mg_send(c, r->buf + 3, addr_len + 1 + 2); + + mbuf_remove(r, 6 + addr_len); /* Remove request from the input stream */ + c->flags |= MG_SOCKS_CONNECT_DONE; /* Mark ourselves as connected */ +} + +static void socks_handler(struct mg_connection *c, int ev, void *ev_data) { + if (ev == MG_EV_RECV) { + if (!(c->flags & MG_SOCKS_HANDSHAKE_DONE)) mg_socks5_handshake(c); + if (c->flags & MG_SOCKS_HANDSHAKE_DONE && + !(c->flags & MG_SOCKS_CONNECT_DONE)) { + mg_socks5_handle_request(c); + } + if (c->flags & MG_SOCKS_CONNECT_DONE) relay_data(c); + } else if (ev == MG_EV_CLOSE) { + disband(c); } + (void) ev_data; } -#define F1(x, y, z) (z ^ (x & (y ^ z))) -#define F2(x, y, z) F1(z, x, y) -#define F3(x, y, z) (x ^ y ^ z) -#define F4(x, y, z) (y ^ (x | ~z)) - -#define MD5STEP(f, w, x, y, z, data, s) \ - ( w += f(x, y, z) + data, w = w<<s | w>>(32-s), w += x ) - -// Start MD5 accumulation. Set bit count to 0 and buffer to mysterious -// initialization constants. -static void MD5Init(MD5_CTX *ctx) { - ctx->buf[0] = 0x67452301; - ctx->buf[1] = 0xefcdab89; - ctx->buf[2] = 0x98badcfe; - ctx->buf[3] = 0x10325476; - - ctx->bits[0] = 0; - ctx->bits[1] = 0; +void mg_set_protocol_socks(struct mg_connection *c) { + c->proto_handler = socks_handler; } +#endif +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/cc3200/cc3200_libc.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ -static void MD5Transform(uint32_t buf[4], uint32_t const in[16]) { - register uint32_t a, b, c, d; - - a = buf[0]; - b = buf[1]; - c = buf[2]; - d = buf[3]; - - MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); - MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); - MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); - MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); - MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); - MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12); - MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17); - MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22); - MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); - MD5STEP(F1, d, a, b, c, in[9] + 0x8b44f7af, 12); - MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17); - MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22); - MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7); - MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12); - MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17); - MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22); - - MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); - MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); - MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14); - MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20); - MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5); - MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9); - MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14); - MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20); - MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5); - MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9); - MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14); - MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20); - MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5); - MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9); - MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14); - MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20); +#if CS_PLATFORM == CS_P_CC3200 - MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4); - MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11); - MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16); - MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23); - MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4); - MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11); - MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16); - MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23); - MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4); - MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11); - MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16); - MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23); - MD5STEP(F3, a, b, c, d, in[9] + 0xd9d4d039, 4); - MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11); - MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16); - MD5STEP(F3, b, c, d, a, in[2] + 0xc4ac5665, 23); +/* Amalgamated: #include "common/mg_mem.h" */ +#include <stdio.h> +#include <string.h> - MD5STEP(F4, a, b, c, d, in[0] + 0xf4292244, 6); - MD5STEP(F4, d, a, b, c, in[7] + 0x432aff97, 10); - MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15); - MD5STEP(F4, b, c, d, a, in[5] + 0xfc93a039, 21); - MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6); - MD5STEP(F4, d, a, b, c, in[3] + 0x8f0ccc92, 10); - MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15); - MD5STEP(F4, b, c, d, a, in[1] + 0x85845dd1, 21); - MD5STEP(F4, a, b, c, d, in[8] + 0x6fa87e4f, 6); - MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10); - MD5STEP(F4, c, d, a, b, in[6] + 0xa3014314, 15); - MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21); - MD5STEP(F4, a, b, c, d, in[4] + 0xf7537e82, 6); - MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10); - MD5STEP(F4, c, d, a, b, in[2] + 0x2ad7d2bb, 15); - MD5STEP(F4, b, c, d, a, in[9] + 0xeb86d391, 21); +#ifndef __TI_COMPILER_VERSION__ +#include <reent.h> +#include <sys/stat.h> +#include <sys/time.h> +#include <unistd.h> +#endif - buf[0] += a; - buf[1] += b; - buf[2] += c; - buf[3] += d; -} +#include <inc/hw_types.h> +#include <inc/hw_memmap.h> +#include <driverlib/prcm.h> +#include <driverlib/rom.h> +#include <driverlib/rom_map.h> +#include <driverlib/uart.h> +#include <driverlib/utils.h> -static void MD5Update(MD5_CTX *ctx, unsigned char const *buf, unsigned len) { - uint32_t t; +#define CONSOLE_UART UARTA0_BASE - t = ctx->bits[0]; - if ((ctx->bits[0] = t + ((uint32_t) len << 3)) < t) - ctx->bits[1]++; - ctx->bits[1] += len >> 29; +#ifdef __TI_COMPILER_VERSION__ +int asprintf(char **strp, const char *fmt, ...) { + va_list ap; + int len; - t = (t >> 3) & 0x3f; + *strp = MG_MALLOC(BUFSIZ); + if (*strp == NULL) return -1; - if (t) { - unsigned char *p = (unsigned char *) ctx->in + t; + va_start(ap, fmt); + len = vsnprintf(*strp, BUFSIZ, fmt, ap); + va_end(ap); - t = 64 - t; - if (len < t) { - memcpy(p, buf, len); - return; - } - memcpy(p, buf, t); - byteReverse(ctx->in, 16); - MD5Transform(ctx->buf, (uint32_t *) ctx->in); - buf += t; - len -= t; + if (len > 0) { + *strp = MG_REALLOC(*strp, len + 1); + if (*strp == NULL) return -1; } - while (len >= 64) { - memcpy(ctx->in, buf, 64); - byteReverse(ctx->in, 16); - MD5Transform(ctx->buf, (uint32_t *) ctx->in); - buf += 64; - len -= 64; + if (len >= BUFSIZ) { + va_start(ap, fmt); + len = vsnprintf(*strp, len + 1, fmt, ap); + va_end(ap); } - memcpy(ctx->in, buf, len); + return len; } -static void MD5Final(unsigned char digest[16], MD5_CTX *ctx) { - unsigned count; - unsigned char *p; - uint32_t *a; +#if MG_TI_NO_HOST_INTERFACE +time_t HOSTtime() { + struct timeval tp; + gettimeofday(&tp, NULL); + return tp.tv_sec; +} +#endif - count = (ctx->bits[0] >> 3) & 0x3F; +#endif /* __TI_COMPILER_VERSION__ */ - p = ctx->in + count; - *p++ = 0x80; - count = 64 - 1 - count; - if (count < 8) { - memset(p, 0, count); - byteReverse(ctx->in, 16); - MD5Transform(ctx->buf, (uint32_t *) ctx->in); - memset(ctx->in, 0, 56); - } else { - memset(p, 0, count - 8); +void fprint_str(FILE *fp, const char *str) { + while (*str != '\0') { + if (*str == '\n') MAP_UARTCharPut(CONSOLE_UART, '\r'); + MAP_UARTCharPut(CONSOLE_UART, *str++); } - byteReverse(ctx->in, 14); +} - a = (uint32_t *)ctx->in; - a[14] = ctx->bits[0]; - a[15] = ctx->bits[1]; +void _exit(int status) { + fprint_str(stderr, "_exit\n"); + /* cause an unaligned access exception, that will drop you into gdb */ + *(int *) 1 = status; + while (1) + ; /* avoid gcc warning because stdlib abort() has noreturn attribute */ +} - MD5Transform(ctx->buf, (uint32_t *) ctx->in); - byteReverse((unsigned char *) ctx->buf, 4); - memcpy(digest, ctx->buf, 16); - memset((char *) ctx, 0, sizeof(*ctx)); +void _not_implemented(const char *what) { + fprint_str(stderr, what); + fprint_str(stderr, " is not implemented\n"); + _exit(42); } -#endif // !HAVE_MD5 -// Stringify binary data. Output buffer must be twice as big as input, -// because each byte takes 2 bytes in string representation -static void bin2str(char *to, const unsigned char *p, size_t len) { - static const char *hex = "0123456789abcdef"; +int _kill(int pid, int sig) { + (void) pid; + (void) sig; + _not_implemented("_kill"); + return -1; +} - for (; len--; p++) { - *to++ = hex[p[0] >> 4]; - *to++ = hex[p[0] & 0x0f]; - } - *to = '\0'; +int _getpid() { + fprint_str(stderr, "_getpid is not implemented\n"); + return 42; } -// Return stringified MD5 hash for list of strings. Buffer must be 33 bytes. -char *mg_md5(char buf[33], ...) { - unsigned char hash[16]; - const char *p; - va_list ap; - MD5_CTX ctx; +int _isatty(int fd) { + /* 0, 1 and 2 are TTYs. */ + return fd < 2; +} - MD5Init(&ctx); +#endif /* CS_PLATFORM == CS_P_CC3200 */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/msp432/msp432_libc.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ - va_start(ap, buf); - while ((p = va_arg(ap, const char *)) != NULL) { - MD5Update(&ctx, (const unsigned char *) p, (unsigned) strlen(p)); - } - va_end(ap); +#if CS_PLATFORM == CS_P_MSP432 - MD5Final(hash, &ctx); - bin2str(buf, hash, sizeof(hash)); - return buf; +#include <ti/sysbios/BIOS.h> +#include <ti/sysbios/knl/Clock.h> + +int gettimeofday(struct timeval *tp, void *tzp) { + uint32_t ticks = Clock_getTicks(); + tp->tv_sec = ticks / 1000; + tp->tv_usec = (ticks % 1000) * 1000; + return 0; } -// Check the user's password, return 1 if OK -static int check_password(const char *method, const char *ha1, const char *uri, - const char *nonce, const char *nc, const char *cnonce, - const char *qop, const char *response) { - char ha2[32 + 1], expected_response[32 + 1]; +#endif /* CS_PLATFORM == CS_P_MSP432 */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/nrf5/nrf5_libc.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#if (CS_PLATFORM == CS_P_NRF51 || CS_PLATFORM == CS_P_NRF52) && \ + defined(__ARMCC_VERSION) +int gettimeofday(struct timeval *tp, void *tzp) { + /* TODO */ + tp->tv_sec = 0; + tp->tv_usec = 0; + return 0; +} +#endif +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/simplelink/sl_fs_slfs.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ - // Some of the parameters may be NULL - if (method == NULL || nonce == NULL || nc == NULL || cnonce == NULL || - qop == NULL || response == NULL) { - return 0; - } +#ifndef CS_COMMON_PLATFORMS_SIMPLELINK_SL_FS_SLFS_H_ +#define CS_COMMON_PLATFORMS_SIMPLELINK_SL_FS_SLFS_H_ - // NOTE(lsm): due to a bug in MSIE, we do not compare the URI - // TODO(lsm): check for authentication timeout - if (// strcmp(dig->uri, c->ouri) != 0 || - strlen(response) != 32 - // || now - strtoul(dig->nonce, NULL, 10) > 3600 - ) { - return 0; - } +#if defined(MG_FS_SLFS) + +#include <stdio.h> +#ifndef __TI_COMPILER_VERSION__ +#include <unistd.h> +#include <sys/stat.h> +#endif - mg_md5(ha2, method, ":", uri, NULL); - mg_md5(expected_response, ha1, ":", nonce, ":", nc, - ":", cnonce, ":", qop, ":", ha2, NULL); +#define MAX_OPEN_SLFS_FILES 8 - return mg_strcasecmp(response, expected_response) == 0; -} +/* Indirect libc interface - same functions, different names. */ +int fs_slfs_open(const char *pathname, int flags, mode_t mode); +int fs_slfs_close(int fd); +ssize_t fs_slfs_read(int fd, void *buf, size_t count); +ssize_t fs_slfs_write(int fd, const void *buf, size_t count); +int fs_slfs_stat(const char *pathname, struct stat *s); +int fs_slfs_fstat(int fd, struct stat *s); +off_t fs_slfs_lseek(int fd, off_t offset, int whence); +int fs_slfs_unlink(const char *filename); +int fs_slfs_rename(const char *from, const char *to); -// Use the global passwords file, if specified by auth_gpass option, -// or search for .htpasswd in the requested directory. -static void open_auth_file(struct mg_connection *conn, const char *path, - struct file *filep) { - char name[PATH_MAX]; - const char *p, *e, *gpass = conn->ctx->config[GLOBAL_PASSWORDS_FILE]; +void fs_slfs_set_new_file_size(const char *name, size_t size); - if (gpass != NULL) { - // Use global passwords file - if (!mg_fopen(conn, gpass, "r", filep)) { - cry(conn, "fopen(%s): %s", gpass, strerror(ERRNO)); - } - } else if (mg_stat(conn, path, filep) && filep->is_directory) { - mg_snprintf(conn, name, sizeof(name), "%s%c%s", - path, '/', PASSWORDS_FILE_NAME); - mg_fopen(conn, name, "r", filep); - } else { - // Try to find .htpasswd in requested directory. - for (p = path, e = p + strlen(p) - 1; e > p; e--) - if (e[0] == '/') - break; - mg_snprintf(conn, name, sizeof(name), "%.*s%c%s", - (int) (e - p), p, '/', PASSWORDS_FILE_NAME); - mg_fopen(conn, name, "r", filep); - } +#endif /* defined(MG_FS_SLFS) */ + +#endif /* CS_COMMON_PLATFORMS_SIMPLELINK_SL_FS_SLFS_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/simplelink/sl_fs_slfs.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +/* Standard libc interface to TI SimpleLink FS. */ + +#if defined(MG_FS_SLFS) || defined(CC3200_FS_SLFS) + +/* Amalgamated: #include "common/platforms/simplelink/sl_fs_slfs.h" */ + +#include <errno.h> + +#if CS_PLATFORM == CS_P_CC3200 +#include <inc/hw_types.h> +#endif + +/* Amalgamated: #include "common/cs_dbg.h" */ +/* Amalgamated: #include "common/mg_mem.h" */ + +#if SL_MAJOR_VERSION_NUM < 2 +int slfs_open(const unsigned char *fname, uint32_t flags) { + _i32 fh; + _i32 r = sl_FsOpen(fname, flags, NULL /* token */, &fh); + return (r < 0 ? r : fh); +} +#else /* SL_MAJOR_VERSION_NUM >= 2 */ +int slfs_open(const unsigned char *fname, uint32_t flags) { + return sl_FsOpen(fname, flags, NULL /* token */); } +#endif -// Parsed Authorization header -struct ah { - char *user, *uri, *cnonce, *response, *qop, *nc, *nonce; -}; +/* From sl_fs.c */ +int set_errno(int e); +const char *drop_dir(const char *fname, bool *is_slfs); -// Return 1 on success. Always initializes the ah structure. -static int parse_auth_header(struct mg_connection *conn, char *buf, - size_t buf_size, struct ah *ah) { - char *name, *value, *s; - const char *auth_header; +/* + * With SLFS, you have to pre-declare max file size. Yes. Really. + * 64K should be enough for everyone. Right? + */ +#ifndef FS_SLFS_MAX_FILE_SIZE +#define FS_SLFS_MAX_FILE_SIZE (64 * 1024) +#endif - (void) memset(ah, 0, sizeof(*ah)); - if ((auth_header = mg_get_header(conn, "Authorization")) == NULL || - mg_strncasecmp(auth_header, "Digest ", 7) != 0) { - return 0; - } +struct sl_file_size_hint { + char *name; + size_t size; +}; + +struct sl_fd_info { + _i32 fh; + _off_t pos; + size_t size; +}; - // Make modifiable copy of the auth header - (void) mg_strlcpy(buf, auth_header + 7, buf_size); - s = buf; +static struct sl_fd_info s_sl_fds[MAX_OPEN_SLFS_FILES]; +static struct sl_file_size_hint s_sl_file_size_hints[MAX_OPEN_SLFS_FILES]; - // Parse authorization header - for (;;) { - // Gobble initial spaces - while (isspace(* (unsigned char *) s)) { - s++; +static int sl_fs_to_errno(_i32 r) { + DBG(("SL error: %d", (int) r)); + switch (r) { + case SL_FS_OK: + return 0; + case SL_ERROR_FS_FILE_NAME_EXIST: + return EEXIST; + case SL_ERROR_FS_WRONG_FILE_NAME: + return EINVAL; + case SL_ERROR_FS_NO_AVAILABLE_NV_INDEX: + case SL_ERROR_FS_NOT_ENOUGH_STORAGE_SPACE: + return ENOSPC; + case SL_ERROR_FS_FAILED_TO_ALLOCATE_MEM: + return ENOMEM; + case SL_ERROR_FS_FILE_NOT_EXISTS: + return ENOENT; + case SL_ERROR_FS_NOT_SUPPORTED: + return ENOTSUP; + } + return ENXIO; +} + +int fs_slfs_open(const char *pathname, int flags, mode_t mode) { + int fd; + for (fd = 0; fd < MAX_OPEN_SLFS_FILES; fd++) { + if (s_sl_fds[fd].fh <= 0) break; + } + if (fd >= MAX_OPEN_SLFS_FILES) return set_errno(ENOMEM); + struct sl_fd_info *fi = &s_sl_fds[fd]; + + /* + * Apply path manipulations again, in case we got here directly + * (via TI libc's "add_device"). + */ + pathname = drop_dir(pathname, NULL); + + _u32 am = 0; + fi->size = (size_t) -1; + int rw = (flags & 3); + size_t new_size = FS_SLFS_MAX_FILE_SIZE; + if (rw == O_RDONLY) { + SlFsFileInfo_t sl_fi; + _i32 r = sl_FsGetInfo((const _u8 *) pathname, 0, &sl_fi); + if (r == SL_FS_OK) { + fi->size = SL_FI_FILE_SIZE(sl_fi); + } + am = SL_FS_READ; + } else { + if (!(flags & O_TRUNC) || (flags & O_APPEND)) { + // FailFS files cannot be opened for append and will be truncated + // when opened for write. + return set_errno(ENOTSUP); } - name = skip_quoted(&s, "=", " ", 0); - // Value is either quote-delimited, or ends at first comma or space. - if (s[0] == '\"') { - s++; - value = skip_quoted(&s, "\"", " ", '\\'); - if (s[0] == ',') { - s++; + if (flags & O_CREAT) { + size_t i; + for (i = 0; i < MAX_OPEN_SLFS_FILES; i++) { + if (s_sl_file_size_hints[i].name != NULL && + strcmp(s_sl_file_size_hints[i].name, pathname) == 0) { + new_size = s_sl_file_size_hints[i].size; + MG_FREE(s_sl_file_size_hints[i].name); + s_sl_file_size_hints[i].name = NULL; + break; + } } + am = FS_MODE_OPEN_CREATE(new_size, 0); } else { - value = skip_quoted(&s, ", ", " ", 0); // IE uses commas, FF uses spaces - } - if (*name == '\0') { - break; - } - - if (!strcmp(name, "username")) { - ah->user = value; - } else if (!strcmp(name, "cnonce")) { - ah->cnonce = value; - } else if (!strcmp(name, "response")) { - ah->response = value; - } else if (!strcmp(name, "uri")) { - ah->uri = value; - } else if (!strcmp(name, "qop")) { - ah->qop = value; - } else if (!strcmp(name, "nc")) { - ah->nc = value; - } else if (!strcmp(name, "nonce")) { - ah->nonce = value; + am = SL_FS_WRITE; } } - - // CGI needs it as REMOTE_USER - if (ah->user != NULL) { - conn->request_info.remote_user = mg_strdup(ah->user); + fi->fh = slfs_open((_u8 *) pathname, am); + LOG(LL_DEBUG, ("sl_FsOpen(%s, 0x%x) sz %u = %d", pathname, (int) am, + (unsigned int) new_size, (int) fi->fh)); + int r; + if (fi->fh >= 0) { + fi->pos = 0; + r = fd; } else { + r = set_errno(sl_fs_to_errno(fi->fh)); + } + return r; +} + +int fs_slfs_close(int fd) { + struct sl_fd_info *fi = &s_sl_fds[fd]; + if (fi->fh <= 0) return set_errno(EBADF); + _i32 r = sl_FsClose(fi->fh, NULL, NULL, 0); + LOG(LL_DEBUG, ("sl_FsClose(%d) = %d", (int) fi->fh, (int) r)); + s_sl_fds[fd].fh = -1; + return set_errno(sl_fs_to_errno(r)); +} + +ssize_t fs_slfs_read(int fd, void *buf, size_t count) { + struct sl_fd_info *fi = &s_sl_fds[fd]; + if (fi->fh <= 0) return set_errno(EBADF); + /* Simulate EOF. sl_FsRead @ file_size return SL_FS_ERR_OFFSET_OUT_OF_RANGE. + */ + if (fi->pos == fi->size) return 0; + _i32 r = sl_FsRead(fi->fh, fi->pos, buf, count); + DBG(("sl_FsRead(%d, %d, %d) = %d", (int) fi->fh, (int) fi->pos, (int) count, + (int) r)); + if (r >= 0) { + fi->pos += r; + return r; + } + return set_errno(sl_fs_to_errno(r)); +} + +ssize_t fs_slfs_write(int fd, const void *buf, size_t count) { + struct sl_fd_info *fi = &s_sl_fds[fd]; + if (fi->fh <= 0) return set_errno(EBADF); + _i32 r = sl_FsWrite(fi->fh, fi->pos, (_u8 *) buf, count); + DBG(("sl_FsWrite(%d, %d, %d) = %d", (int) fi->fh, (int) fi->pos, (int) count, + (int) r)); + if (r >= 0) { + fi->pos += r; + return r; + } + return set_errno(sl_fs_to_errno(r)); +} + +int fs_slfs_stat(const char *pathname, struct stat *s) { + SlFsFileInfo_t sl_fi; + /* + * Apply path manipulations again, in case we got here directly + * (via TI libc's "add_device"). + */ + pathname = drop_dir(pathname, NULL); + _i32 r = sl_FsGetInfo((const _u8 *) pathname, 0, &sl_fi); + if (r == SL_FS_OK) { + s->st_mode = S_IFREG | 0666; + s->st_nlink = 1; + s->st_size = SL_FI_FILE_SIZE(sl_fi); return 0; } - - return 1; + return set_errno(sl_fs_to_errno(r)); } -static char *mg_fgets(char *buf, size_t size, struct file *filep, char **p) { - char *eof; - size_t len; - - if (filep->membuf != NULL && *p != NULL) { - eof = memchr(*p, '\n', &filep->membuf[filep->size] - *p); - len = (size_t) (eof - *p) > size - 1 ? size - 1 : (size_t) (eof - *p); - memcpy(buf, *p, len); - buf[len] = '\0'; - *p = eof; - return eof; - } else if (filep->fp != NULL) { - return fgets(buf, size, filep->fp); - } else { - return NULL; - } +int fs_slfs_fstat(int fd, struct stat *s) { + struct sl_fd_info *fi = &s_sl_fds[fd]; + if (fi->fh <= 0) return set_errno(EBADF); + s->st_mode = 0666; + s->st_mode = S_IFREG | 0666; + s->st_nlink = 1; + s->st_size = fi->size; + return 0; } -// Authorize against the opened passwords file. Return 1 if authorized. -static int authorize(struct mg_connection *conn, struct file *filep) { - struct ah ah; - char line[256], f_user[256], ha1[256], f_domain[256], buf[MG_BUF_LEN], *p; - - if (!parse_auth_header(conn, buf, sizeof(buf), &ah)) { - return 0; - } - - // Loop over passwords file - p = (char *) filep->membuf; - while (mg_fgets(line, sizeof(line), filep, &p) != NULL) { - if (sscanf(line, "%[^:]:%[^:]:%s", f_user, f_domain, ha1) != 3) { - continue; - } - - if (!strcmp(ah.user, f_user) && - !strcmp(conn->ctx->config[AUTHENTICATION_DOMAIN], f_domain)) - return check_password(conn->request_info.request_method, ha1, ah.uri, - ah.nonce, ah.nc, ah.cnonce, ah.qop, ah.response); +off_t fs_slfs_lseek(int fd, off_t offset, int whence) { + if (s_sl_fds[fd].fh <= 0) return set_errno(EBADF); + switch (whence) { + case SEEK_SET: + s_sl_fds[fd].pos = offset; + break; + case SEEK_CUR: + s_sl_fds[fd].pos += offset; + break; + case SEEK_END: + return set_errno(ENOTSUP); } - return 0; } -// Return 1 if request is authorised, 0 otherwise. -static int check_authorization(struct mg_connection *conn, const char *path) { - char fname[PATH_MAX]; - struct vec uri_vec, filename_vec; - const char *list; - struct file file = STRUCT_FILE_INITIALIZER; - int authorized = 1; +int fs_slfs_unlink(const char *pathname) { + /* + * Apply path manipulations again, in case we got here directly + * (via TI libc's "add_device"). + */ + pathname = drop_dir(pathname, NULL); + return set_errno(sl_fs_to_errno(sl_FsDel((const _u8 *) pathname, 0))); +} - list = conn->ctx->config[PROTECT_URI]; - while ((list = next_option(list, &uri_vec, &filename_vec)) != NULL) { - if (!memcmp(conn->request_info.uri, uri_vec.ptr, uri_vec.len)) { - mg_snprintf(conn, fname, sizeof(fname), "%.*s", - (int) filename_vec.len, filename_vec.ptr); - if (!mg_fopen(conn, fname, "r", &file)) { - cry(conn, "%s: cannot open %s: %s", __func__, fname, strerror(errno)); - } +int fs_slfs_rename(const char *from, const char *to) { + return set_errno(ENOTSUP); +} + +void fs_slfs_set_new_file_size(const char *name, size_t size) { + int i; + for (i = 0; i < MAX_OPEN_SLFS_FILES; i++) { + if (s_sl_file_size_hints[i].name == NULL) { + DBG(("File size hint: %s %d", name, (int) size)); + s_sl_file_size_hints[i].name = strdup(name); + s_sl_file_size_hints[i].size = size; break; } } +} - if (!is_file_opened(&file)) { - open_auth_file(conn, path, &file); - } +#endif /* defined(MG_FS_SLFS) || defined(CC3200_FS_SLFS) */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/simplelink/sl_fs.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ - if (is_file_opened(&file)) { - authorized = authorize(conn, &file); - mg_fclose(&file); - } +#if MG_NET_IF == MG_NET_IF_SIMPLELINK && \ + (defined(MG_FS_SLFS) || defined(MG_FS_SPIFFS)) - return authorized; +int set_errno(int e) { + errno = e; + return (e == 0 ? 0 : -1); } -static void send_authorization_request(struct mg_connection *conn) { - conn->status_code = 401; - mg_printf(conn, - "HTTP/1.1 401 Unauthorized\r\n" - "Content-Length: 0\r\n" - "WWW-Authenticate: Digest qop=\"auth\", " - "realm=\"%s\", nonce=\"%lu\"\r\n\r\n", - conn->ctx->config[AUTHENTICATION_DOMAIN], - (unsigned long) time(NULL)); +const char *drop_dir(const char *fname, bool *is_slfs) { + if (is_slfs != NULL) { + *is_slfs = (strncmp(fname, "SL:", 3) == 0); + if (*is_slfs) fname += 3; + } + /* Drop "./", if any */ + if (fname[0] == '.' && fname[1] == '/') { + fname += 2; + } + /* + * Drop / if it is the only one in the path. + * This allows use of /pretend/directories but serves /file.txt as normal. + */ + if (fname[0] == '/' && strchr(fname + 1, '/') == NULL) { + fname++; + } + return fname; } -static int is_authorized_for_put(struct mg_connection *conn) { - struct file file = STRUCT_FILE_INITIALIZER; - const char *passfile = conn->ctx->config[PUT_DELETE_PASSWORDS_FILE]; - int ret = 0; +#if !defined(MG_FS_NO_VFS) - if (passfile != NULL && mg_fopen(conn, passfile, "r", &file)) { - ret = authorize(conn, &file); - mg_fclose(&file); - } +#include <errno.h> +#include <stdbool.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#ifdef __TI_COMPILER_VERSION__ +#include <file.h> +#endif - return ret; -} +/* Amalgamated: #include "common/cs_dbg.h" */ +/* Amalgamated: #include "common/platform.h" */ -int mg_modify_passwords_file(const char *fname, const char *domain, - const char *user, const char *pass) { - int found; - char line[512], u[512], d[512], ha1[33], tmp[PATH_MAX]; - FILE *fp, *fp2; +#ifdef CC3200_FS_SPIFFS +/* Amalgamated: #include "cc3200_fs_spiffs.h" */ +#endif - found = 0; - fp = fp2 = NULL; +#ifdef MG_FS_SLFS +/* Amalgamated: #include "sl_fs_slfs.h" */ +#endif - // Regard empty password as no password - remove user record. - if (pass != NULL && pass[0] == '\0') { - pass = NULL; +#define NUM_SYS_FDS 3 +#define SPIFFS_FD_BASE 10 +#define SLFS_FD_BASE 100 + +#if !defined(MG_UART_CHAR_PUT) && !defined(MG_UART_WRITE) +#if CS_PLATFORM == CS_P_CC3200 +#include <inc/hw_types.h> +#include <inc/hw_memmap.h> +#include <driverlib/rom.h> +#include <driverlib/rom_map.h> +#include <driverlib/uart.h> +#define MG_UART_CHAR_PUT(fd, c) MAP_UARTCharPut(UARTA0_BASE, c); +#else +#define MG_UART_WRITE(fd, buf, len) +#endif /* CS_PLATFORM == CS_P_CC3200 */ +#endif /* !MG_UART_CHAR_PUT */ + +enum fd_type { + FD_INVALID, + FD_SYS, +#ifdef CC3200_FS_SPIFFS + FD_SPIFFS, +#endif +#ifdef MG_FS_SLFS + FD_SLFS +#endif +}; +static int fd_type(int fd) { + if (fd >= 0 && fd < NUM_SYS_FDS) return FD_SYS; +#ifdef CC3200_FS_SPIFFS + if (fd >= SPIFFS_FD_BASE && fd < SPIFFS_FD_BASE + MAX_OPEN_SPIFFS_FILES) { + return FD_SPIFFS; } +#endif +#ifdef MG_FS_SLFS + if (fd >= SLFS_FD_BASE && fd < SLFS_FD_BASE + MAX_OPEN_SLFS_FILES) { + return FD_SLFS; + } +#endif + return FD_INVALID; +} - (void) snprintf(tmp, sizeof(tmp), "%s.tmp", fname); +#if MG_TI_NO_HOST_INTERFACE +int open(const char *pathname, unsigned flags, int mode) { +#else +int _open(const char *pathname, int flags, mode_t mode) { +#endif + int fd = -1; + bool is_sl; + const char *fname = drop_dir(pathname, &is_sl); + if (is_sl) { +#ifdef MG_FS_SLFS + fd = fs_slfs_open(fname, flags, mode); + if (fd >= 0) fd += SLFS_FD_BASE; +#endif + } else { +#ifdef CC3200_FS_SPIFFS + fd = fs_spiffs_open(fname, flags, mode); + if (fd >= 0) fd += SPIFFS_FD_BASE; +#endif + } + LOG(LL_DEBUG, + ("open(%s, 0x%x) = %d, fname = %s", pathname, flags, fd, fname)); + return fd; +} + +int _stat(const char *pathname, struct stat *st) { + int res = -1; + bool is_sl; + const char *fname = drop_dir(pathname, &is_sl); + memset(st, 0, sizeof(*st)); + /* Simulate statting the root directory. */ + if (fname[0] == '\0' || strcmp(fname, ".") == 0) { + st->st_ino = 0; + st->st_mode = S_IFDIR | 0777; + st->st_nlink = 1; + st->st_size = 0; + return 0; + } + if (is_sl) { +#ifdef MG_FS_SLFS + res = fs_slfs_stat(fname, st); +#endif + } else { +#ifdef CC3200_FS_SPIFFS + res = fs_spiffs_stat(fname, st); +#endif + } + LOG(LL_DEBUG, ("stat(%s) = %d; fname = %s", pathname, res, fname)); + return res; +} - // Create the file if does not exist - if ((fp = fopen(fname, "a+")) != NULL) { - (void) fclose(fp); +#if MG_TI_NO_HOST_INTERFACE +int close(int fd) { +#else +int _close(int fd) { +#endif + int r = -1; + switch (fd_type(fd)) { + case FD_INVALID: + r = set_errno(EBADF); + break; + case FD_SYS: + r = set_errno(EACCES); + break; +#ifdef CC3200_FS_SPIFFS + case FD_SPIFFS: + r = fs_spiffs_close(fd - SPIFFS_FD_BASE); + break; +#endif +#ifdef MG_FS_SLFS + case FD_SLFS: + r = fs_slfs_close(fd - SLFS_FD_BASE); + break; +#endif } + DBG(("close(%d) = %d", fd, r)); + return r; +} - // Open the given file and temporary file - if ((fp = fopen(fname, "r")) == NULL) { - return 0; - } else if ((fp2 = fopen(tmp, "w+")) == NULL) { - fclose(fp); - return 0; +#if MG_TI_NO_HOST_INTERFACE +off_t lseek(int fd, off_t offset, int whence) { +#else +off_t _lseek(int fd, off_t offset, int whence) { +#endif + int r = -1; + switch (fd_type(fd)) { + case FD_INVALID: + r = set_errno(EBADF); + break; + case FD_SYS: + r = set_errno(ESPIPE); + break; +#ifdef CC3200_FS_SPIFFS + case FD_SPIFFS: + r = fs_spiffs_lseek(fd - SPIFFS_FD_BASE, offset, whence); + break; +#endif +#ifdef MG_FS_SLFS + case FD_SLFS: + r = fs_slfs_lseek(fd - SLFS_FD_BASE, offset, whence); + break; +#endif } + DBG(("lseek(%d, %d, %d) = %d", fd, (int) offset, whence, r)); + return r; +} - // Copy the stuff to temporary file - while (fgets(line, sizeof(line), fp) != NULL) { - if (sscanf(line, "%[^:]:%[^:]:%*s", u, d) != 2) { - continue; +int _fstat(int fd, struct stat *s) { + int r = -1; + memset(s, 0, sizeof(*s)); + switch (fd_type(fd)) { + case FD_INVALID: + r = set_errno(EBADF); + break; + case FD_SYS: { + /* Create barely passable stats for STD{IN,OUT,ERR}. */ + memset(s, 0, sizeof(*s)); + s->st_ino = fd; + s->st_mode = S_IFCHR | 0666; + r = 0; + break; } +#ifdef CC3200_FS_SPIFFS + case FD_SPIFFS: + r = fs_spiffs_fstat(fd - SPIFFS_FD_BASE, s); + break; +#endif +#ifdef MG_FS_SLFS + case FD_SLFS: + r = fs_slfs_fstat(fd - SLFS_FD_BASE, s); + break; +#endif + } + DBG(("fstat(%d) = %d", fd, r)); + return r; +} - if (!strcmp(u, user) && !strcmp(d, domain)) { - found++; - if (pass != NULL) { - mg_md5(ha1, user, ":", domain, ":", pass, NULL); - fprintf(fp2, "%s:%s:%s\n", user, domain, ha1); +#if MG_TI_NO_HOST_INTERFACE +int read(int fd, char *buf, unsigned count) { +#else +ssize_t _read(int fd, void *buf, size_t count) { +#endif + int r = -1; + switch (fd_type(fd)) { + case FD_INVALID: + r = set_errno(EBADF); + break; + case FD_SYS: { + if (fd != 0) { + r = set_errno(EACCES); + break; } - } else { - fprintf(fp2, "%s", line); + /* Should we allow reading from stdin = uart? */ + r = set_errno(ENOTSUP); + break; } +#ifdef CC3200_FS_SPIFFS + case FD_SPIFFS: + r = fs_spiffs_read(fd - SPIFFS_FD_BASE, buf, count); + break; +#endif +#ifdef MG_FS_SLFS + case FD_SLFS: + r = fs_slfs_read(fd - SLFS_FD_BASE, buf, count); + break; +#endif } - - // If new user, just add it - if (!found && pass != NULL) { - mg_md5(ha1, user, ":", domain, ":", pass, NULL); - fprintf(fp2, "%s:%s:%s\n", user, domain, ha1); - } - - // Close files - fclose(fp); - fclose(fp2); - - // Put the temp file in place of real file - remove(fname); - rename(tmp, fname); - - return 1; + DBG(("read(%d, %u) = %d", fd, count, r)); + return r; } -struct de { - struct mg_connection *conn; - char *file_name; - struct file file; -}; - -static void url_encode(const char *src, char *dst, size_t dst_len) { - static const char *dont_escape = "._-$,;~()"; - static const char *hex = "0123456789abcdef"; - const char *end = dst + dst_len - 1; - - for (; *src != '\0' && dst < end; src++, dst++) { - if (isalnum(*(const unsigned char *) src) || - strchr(dont_escape, * (const unsigned char *) src) != NULL) { - *dst = *src; - } else if (dst + 2 < end) { - dst[0] = '%'; - dst[1] = hex[(* (const unsigned char *) src) >> 4]; - dst[2] = hex[(* (const unsigned char *) src) & 0xf]; - dst += 2; +#if MG_TI_NO_HOST_INTERFACE +int write(int fd, const char *buf, unsigned count) { +#else +ssize_t _write(int fd, const void *buf, size_t count) { +#endif + int r = -1; + switch (fd_type(fd)) { + case FD_INVALID: + r = set_errno(EBADF); + break; + case FD_SYS: { + if (fd == 0) { + r = set_errno(EACCES); + break; + } +#ifdef MG_UART_WRITE + MG_UART_WRITE(fd, buf, count); +#elif defined(MG_UART_CHAR_PUT) + { + size_t i; + for (i = 0; i < count; i++) { + const char c = ((const char *) buf)[i]; + if (c == '\n') MG_UART_CHAR_PUT(fd, '\r'); + MG_UART_CHAR_PUT(fd, c); + } + } +#endif + r = count; + break; } +#ifdef CC3200_FS_SPIFFS + case FD_SPIFFS: + r = fs_spiffs_write(fd - SPIFFS_FD_BASE, buf, count); + break; +#endif +#ifdef MG_FS_SLFS + case FD_SLFS: + r = fs_slfs_write(fd - SLFS_FD_BASE, buf, count); + break; +#endif } - - *dst = '\0'; + return r; +} + +/* + * On Newlib we override rename directly too, because the default + * implementation using _link and _unlink doesn't work for us. + */ +#if MG_TI_NO_HOST_INTERFACE || defined(_NEWLIB_VERSION) +int rename(const char *frompath, const char *topath) { + int r = -1; + bool is_sl_from, is_sl_to; + const char *from = drop_dir(frompath, &is_sl_from); + const char *to = drop_dir(topath, &is_sl_to); + if (is_sl_from || is_sl_to) { + set_errno(ENOTSUP); + } else { +#ifdef CC3200_FS_SPIFFS + r = fs_spiffs_rename(from, to); +#endif + } + DBG(("rename(%s, %s) = %d", from, to, r)); + return r; } +#endif /* MG_TI_NO_HOST_INTERFACE || defined(_NEWLIB_VERSION) */ -static void print_dir_entry(struct de *de) { - char size[64], mod[64], href[PATH_MAX]; - - if (de->file.is_directory) { - mg_snprintf(de->conn, size, sizeof(size), "%s", "[DIRECTORY]"); +#if MG_TI_NO_HOST_INTERFACE +int unlink(const char *pathname) { +#else +int _unlink(const char *pathname) { +#endif + int r = -1; + bool is_sl; + const char *fname = drop_dir(pathname, &is_sl); + if (is_sl) { +#ifdef MG_FS_SLFS + r = fs_slfs_unlink(fname); +#endif } else { - // We use (signed) cast below because MSVC 6 compiler cannot - // convert unsigned __int64 to double. Sigh. - if (de->file.size < 1024) { - mg_snprintf(de->conn, size, sizeof(size), "%d", (int) de->file.size); - } else if (de->file.size < 0x100000) { - mg_snprintf(de->conn, size, sizeof(size), - "%.1fk", (double) de->file.size / 1024.0); - } else if (de->file.size < 0x40000000) { - mg_snprintf(de->conn, size, sizeof(size), - "%.1fM", (double) de->file.size / 1048576); - } else { - mg_snprintf(de->conn, size, sizeof(size), - "%.1fG", (double) de->file.size / 1073741824); - } +#ifdef CC3200_FS_SPIFFS + r = fs_spiffs_unlink(fname); +#endif } - strftime(mod, sizeof(mod), "%d-%b-%Y %H:%M", - localtime(&de->file.modification_time)); - url_encode(de->file_name, href, sizeof(href)); - de->conn->num_bytes_sent += mg_printf(de->conn, - "<tr><td><a href=\"%s%s%s\">%s%s</a></td>" - "<td> %s</td><td> %s</td></tr>\n", - de->conn->request_info.uri, href, de->file.is_directory ? "/" : "", - de->file_name, de->file.is_directory ? "/" : "", mod, size); + DBG(("unlink(%s) = %d, fname = %s", pathname, r, fname)); + return r; } -// This function is called from send_directory() and used for -// sorting directory entries by size, or name, or modification time. -// On windows, __cdecl specification is needed in case if project is built -// with __stdcall convention. qsort always requires __cdels callback. -static int WINCDECL compare_dir_entries(const void *p1, const void *p2) { - const struct de *a = (const struct de *) p1, *b = (const struct de *) p2; - const char *query_string = a->conn->request_info.query_string; - int cmp_result = 0; - - if (query_string == NULL) { - query_string = "na"; +#ifdef CC3200_FS_SPIFFS /* FailFS does not support listing files. */ +DIR *opendir(const char *dir_name) { + DIR *r = NULL; + bool is_sl; + drop_dir(dir_name, &is_sl); + if (is_sl) { + r = NULL; + set_errno(ENOTSUP); + } else { + r = fs_spiffs_opendir(dir_name); } + DBG(("opendir(%s) = %p", dir_name, r)); + return r; +} - if (a->file.is_directory && !b->file.is_directory) { - return -1; // Always put directories on top - } else if (!a->file.is_directory && b->file.is_directory) { - return 1; // Always put directories on top - } else if (*query_string == 'n') { - cmp_result = strcmp(a->file_name, b->file_name); - } else if (*query_string == 's') { - cmp_result = a->file.size == b->file.size ? 0 : - a->file.size > b->file.size ? 1 : -1; - } else if (*query_string == 'd') { - cmp_result = a->file.modification_time == b->file.modification_time ? 0 : - a->file.modification_time > b->file.modification_time ? 1 : -1; - } +struct dirent *readdir(DIR *dir) { + struct dirent *res = fs_spiffs_readdir(dir); + DBG(("readdir(%p) = %p", dir, res)); + return res; +} - return query_string[1] == 'd' ? -cmp_result : cmp_result; +int closedir(DIR *dir) { + int res = fs_spiffs_closedir(dir); + DBG(("closedir(%p) = %d", dir, res)); + return res; } -static int must_hide_file(struct mg_connection *conn, const char *path) { - const char *pw_pattern = "**" PASSWORDS_FILE_NAME "$"; - const char *pattern = conn->ctx->config[HIDE_FILES]; - return match_prefix(pw_pattern, strlen(pw_pattern), path) > 0 || - (pattern != NULL && match_prefix(pattern, strlen(pattern), path) > 0); +int rmdir(const char *path) { + return fs_spiffs_rmdir(path); } -static int scan_directory(struct mg_connection *conn, const char *dir, - void *data, void (*cb)(struct de *, void *)) { - char path[PATH_MAX]; - struct dirent *dp; - DIR *dirp; - struct de de; +int mkdir(const char *path, mode_t mode) { + (void) path; + (void) mode; + /* for spiffs supports only root dir, which comes from mongoose as '.' */ + return (strlen(path) == 1 && *path == '.') ? 0 : ENOTDIR; +} +#endif - if ((dirp = opendir(dir)) == NULL) { - return 0; - } else { - de.conn = conn; +int sl_fs_init(void) { + int ret = 1; +#ifdef __TI_COMPILER_VERSION__ +#ifdef MG_FS_SLFS +#pragma diag_push +#pragma diag_suppress 169 /* Nothing we can do about the prototype mismatch. \ + */ + ret = (add_device("SL", _MSA, fs_slfs_open, fs_slfs_close, fs_slfs_read, + fs_slfs_write, fs_slfs_lseek, fs_slfs_unlink, + fs_slfs_rename) == 0); +#pragma diag_pop +#endif +#endif + return ret; +} - while ((dp = readdir(dirp)) != NULL) { - // Do not show current dir and hidden files - if (!strcmp(dp->d_name, ".") || - !strcmp(dp->d_name, "..") || - must_hide_file(conn, dp->d_name)) { - continue; - } +#endif /* !defined(MG_FS_NO_VFS) */ +#endif /* MG_NET_IF == MG_NET_IF_SIMPLELINK && (defined(MG_FS_SLFS) || \ + defined(MG_FS_SPIFFS)) */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/simplelink/sl_socket.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ - mg_snprintf(conn, path, sizeof(path), "%s%c%s", dir, '/', dp->d_name); +#if MG_NET_IF == MG_NET_IF_SIMPLELINK - // If we don't memset stat structure to zero, mtime will have - // garbage and strftime() will segfault later on in - // print_dir_entry(). memset is required only if mg_stat() - // fails. For more details, see - // http://code.google.com/p/mongoose/issues/detail?id=79 - memset(&de.file, 0, sizeof(de.file)); - mg_stat(conn, path, &de.file); +#include <errno.h> +#include <stdio.h> - de.file_name = dp->d_name; - cb(&de, data); - } - (void) closedir(dirp); +/* Amalgamated: #include "common/platform.h" */ + +const char *inet_ntop(int af, const void *src, char *dst, socklen_t size) { + int res; + struct in_addr *in = (struct in_addr *) src; + if (af != AF_INET) { + errno = ENOTSUP; + return NULL; } - return 1; + res = snprintf(dst, size, "%lu.%lu.%lu.%lu", SL_IPV4_BYTE(in->s_addr, 0), + SL_IPV4_BYTE(in->s_addr, 1), SL_IPV4_BYTE(in->s_addr, 2), + SL_IPV4_BYTE(in->s_addr, 3)); + return res > 0 ? dst : NULL; } -struct dir_scan_data { - struct de *entries; - int num_entries; - int arr_size; -}; - -static void dir_scan_callback(struct de *de, void *data) { - struct dir_scan_data *dsd = (struct dir_scan_data *) data; +char *inet_ntoa(struct in_addr n) { + static char a[16]; + return (char *) inet_ntop(AF_INET, &n, a, sizeof(a)); +} - if (dsd->entries == NULL || dsd->num_entries >= dsd->arr_size) { - dsd->arr_size *= 2; - dsd->entries = (struct de *) realloc(dsd->entries, dsd->arr_size * - sizeof(dsd->entries[0])); +int inet_pton(int af, const char *src, void *dst) { + uint32_t a0, a1, a2, a3; + uint8_t *db = (uint8_t *) dst; + if (af != AF_INET) { + errno = ENOTSUP; + return 0; } - if (dsd->entries == NULL) { - // TODO(lsm): propagate an error to the caller - dsd->num_entries = 0; - } else { - dsd->entries[dsd->num_entries].file_name = mg_strdup(de->file_name); - dsd->entries[dsd->num_entries].file = de->file; - dsd->entries[dsd->num_entries].conn = de->conn; - dsd->num_entries++; + if (sscanf(src, "%lu.%lu.%lu.%lu", &a0, &a1, &a2, &a3) != 4) { + return 0; } + *db = a3; + *(db + 1) = a2; + *(db + 2) = a1; + *(db + 3) = a0; + return 1; } -static void handle_directory_request(struct mg_connection *conn, - const char *dir) { - int i, sort_direction; - struct dir_scan_data data = { NULL, 0, 128 }; +#endif /* MG_NET_IF == MG_NET_IF_SIMPLELINK */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/simplelink/sl_mg_task.c" +#endif +#if MG_NET_IF == MG_NET_IF_SIMPLELINK && !defined(MG_SIMPLELINK_NO_OSI) - if (!scan_directory(conn, dir, &data, dir_scan_callback)) { - send_http_error(conn, 500, "Cannot open directory", - "Error: opendir(%s): %s", dir, strerror(ERRNO)); - return; - } +/* Amalgamated: #include "mg_task.h" */ - sort_direction = conn->request_info.query_string != NULL && - conn->request_info.query_string[1] == 'd' ? 'a' : 'd'; - - conn->must_close = 1; - mg_printf(conn, "%s", - "HTTP/1.1 200 OK\r\n" - "Connection: close\r\n" - "Content-Type: text/html; charset=utf-8\r\n\r\n"); - - conn->num_bytes_sent += mg_printf(conn, - "<html><head><title>Index of %s</title>" - "<style>th {text-align: left;}</style></head>" - "<body><h1>Index of %s</h1><pre><table cellpadding=\"0\">" - "<tr><th><a href=\"?n%c\">Name</a></th>" - "<th><a href=\"?d%c\">Modified</a></th>" - "<th><a href=\"?s%c\">Size</a></th></tr>" - "<tr><td colspan=\"3\"><hr></td></tr>", - conn->request_info.uri, conn->request_info.uri, - sort_direction, sort_direction, sort_direction); - - // Print first entry - link to a parent directory - conn->num_bytes_sent += mg_printf(conn, - "<tr><td><a href=\"%s%s\">%s</a></td>" - "<td> %s</td><td> %s</td></tr>\n", - conn->request_info.uri, "..", "Parent directory", "-", "-"); - - // Sort and print directory entries - qsort(data.entries, (size_t) data.num_entries, sizeof(data.entries[0]), - compare_dir_entries); - for (i = 0; i < data.num_entries; i++) { - print_dir_entry(&data.entries[i]); - free(data.entries[i].file_name); - } - free(data.entries); - - conn->num_bytes_sent += mg_printf(conn, "%s", "</table></body></html>"); - conn->status_code = 200; -} - -// Send len bytes from the opened file to the client. -static void send_file_data(struct mg_connection *conn, struct file *filep, - int64_t offset, int64_t len) { - char buf[MG_BUF_LEN]; - int to_read, num_read, num_written; - - if (len > 0 && filep->membuf != NULL && filep->size > 0) { - if (len > filep->size - offset) { - len = filep->size - offset; - } - mg_write(conn, filep->membuf + offset, (size_t) len); - } else if (len > 0 && filep->fp != NULL) { - fseeko(filep->fp, offset, SEEK_SET); - while (len > 0) { - // Calculate how much to read from the file in the buffer - to_read = sizeof(buf); - if ((int64_t) to_read > len) { - to_read = (int) len; - } - - // Read from file, exit the loop on error - if ((num_read = fread(buf, 1, (size_t) to_read, filep->fp)) <= 0) { - break; - } +#include <oslib/osi.h> - // Send read bytes to the client, exit the loop on error - if ((num_written = mg_write(conn, buf, (size_t) num_read)) != num_read) { - break; +enum mg_q_msg_type { + MG_Q_MSG_CB, +}; +struct mg_q_msg { + enum mg_q_msg_type type; + void (*cb)(struct mg_mgr *mgr, void *arg); + void *arg; +}; +static OsiMsgQ_t s_mg_q; +static void mg_task(void *arg); + +bool mg_start_task(int priority, int stack_size, mg_init_cb mg_init) { + if (osi_MsgQCreate(&s_mg_q, "MG", sizeof(struct mg_q_msg), 16) != OSI_OK) { + return false; + } + if (osi_TaskCreate(mg_task, (const signed char *) "MG", stack_size, + (void *) mg_init, priority, NULL) != OSI_OK) { + return false; + } + return true; +} + +static void mg_task(void *arg) { + struct mg_mgr mgr; + mg_init_cb mg_init = (mg_init_cb) arg; + mg_mgr_init(&mgr, NULL); + mg_init(&mgr); + while (1) { + struct mg_q_msg msg; + mg_mgr_poll(&mgr, 1); + if (osi_MsgQRead(&s_mg_q, &msg, 1) != OSI_OK) continue; + switch (msg.type) { + case MG_Q_MSG_CB: { + msg.cb(&mgr, msg.arg); } - - // Both read and were successful, adjust counters - conn->num_bytes_sent += num_written; - len -= num_written; } } } -static int parse_range_header(const char *header, int64_t *a, int64_t *b) { - return sscanf(header, "bytes=%" INT64_FMT "-%" INT64_FMT, a, b); +void mg_run_in_task(void (*cb)(struct mg_mgr *mgr, void *arg), void *cb_arg) { + struct mg_q_msg msg = {MG_Q_MSG_CB, cb, cb_arg}; + osi_MsgQWrite(&s_mg_q, &msg, OSI_NO_WAIT); } -static void gmt_time_string(char *buf, size_t buf_len, time_t *t) { - strftime(buf, buf_len, "%a, %d %b %Y %H:%M:%S GMT", gmtime(t)); -} +#endif /* MG_NET_IF == MG_NET_IF_SIMPLELINK && !defined(MG_SIMPLELINK_NO_OSI) \ + */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/simplelink/sl_net_if.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_SIMPLELINK_SL_NET_IF_H_ +#define CS_COMMON_PLATFORMS_SIMPLELINK_SL_NET_IF_H_ + +/* Amalgamated: #include "mongoose/src/net_if.h" */ -static void construct_etag(char *buf, size_t buf_len, - const struct file *filep) { - snprintf(buf, buf_len, "\"%lx.%" INT64_FMT "\"", - (unsigned long) filep->modification_time, filep->size); +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +#ifndef MG_ENABLE_NET_IF_SIMPLELINK +#define MG_ENABLE_NET_IF_SIMPLELINK MG_NET_IF == MG_NET_IF_SIMPLELINK +#endif + +extern const struct mg_iface_vtable mg_simplelink_iface_vtable; + +#ifdef __cplusplus } +#endif /* __cplusplus */ -static void fclose_on_exec(struct file *filep) { - if (filep != NULL && filep->fp != NULL) { -#ifndef _WIN32 - fcntl(fileno(filep->fp), F_SETFD, FD_CLOEXEC); +#endif /* CS_COMMON_PLATFORMS_SIMPLELINK_SL_NET_IF_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/simplelink/sl_net_if.c" #endif - } +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +/* Amalgamated: #include "common/platforms/simplelink/sl_net_if.h" */ + +#if MG_ENABLE_NET_IF_SIMPLELINK + +/* Amalgamated: #include "mongoose/src/internal.h" */ +/* Amalgamated: #include "mongoose/src/util.h" */ + +#define MG_TCP_RECV_BUFFER_SIZE 1024 +#define MG_UDP_RECV_BUFFER_SIZE 1500 + +static sock_t mg_open_listening_socket(struct mg_connection *nc, + union socket_address *sa, int type, + int proto); + +void mg_set_non_blocking_mode(sock_t sock) { + SlSockNonblocking_t opt; +#if SL_MAJOR_VERSION_NUM < 2 + opt.NonblockingEnabled = 1; +#else + opt.NonBlockingEnabled = 1; +#endif + sl_SetSockOpt(sock, SL_SOL_SOCKET, SL_SO_NONBLOCKING, &opt, sizeof(opt)); } -static void handle_file_request(struct mg_connection *conn, const char *path, - struct file *filep) { - char date[64], lm[64], etag[64], range[64]; - const char *msg = "OK", *hdr; - time_t curtime = time(NULL); - int64_t cl, r1, r2; - struct vec mime_vec; - int n; +static int mg_is_error(int n) { + return (n < 0 && n != SL_ERROR_BSD_EALREADY && n != SL_ERROR_BSD_EAGAIN); +} - get_mime_type(conn->ctx, path, &mime_vec); - cl = filep->size; - conn->status_code = 200; - range[0] = '\0'; +void mg_sl_if_connect_tcp(struct mg_connection *nc, + const union socket_address *sa) { + int proto = 0; + if (nc->flags & MG_F_SSL) proto = SL_SEC_SOCKET; + sock_t sock = sl_Socket(AF_INET, SOCK_STREAM, proto); + if (sock < 0) { + nc->err = sock; + goto out; + } + mg_sock_set(nc, sock); +#if MG_ENABLE_SSL + nc->err = sl_set_ssl_opts(sock, nc); + if (nc->err != 0) goto out; +#endif + nc->err = sl_Connect(sock, &sa->sa, sizeof(sa->sin)); +out: + DBG(("%p to %s:%d sock %d %d err %d", nc, inet_ntoa(sa->sin.sin_addr), + ntohs(sa->sin.sin_port), nc->sock, proto, nc->err)); +} - if (!mg_fopen(conn, path, "rb", filep)) { - send_http_error(conn, 500, http_500_error, - "fopen(%s): %s", path, strerror(ERRNO)); +void mg_sl_if_connect_udp(struct mg_connection *nc) { + sock_t sock = sl_Socket(AF_INET, SOCK_DGRAM, 0); + if (sock < 0) { + nc->err = sock; return; } - fclose_on_exec(filep); - - // If Range: header specified, act accordingly - r1 = r2 = 0; - hdr = mg_get_header(conn, "Range"); - if (hdr != NULL && (n = parse_range_header(hdr, &r1, &r2)) > 0 && - r1 >= 0 && r2 >= 0) { - conn->status_code = 206; - cl = n == 2 ? (r2 > cl ? cl : r2) - r1 + 1: cl - r1; - mg_snprintf(conn, range, sizeof(range), - "Content-Range: bytes " - "%" INT64_FMT "-%" - INT64_FMT "/%" INT64_FMT "\r\n", - r1, r1 + cl - 1, filep->size); - msg = "Partial Content"; - } - - // Prepare Etag, Date, Last-Modified headers. Must be in UTC, according to - // http://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html#sec3.3 - gmt_time_string(date, sizeof(date), &curtime); - gmt_time_string(lm, sizeof(lm), &filep->modification_time); - construct_etag(etag, sizeof(etag), filep); - - (void) mg_printf(conn, - "HTTP/1.1 %d %s\r\n" - "Date: %s\r\n" - "Last-Modified: %s\r\n" - "Etag: %s\r\n" - "Content-Type: %.*s\r\n" - "Content-Length: %" INT64_FMT "\r\n" - "Connection: %s\r\n" - "Accept-Ranges: bytes\r\n" - "%s\r\n", - conn->status_code, msg, date, lm, etag, (int) mime_vec.len, - mime_vec.ptr, cl, suggest_connection_header(conn), range); - - if (strcmp(conn->request_info.request_method, "HEAD") != 0) { - send_file_data(conn, filep, r1, cl); - } - mg_fclose(filep); -} - -void mg_send_file(struct mg_connection *conn, const char *path) { - struct file file = STRUCT_FILE_INITIALIZER; - if (mg_stat(conn, path, &file)) { - handle_file_request(conn, path, &file); - } else { - send_http_error(conn, 404, "Not Found", "%s", "File not found"); - } + mg_sock_set(nc, sock); + nc->err = 0; } +int mg_sl_if_listen_tcp(struct mg_connection *nc, union socket_address *sa) { + int proto = 0; + if (nc->flags & MG_F_SSL) proto = SL_SEC_SOCKET; + sock_t sock = mg_open_listening_socket(nc, sa, SOCK_STREAM, proto); + if (sock < 0) return sock; + mg_sock_set(nc, sock); + return 0; +} -// Parse HTTP headers from the given buffer, advance buffer to the point -// where parsing stopped. -static void parse_http_headers(char **buf, struct mg_request_info *ri) { - int i; +int mg_sl_if_listen_udp(struct mg_connection *nc, union socket_address *sa) { + sock_t sock = mg_open_listening_socket(nc, sa, SOCK_DGRAM, 0); + if (sock == INVALID_SOCKET) return (errno ? errno : 1); + mg_sock_set(nc, sock); + return 0; +} - for (i = 0; i < (int) ARRAY_SIZE(ri->http_headers); i++) { - ri->http_headers[i].name = skip_quoted(buf, ":", " ", 0); - ri->http_headers[i].value = skip(buf, "\r\n"); - if (ri->http_headers[i].name[0] == '\0') - break; - ri->num_headers = i + 1; - } +void mg_sl_if_tcp_send(struct mg_connection *nc, const void *buf, size_t len) { + mbuf_append(&nc->send_mbuf, buf, len); } -static int is_valid_http_method(const char *method) { - return !strcmp(method, "GET") || !strcmp(method, "POST") || - !strcmp(method, "HEAD") || !strcmp(method, "CONNECT") || - !strcmp(method, "PUT") || !strcmp(method, "DELETE") || - !strcmp(method, "OPTIONS") || !strcmp(method, "PROPFIND"); +void mg_sl_if_udp_send(struct mg_connection *nc, const void *buf, size_t len) { + mbuf_append(&nc->send_mbuf, buf, len); } -// Parse HTTP request, fill in mg_request_info structure. -// This function modifies the buffer by NUL-terminating -// HTTP request components, header names and header values. -static int parse_http_message(char *buf, int len, struct mg_request_info *ri) { - int is_request, request_length = get_request_len(buf, len); - if (request_length > 0) { - // Reset attributes. DO NOT TOUCH is_ssl, remote_ip, remote_port - ri->remote_user = ri->request_method = ri->uri = ri->http_version = NULL; - ri->num_headers = 0; +void mg_sl_if_recved(struct mg_connection *nc, size_t len) { + (void) nc; + (void) len; +} - buf[request_length - 1] = '\0'; +int mg_sl_if_create_conn(struct mg_connection *nc) { + (void) nc; + return 1; +} - // RFC says that all initial whitespaces should be ingored - while (*buf != '\0' && isspace(* (unsigned char *) buf)) { - buf++; - } - ri->request_method = skip(&buf, " "); - ri->uri = skip(&buf, " "); - ri->http_version = skip(&buf, "\r\n"); - if (((is_request = is_valid_http_method(ri->request_method)) && - memcmp(ri->http_version, "HTTP/", 5) != 0) || - (!is_request && memcmp(ri->request_method, "HTTP/", 5)) != 0) { - request_length = -1; - } else { - if (is_request) { - ri->http_version += 5; - } - parse_http_headers(&buf, ri); - } +void mg_sl_if_destroy_conn(struct mg_connection *nc) { + if (nc->sock == INVALID_SOCKET) return; + /* For UDP, only close outgoing sockets or listeners. */ + if (!(nc->flags & MG_F_UDP) || nc->listener == NULL) { + sl_Close(nc->sock); } - return request_length; + nc->sock = INVALID_SOCKET; } -// Keep reading the input (either opened file descriptor fd, or socket sock, -// or SSL descriptor ssl) into buffer buf, until \r\n\r\n appears in the -// buffer (which marks the end of HTTP request). Buffer buf may already -// have some data. The length of the data is stored in nread. -// Upon every read operation, increase nread by the number of bytes read. -static int read_request(FILE *fp, struct mg_connection *conn, - char *buf, int bufsiz, int *nread) { - int request_len, n = 0; - - request_len = get_request_len(buf, *nread); - while (*nread < bufsiz && request_len == 0 && - (n = pull(fp, conn, buf + *nread, bufsiz - *nread)) > 0) { - *nread += n; - assert(*nread <= bufsiz); - request_len = get_request_len(buf, *nread); +static int mg_accept_conn(struct mg_connection *lc) { + struct mg_connection *nc; + union socket_address sa; + socklen_t sa_len = sizeof(sa); + sock_t sock = sl_Accept(lc->sock, &sa.sa, &sa_len); + if (sock < 0) { + DBG(("%p: failed to accept: %d", lc, sock)); + return 0; } - - return request_len <= 0 && n <= 0 ? -1 : request_len; + nc = mg_if_accept_new_conn(lc); + if (nc == NULL) { + sl_Close(sock); + return 0; + } + DBG(("%p conn from %s:%d", nc, inet_ntoa(sa.sin.sin_addr), + ntohs(sa.sin.sin_port))); + mg_sock_set(nc, sock); + if (nc->flags & MG_F_SSL) nc->flags |= MG_F_SSL_HANDSHAKE_DONE; + mg_if_accept_tcp_cb(nc, &sa, sa_len); + return 1; } -// For given directory path, substitute it to valid index file. -// Return 0 if index file has been found, -1 if not found. -// If the file is found, it's stats is returned in stp. -static int substitute_index_file(struct mg_connection *conn, char *path, - size_t path_len, struct file *filep) { - const char *list = conn->ctx->config[INDEX_FILES]; - struct file file = STRUCT_FILE_INITIALIZER; - struct vec filename_vec; - size_t n = strlen(path); - int found = 0; - - // The 'path' given to us points to the directory. Remove all trailing - // directory separator characters from the end of the path, and - // then append single directory separator character. - while (n > 0 && path[n - 1] == '/') { - n--; +/* 'sa' must be an initialized address to bind to */ +static sock_t mg_open_listening_socket(struct mg_connection *nc, + union socket_address *sa, int type, + int proto) { + int r; + socklen_t sa_len = + (sa->sa.sa_family == AF_INET) ? sizeof(sa->sin) : sizeof(sa->sin6); + sock_t sock = sl_Socket(sa->sa.sa_family, type, proto); + if (sock < 0) return sock; + if ((r = sl_Bind(sock, &sa->sa, sa_len)) < 0) goto clean; + if (type != SOCK_DGRAM) { +#if MG_ENABLE_SSL + if ((r = sl_set_ssl_opts(sock, nc)) < 0) goto clean; +#endif + if ((r = sl_Listen(sock, SOMAXCONN)) < 0) goto clean; } - path[n] = '/'; - - // Traverse index files list. For each entry, append it to the given - // path and see if the file exists. If it exists, break the loop - while ((list = next_option(list, &filename_vec, NULL)) != NULL) { - - // Ignore too long entries that may overflow path buffer - if (filename_vec.len > path_len - (n + 2)) - continue; + mg_set_non_blocking_mode(sock); +clean: + if (r < 0) { + sl_Close(sock); + sock = r; + } + return sock; +} - // Prepare full path to the index file - mg_strlcpy(path + n + 1, filename_vec.ptr, filename_vec.len + 1); +static void mg_write_to_socket(struct mg_connection *nc) { + struct mbuf *io = &nc->send_mbuf; + int n = 0; - // Does it exist? - if (mg_stat(conn, path, &file)) { - // Yes it does, break the loop - *filep = file; - found = 1; - break; - } + if (nc->flags & MG_F_UDP) { + n = sl_SendTo(nc->sock, io->buf, io->len, 0, &nc->sa.sa, + sizeof(nc->sa.sin)); + DBG(("%p %d %d %d %s:%hu", nc, nc->sock, n, errno, + inet_ntoa(nc->sa.sin.sin_addr), ntohs(nc->sa.sin.sin_port))); + } else { + n = (int) sl_Send(nc->sock, io->buf, io->len, 0); + DBG(("%p %d bytes -> %d", nc, n, nc->sock)); } - // If no index file exists, restore directory path - if (!found) { - path[n] = '\0'; + if (n > 0) { + mg_if_sent_cb(nc, n); + } else if (n < 0 && mg_is_error(n)) { + /* Something went wrong, drop the connection. */ + nc->flags |= MG_F_CLOSE_IMMEDIATELY; } - - return found; } -// Return True if we should reply 304 Not Modified. -static int is_not_modified(const struct mg_connection *conn, - const struct file *filep) { - char etag[64]; - const char *ims = mg_get_header(conn, "If-Modified-Since"); - const char *inm = mg_get_header(conn, "If-None-Match"); - construct_etag(etag, sizeof(etag), filep); - return (inm != NULL && !mg_strcasecmp(etag, inm)) || - (ims != NULL && filep->modification_time <= parse_date_string(ims)); +MG_INTERNAL size_t recv_avail_size(struct mg_connection *conn, size_t max) { + size_t avail; + if (conn->recv_mbuf_limit < conn->recv_mbuf.len) return 0; + avail = conn->recv_mbuf_limit - conn->recv_mbuf.len; + return avail > max ? max : avail; } -static int forward_body_data(struct mg_connection *conn, FILE *fp, - SOCKET sock, SSL *ssl) { - const char *expect, *body; - char buf[MG_BUF_LEN]; - int to_read, nread, buffered_len, success = 0; +static void mg_handle_tcp_read(struct mg_connection *conn) { + int n = 0; + char *buf = (char *) MG_MALLOC(MG_TCP_RECV_BUFFER_SIZE); - expect = mg_get_header(conn, "Expect"); - assert(fp != NULL); + if (buf == NULL) { + DBG(("OOM")); + return; + } - if (conn->content_len == -1) { - send_http_error(conn, 411, "Length Required", "%s", ""); - } else if (expect != NULL && mg_strcasecmp(expect, "100-continue")) { - send_http_error(conn, 417, "Expectation Failed", "%s", ""); + n = (int) sl_Recv(conn->sock, buf, + recv_avail_size(conn, MG_TCP_RECV_BUFFER_SIZE), 0); + DBG(("%p %d bytes <- %d", conn, n, conn->sock)); + if (n > 0) { + mg_if_recv_tcp_cb(conn, buf, n, 1 /* own */); } else { - if (expect != NULL) { - (void) mg_printf(conn, "%s", "HTTP/1.1 100 Continue\r\n\r\n"); - } + MG_FREE(buf); + } + if (n == 0) { + /* Orderly shutdown of the socket, try flushing output. */ + conn->flags |= MG_F_SEND_AND_CLOSE; + } else if (mg_is_error(n)) { + conn->flags |= MG_F_CLOSE_IMMEDIATELY; + } +} + +static void mg_handle_udp_read(struct mg_connection *nc) { + char *buf = (char *) MG_MALLOC(MG_UDP_RECV_BUFFER_SIZE); + if (buf == NULL) return; + union socket_address sa; + socklen_t sa_len = sizeof(sa); + int n = sl_RecvFrom(nc->sock, buf, MG_UDP_RECV_BUFFER_SIZE, 0, + (SlSockAddr_t *) &sa, &sa_len); + DBG(("%p %d bytes from %s:%d", nc, n, inet_ntoa(nc->sa.sin.sin_addr), + ntohs(nc->sa.sin.sin_port))); + if (n > 0) { + mg_if_recv_udp_cb(nc, buf, n, &sa, sa_len); + } else { + MG_FREE(buf); + } +} + +#define _MG_F_FD_CAN_READ 1 +#define _MG_F_FD_CAN_WRITE 1 << 1 +#define _MG_F_FD_ERROR 1 << 2 - body = conn->buf + conn->request_len + conn->consumed_content; - buffered_len = &conn->buf[conn->data_len] - body; - assert(buffered_len >= 0); - assert(conn->consumed_content == 0); +void mg_mgr_handle_conn(struct mg_connection *nc, int fd_flags, double now) { + DBG(("%p fd=%d fd_flags=%d nc_flags=%lu rmbl=%d smbl=%d", nc, nc->sock, + fd_flags, nc->flags, (int) nc->recv_mbuf.len, (int) nc->send_mbuf.len)); - if (buffered_len > 0) { - if ((int64_t) buffered_len > conn->content_len) { - buffered_len = (int) conn->content_len; + if (nc->flags & MG_F_CONNECTING) { + if (nc->flags & MG_F_UDP || nc->err != SL_ERROR_BSD_EALREADY) { + mg_if_connect_cb(nc, nc->err); + } else { + /* In SimpleLink, to get status of non-blocking connect() we need to wait + * until socket is writable and repeat the call to sl_Connect again, + * which will now return the real status. */ + if (fd_flags & _MG_F_FD_CAN_WRITE) { + nc->err = sl_Connect(nc->sock, &nc->sa.sa, sizeof(nc->sa.sin)); + DBG(("%p conn res=%d", nc, nc->err)); + if (nc->err == SL_ERROR_BSD_ESECSNOVERIFY || + /* TODO(rojer): Provide API to set the date for verification. */ + nc->err == SL_ERROR_BSD_ESECDATEERROR +#if SL_MAJOR_VERSION_NUM >= 2 + /* Per SWRU455, this error does not mean verification failed, + * it only means that the cert used is not present in the trusted + * root CA catalog. Which is perfectly fine. */ + || + nc->err == SL_ERROR_BSD_ESECUNKNOWNROOTCA +#endif + ) { + nc->err = 0; + } + if (nc->flags & MG_F_SSL && nc->err == 0) { + nc->flags |= MG_F_SSL_HANDSHAKE_DONE; + } + mg_if_connect_cb(nc, nc->err); } - push(fp, sock, ssl, body, (int64_t) buffered_len); - conn->consumed_content += buffered_len; } + /* Ignore read/write in further processing, we've handled it. */ + fd_flags &= ~(_MG_F_FD_CAN_READ | _MG_F_FD_CAN_WRITE); + } - nread = 0; - while (conn->consumed_content < conn->content_len) { - to_read = sizeof(buf); - if ((int64_t) to_read > conn->content_len - conn->consumed_content) { - to_read = (int) (conn->content_len - conn->consumed_content); - } - nread = pull(NULL, conn, buf, to_read); - if (nread <= 0 || push(fp, sock, ssl, buf, nread) != nread) { - break; + if (fd_flags & _MG_F_FD_CAN_READ) { + if (nc->flags & MG_F_UDP) { + mg_handle_udp_read(nc); + } else { + if (nc->flags & MG_F_LISTENING) { + mg_accept_conn(nc); + } else { + mg_handle_tcp_read(nc); } - conn->consumed_content += nread; } + } - if (conn->consumed_content == conn->content_len) { - success = nread >= 0; + if (!(nc->flags & MG_F_CLOSE_IMMEDIATELY)) { + if ((fd_flags & _MG_F_FD_CAN_WRITE) && nc->send_mbuf.len > 0) { + mg_write_to_socket(nc); } - // Each error code path in this function must send an error - if (!success) { - send_http_error(conn, 577, http_500_error, "%s", ""); + if (!(fd_flags & (_MG_F_FD_CAN_READ | _MG_F_FD_CAN_WRITE))) { + mg_if_poll(nc, now); } + mg_if_timer(nc, now); } - return success; + DBG(("%p after fd=%d nc_flags=%lu rmbl=%d smbl=%d", nc, nc->sock, nc->flags, + (int) nc->recv_mbuf.len, (int) nc->send_mbuf.len)); } -#if !defined(NO_CGI) -// This structure helps to create an environment for the spawned CGI program. -// Environment is an array of "VARIABLE=VALUE\0" ASCIIZ strings, -// last element must be NULL. -// However, on Windows there is a requirement that all these VARIABLE=VALUE\0 -// strings must reside in a contiguous buffer. The end of the buffer is -// marked by two '\0' characters. -// We satisfy both worlds: we create an envp array (which is vars), all -// entries are actually pointers inside buf. -struct cgi_env_block { - struct mg_connection *conn; - char buf[CGI_ENVIRONMENT_SIZE]; // Environment buffer - int len; // Space taken - char *vars[MAX_CGI_ENVIR_VARS]; // char **envp - int nvars; // Number of variables -}; - -static char *addenv(struct cgi_env_block *block, - PRINTF_FORMAT_STRING(const char *fmt), ...) - PRINTF_ARGS(2, 3); - -// Append VARIABLE=VALUE\0 string to the buffer, and add a respective -// pointer into the vars array. -static char *addenv(struct cgi_env_block *block, const char *fmt, ...) { - int n, space; - char *added; - va_list ap; - - // Calculate how much space is left in the buffer - space = sizeof(block->buf) - block->len - 2; - assert(space >= 0); - - // Make a pointer to the free space int the buffer - added = block->buf + block->len; - - // Copy VARIABLE=VALUE\0 string into the free space - va_start(ap, fmt); - n = mg_vsnprintf(block->conn, added, (size_t) space, fmt, ap); - va_end(ap); - - // Make sure we do not overflow buffer and the envp array - if (n > 0 && n + 1 < space && - block->nvars < (int) ARRAY_SIZE(block->vars) - 2) { - // Append a pointer to the added string into the envp array - block->vars[block->nvars++] = added; - // Bump up used length counter. Include \0 terminator - block->len += n + 1; - } else { - cry(block->conn, "%s: CGI env buffer truncated for [%s]", __func__, fmt); - } - - return added; +/* Associate a socket to a connection. */ +void mg_sl_if_sock_set(struct mg_connection *nc, sock_t sock) { + mg_set_non_blocking_mode(sock); + nc->sock = sock; + DBG(("%p %d", nc, sock)); } -static void prepare_cgi_environment(struct mg_connection *conn, - const char *prog, - struct cgi_env_block *blk) { - const char *s, *slash; - struct vec var_vec; - char *p, src_addr[20]; - int i; - - blk->len = blk->nvars = 0; - blk->conn = conn; - sockaddr_to_string(src_addr, sizeof(src_addr), &conn->client.rsa); - - addenv(blk, "SERVER_NAME=%s", conn->ctx->config[AUTHENTICATION_DOMAIN]); - addenv(blk, "SERVER_ROOT=%s", conn->ctx->config[DOCUMENT_ROOT]); - addenv(blk, "DOCUMENT_ROOT=%s", conn->ctx->config[DOCUMENT_ROOT]); +void mg_sl_if_init(struct mg_iface *iface) { + (void) iface; + DBG(("%p using sl_Select()", iface->mgr)); +} - // Prepare the environment block - addenv(blk, "%s", "GATEWAY_INTERFACE=CGI/1.1"); - addenv(blk, "%s", "SERVER_PROTOCOL=HTTP/1.1"); - addenv(blk, "%s", "REDIRECT_STATUS=200"); // For PHP +void mg_sl_if_free(struct mg_iface *iface) { + (void) iface; +} - // TODO(lsm): fix this for IPv6 case - addenv(blk, "SERVER_PORT=%d", ntohs(conn->client.lsa.sin.sin_port)); +void mg_sl_if_add_conn(struct mg_connection *nc) { + (void) nc; +} - addenv(blk, "REQUEST_METHOD=%s", conn->request_info.request_method); - addenv(blk, "REMOTE_ADDR=%s", src_addr); - addenv(blk, "REMOTE_PORT=%d", conn->request_info.remote_port); - addenv(blk, "REQUEST_URI=%s", conn->request_info.uri); +void mg_sl_if_remove_conn(struct mg_connection *nc) { + (void) nc; +} - // SCRIPT_NAME - assert(conn->request_info.uri[0] == '/'); - slash = strrchr(conn->request_info.uri, '/'); - if ((s = strrchr(prog, '/')) == NULL) - s = prog; - addenv(blk, "SCRIPT_NAME=%.*s%s", (int) (slash - conn->request_info.uri), - conn->request_info.uri, s); +time_t mg_sl_if_poll(struct mg_iface *iface, int timeout_ms) { + struct mg_mgr *mgr = iface->mgr; + double now = mg_time(); + double min_timer; + struct mg_connection *nc, *tmp; + struct SlTimeval_t tv; + SlFdSet_t read_set, write_set, err_set; + sock_t max_fd = INVALID_SOCKET; + int num_fds, num_ev = 0, num_timers = 0; - addenv(blk, "SCRIPT_FILENAME=%s", prog); - addenv(blk, "PATH_TRANSLATED=%s", prog); - addenv(blk, "HTTPS=%s", conn->ssl == NULL ? "off" : "on"); + SL_SOCKET_FD_ZERO(&read_set); + SL_SOCKET_FD_ZERO(&write_set); + SL_SOCKET_FD_ZERO(&err_set); - if ((s = mg_get_header(conn, "Content-Type")) != NULL) - addenv(blk, "CONTENT_TYPE=%s", s); + /* + * Note: it is ok to have connections with sock == INVALID_SOCKET in the list, + * e.g. timer-only "connections". + */ + min_timer = 0; + for (nc = mgr->active_connections, num_fds = 0; nc != NULL; nc = tmp) { + tmp = nc->next; - if (conn->request_info.query_string != NULL) - addenv(blk, "QUERY_STRING=%s", conn->request_info.query_string); + if (nc->sock != INVALID_SOCKET) { + num_fds++; - if ((s = mg_get_header(conn, "Content-Length")) != NULL) - addenv(blk, "CONTENT_LENGTH=%s", s); + if (!(nc->flags & MG_F_WANT_WRITE) && + nc->recv_mbuf.len < nc->recv_mbuf_limit && + (!(nc->flags & MG_F_UDP) || nc->listener == NULL)) { + SL_SOCKET_FD_SET(nc->sock, &read_set); + if (max_fd == INVALID_SOCKET || nc->sock > max_fd) max_fd = nc->sock; + } - if ((s = getenv("PATH")) != NULL) - addenv(blk, "PATH=%s", s); + if (((nc->flags & MG_F_CONNECTING) && !(nc->flags & MG_F_WANT_READ)) || + (nc->send_mbuf.len > 0 && !(nc->flags & MG_F_CONNECTING))) { + SL_SOCKET_FD_SET(nc->sock, &write_set); + SL_SOCKET_FD_SET(nc->sock, &err_set); + if (max_fd == INVALID_SOCKET || nc->sock > max_fd) max_fd = nc->sock; + } + } - if (conn->path_info != NULL) { - addenv(blk, "PATH_INFO=%s", conn->path_info); + if (nc->ev_timer_time > 0) { + if (num_timers == 0 || nc->ev_timer_time < min_timer) { + min_timer = nc->ev_timer_time; + } + num_timers++; + } } -#if defined(_WIN32) - if ((s = getenv("COMSPEC")) != NULL) { - addenv(blk, "COMSPEC=%s", s); - } - if ((s = getenv("SYSTEMROOT")) != NULL) { - addenv(blk, "SYSTEMROOT=%s", s); - } - if ((s = getenv("SystemDrive")) != NULL) { - addenv(blk, "SystemDrive=%s", s); + /* + * If there is a timer to be fired earlier than the requested timeout, + * adjust the timeout. + */ + if (num_timers > 0) { + double timer_timeout_ms = (min_timer - mg_time()) * 1000 + 1 /* rounding */; + if (timer_timeout_ms < timeout_ms) { + timeout_ms = timer_timeout_ms; + } } -#else - if ((s = getenv("LD_LIBRARY_PATH")) != NULL) - addenv(blk, "LD_LIBRARY_PATH=%s", s); -#endif // _WIN32 + if (timeout_ms < 0) timeout_ms = 0; - if ((s = getenv("PERLLIB")) != NULL) - addenv(blk, "PERLLIB=%s", s); + tv.tv_sec = timeout_ms / 1000; + tv.tv_usec = (timeout_ms % 1000) * 1000; - if (conn->request_info.remote_user != NULL) { - addenv(blk, "REMOTE_USER=%s", conn->request_info.remote_user); - addenv(blk, "%s", "AUTH_TYPE=Digest"); + if (num_fds > 0) { + num_ev = sl_Select((int) max_fd + 1, &read_set, &write_set, &err_set, &tv); } - // Add all headers as HTTP_* variables - for (i = 0; i < conn->request_info.num_headers; i++) { - p = addenv(blk, "HTTP_%s=%s", - conn->request_info.http_headers[i].name, - conn->request_info.http_headers[i].value); + now = mg_time(); + DBG(("sl_Select @ %ld num_ev=%d of %d, timeout=%d", (long) now, num_ev, + num_fds, timeout_ms)); - // Convert variable name into uppercase, and change - to _ - for (; *p != '=' && *p != '\0'; p++) { - if (*p == '-') - *p = '_'; - *p = (char) toupper(* (unsigned char *) p); + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { + int fd_flags = 0; + if (nc->sock != INVALID_SOCKET) { + if (num_ev > 0) { + fd_flags = + (SL_SOCKET_FD_ISSET(nc->sock, &read_set) && + (!(nc->flags & MG_F_UDP) || nc->listener == NULL) + ? _MG_F_FD_CAN_READ + : 0) | + (SL_SOCKET_FD_ISSET(nc->sock, &write_set) ? _MG_F_FD_CAN_WRITE + : 0) | + (SL_SOCKET_FD_ISSET(nc->sock, &err_set) ? _MG_F_FD_ERROR : 0); + } + /* SimpleLink does not report UDP sockets as writable. */ + if (nc->flags & MG_F_UDP && nc->send_mbuf.len > 0) { + fd_flags |= _MG_F_FD_CAN_WRITE; + } } + tmp = nc->next; + mg_mgr_handle_conn(nc, fd_flags, now); } - // Add user-specified variables - s = conn->ctx->config[CGI_ENVIRONMENT]; - while ((s = next_option(s, &var_vec, NULL)) != NULL) { - addenv(blk, "%.*s", (int) var_vec.len, var_vec.ptr); + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { + tmp = nc->next; + if ((nc->flags & MG_F_CLOSE_IMMEDIATELY) || + (nc->send_mbuf.len == 0 && (nc->flags & MG_F_SEND_AND_CLOSE))) { + mg_close_conn(nc); + } } - blk->vars[blk->nvars++] = NULL; - blk->buf[blk->len++] = '\0'; + return now; +} + +void mg_sl_if_get_conn_addr(struct mg_connection *nc, int remote, + union socket_address *sa) { + /* SimpleLink does not provide a way to get socket's peer address after + * accept or connect. Address should have been preserved in the connection, + * so we do our best here by using it. */ + if (remote) memcpy(sa, &nc->sa, sizeof(*sa)); +} + +void sl_restart_cb(struct mg_mgr *mgr) { + /* + * SimpleLink has been restarted, meaning all sockets have been invalidated. + * We try our best - we'll restart the listeners, but for outgoing + * connections we have no option but to terminate. + */ + struct mg_connection *nc; + for (nc = mg_next(mgr, NULL); nc != NULL; nc = mg_next(mgr, nc)) { + if (nc->sock == INVALID_SOCKET) continue; /* Could be a timer */ + if (nc->flags & MG_F_LISTENING) { + DBG(("restarting %p %s:%d", nc, inet_ntoa(nc->sa.sin.sin_addr), + ntohs(nc->sa.sin.sin_port))); + int res = (nc->flags & MG_F_UDP ? mg_sl_if_listen_udp(nc, &nc->sa) + : mg_sl_if_listen_tcp(nc, &nc->sa)); + if (res == 0) continue; + /* Well, we tried and failed. Fall through to closing. */ + } + nc->sock = INVALID_SOCKET; + DBG(("terminating %p %s:%d", nc, inet_ntoa(nc->sa.sin.sin_addr), + ntohs(nc->sa.sin.sin_port))); + /* TODO(rojer): Outgoing UDP? */ + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + } +} + +/* clang-format off */ +#define MG_SL_IFACE_VTABLE \ + { \ + mg_sl_if_init, \ + mg_sl_if_free, \ + mg_sl_if_add_conn, \ + mg_sl_if_remove_conn, \ + mg_sl_if_poll, \ + mg_sl_if_listen_tcp, \ + mg_sl_if_listen_udp, \ + mg_sl_if_connect_tcp, \ + mg_sl_if_connect_udp, \ + mg_sl_if_tcp_send, \ + mg_sl_if_udp_send, \ + mg_sl_if_recved, \ + mg_sl_if_create_conn, \ + mg_sl_if_destroy_conn, \ + mg_sl_if_sock_set, \ + mg_sl_if_get_conn_addr, \ + } +/* clang-format on */ + +const struct mg_iface_vtable mg_simplelink_iface_vtable = MG_SL_IFACE_VTABLE; +#if MG_NET_IF == MG_NET_IF_SIMPLELINK +const struct mg_iface_vtable mg_default_iface_vtable = MG_SL_IFACE_VTABLE; +#endif - assert(blk->nvars < (int) ARRAY_SIZE(blk->vars)); - assert(blk->len > 0); - assert(blk->len < (int) sizeof(blk->buf)); -} - -static void handle_cgi_request(struct mg_connection *conn, const char *prog) { - int headers_len, data_len, i, fd_stdin[2], fd_stdout[2]; - const char *status, *status_text; - char buf[16384], *pbuf, dir[PATH_MAX], *p; - struct mg_request_info ri; - struct cgi_env_block blk; - FILE *in, *out; - struct file fout = STRUCT_FILE_INITIALIZER; - pid_t pid; - - prepare_cgi_environment(conn, prog, &blk); - - // CGI must be executed in its own directory. 'dir' must point to the - // directory containing executable program, 'p' must point to the - // executable program name relative to 'dir'. - (void) mg_snprintf(conn, dir, sizeof(dir), "%s", prog); - if ((p = strrchr(dir, '/')) != NULL) { - *p++ = '\0'; - } else { - dir[0] = '.', dir[1] = '\0'; - p = (char *) prog; - } - - pid = (pid_t) -1; - fd_stdin[0] = fd_stdin[1] = fd_stdout[0] = fd_stdout[1] = -1; - in = out = NULL; - - if (pipe(fd_stdin) != 0 || pipe(fd_stdout) != 0) { - send_http_error(conn, 500, http_500_error, - "Cannot create CGI pipe: %s", strerror(ERRNO)); - goto done; - } - - pid = spawn_process(conn, p, blk.buf, blk.vars, fd_stdin[0], fd_stdout[1], - dir); - // spawn_process() must close those! - // If we don't mark them as closed, close() attempt before - // return from this function throws an exception on Windows. - // Windows does not like when closed descriptor is closed again. - fd_stdin[0] = fd_stdout[1] = -1; - - if (pid == (pid_t) -1) { - send_http_error(conn, 500, http_500_error, - "Cannot spawn CGI process [%s]: %s", prog, strerror(ERRNO)); - goto done; - } - - if ((in = fdopen(fd_stdin[1], "wb")) == NULL || - (out = fdopen(fd_stdout[0], "rb")) == NULL) { - send_http_error(conn, 500, http_500_error, - "fopen: %s", strerror(ERRNO)); - goto done; - } - - setbuf(in, NULL); - setbuf(out, NULL); - fout.fp = out; - - // Send POST data to the CGI process if needed - if (!strcmp(conn->request_info.request_method, "POST") && - !forward_body_data(conn, in, INVALID_SOCKET, NULL)) { - goto done; - } - - // Close so child gets an EOF. - fclose(in); - in = NULL; - fd_stdin[1] = -1; - - // Now read CGI reply into a buffer. We need to set correct - // status code, thus we need to see all HTTP headers first. - // Do not send anything back to client, until we buffer in all - // HTTP headers. - data_len = 0; - headers_len = read_request(out, conn, buf, sizeof(buf), &data_len); - if (headers_len <= 0) { - send_http_error(conn, 500, http_500_error, - "CGI program sent malformed or too big (>%u bytes) " - "HTTP headers: [%.*s]", - (unsigned) sizeof(buf), data_len, buf); - goto done; - } - pbuf = buf; - buf[headers_len - 1] = '\0'; - parse_http_headers(&pbuf, &ri); - - // Make up and send the status line - status_text = "OK"; - if ((status = get_header(&ri, "Status")) != NULL) { - conn->status_code = atoi(status); - status_text = status; - while (isdigit(* (unsigned char *) status_text) || *status_text == ' ') { - status_text++; - } - } else if (get_header(&ri, "Location") != NULL) { - conn->status_code = 302; - } else { - conn->status_code = 200; - } - if (get_header(&ri, "Connection") != NULL && - !mg_strcasecmp(get_header(&ri, "Connection"), "keep-alive")) { - conn->must_close = 1; - } - (void) mg_printf(conn, "HTTP/1.1 %d %s\r\n", conn->status_code, - status_text); +#endif /* MG_ENABLE_NET_IF_SIMPLELINK */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/simplelink/sl_ssl_if.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ - // Send headers - for (i = 0; i < ri.num_headers; i++) { - mg_printf(conn, "%s: %s\r\n", - ri.http_headers[i].name, ri.http_headers[i].value); - } - mg_write(conn, "\r\n", 2); +#if MG_ENABLE_SSL && MG_SSL_IF == MG_SSL_IF_SIMPLELINK - // Send chunk of data that may have been read after the headers - conn->num_bytes_sent += mg_write(conn, buf + headers_len, - (size_t)(data_len - headers_len)); +/* Amalgamated: #include "common/mg_mem.h" */ - // Read the rest of CGI output and send to the client - send_file_data(conn, &fout, 0, INT64_MAX); +#ifndef MG_SSL_IF_SIMPLELINK_SLFS_PREFIX +#define MG_SSL_IF_SIMPLELINK_SLFS_PREFIX "SL:" +#endif -done: - if (pid != (pid_t) -1) { - kill(pid, SIGKILL); - } - if (fd_stdin[0] != -1) { - close(fd_stdin[0]); - } - if (fd_stdout[1] != -1) { - close(fd_stdout[1]); - } +#define MG_SSL_IF_SIMPLELINK_SLFS_PREFIX_LEN \ + (sizeof(MG_SSL_IF_SIMPLELINK_SLFS_PREFIX) - 1) - if (in != NULL) { - fclose(in); - } else if (fd_stdin[1] != -1) { - close(fd_stdin[1]); - } +struct mg_ssl_if_ctx { + char *ssl_cert; + char *ssl_key; + char *ssl_ca_cert; + char *ssl_server_name; +}; - if (out != NULL) { - fclose(out); - } else if (fd_stdout[0] != -1) { - close(fd_stdout[0]); - } +void mg_ssl_if_init() { } -#endif // !NO_CGI - -// For a given PUT path, create all intermediate subdirectories -// for given path. Return 0 if the path itself is a directory, -// or -1 on error, 1 if OK. -static int put_dir(struct mg_connection *conn, const char *path) { - char buf[PATH_MAX]; - const char *s, *p; - struct file file = STRUCT_FILE_INITIALIZER; - int len, res = 1; - - for (s = p = path + 2; (p = strchr(s, '/')) != NULL; s = ++p) { - len = p - path; - if (len >= (int) sizeof(buf)) { - res = -1; - break; - } - memcpy(buf, path, len); - buf[len] = '\0'; - - // Try to create intermediate directory - DEBUG_TRACE(("mkdir(%s)", buf)); - if (!mg_stat(conn, buf, &file) && mg_mkdir(buf, 0755) != 0) { - res = -1; - break; - } - // Is path itself a directory? - if (p[1] == '\0') { - res = 0; - } +enum mg_ssl_if_result mg_ssl_if_conn_init( + struct mg_connection *nc, const struct mg_ssl_if_conn_params *params, + const char **err_msg) { + struct mg_ssl_if_ctx *ctx = + (struct mg_ssl_if_ctx *) MG_CALLOC(1, sizeof(*ctx)); + if (ctx == NULL) { + MG_SET_PTRPTR(err_msg, "Out of memory"); + return MG_SSL_ERROR; } + nc->ssl_if_data = ctx; - return res; -} - -static void put_file(struct mg_connection *conn, const char *path) { - struct file file = STRUCT_FILE_INITIALIZER; - const char *range; - int64_t r1, r2; - int rc; - - conn->status_code = mg_stat(conn, path, &file) ? 200 : 201; - - if ((rc = put_dir(conn, path)) == 0) { - mg_printf(conn, "HTTP/1.1 %d OK\r\n\r\n", conn->status_code); - } else if (rc == -1) { - send_http_error(conn, 500, http_500_error, - "put_dir(%s): %s", path, strerror(ERRNO)); - } else if (!mg_fopen(conn, path, "wb+", &file) || file.fp == NULL) { - mg_fclose(&file); - send_http_error(conn, 500, http_500_error, - "fopen(%s): %s", path, strerror(ERRNO)); - } else { - fclose_on_exec(&file); - range = mg_get_header(conn, "Content-Range"); - r1 = r2 = 0; - if (range != NULL && parse_range_header(range, &r1, &r2) > 0) { - conn->status_code = 206; - fseeko(file.fp, r1, SEEK_SET); - } - if (forward_body_data(conn, file.fp, INVALID_SOCKET, NULL)) { - mg_printf(conn, "HTTP/1.1 %d OK\r\n\r\n", conn->status_code); + if (params->cert != NULL || params->key != NULL) { + if (params->cert != NULL && params->key != NULL) { + ctx->ssl_cert = strdup(params->cert); + ctx->ssl_key = strdup(params->key); + } else { + MG_SET_PTRPTR(err_msg, "Both cert and key are required."); + return MG_SSL_ERROR; } - mg_fclose(&file); } -} - -static void send_ssi_file(struct mg_connection *, const char *, - struct file *, int); - -static void do_ssi_include(struct mg_connection *conn, const char *ssi, - char *tag, int include_level) { - char file_name[MG_BUF_LEN], path[PATH_MAX], *p; - struct file file = STRUCT_FILE_INITIALIZER; - - // sscanf() is safe here, since send_ssi_file() also uses buffer - // of size MG_BUF_LEN to get the tag. So strlen(tag) is always < MG_BUF_LEN. - if (sscanf(tag, " virtual=\"%[^\"]\"", file_name) == 1) { - // File name is relative to the webserver root - (void) mg_snprintf(conn, path, sizeof(path), "%s%c%s", - conn->ctx->config[DOCUMENT_ROOT], '/', file_name); - } else if (sscanf(tag, " file=\"%[^\"]\"", file_name) == 1) { - // File name is relative to the webserver working directory - // or it is absolute system path - (void) mg_snprintf(conn, path, sizeof(path), "%s", file_name); - } else if (sscanf(tag, " \"%[^\"]\"", file_name) == 1) { - // File name is relative to the currect document - (void) mg_snprintf(conn, path, sizeof(path), "%s", ssi); - if ((p = strrchr(path, '/')) != NULL) { - p[1] = '\0'; + if (params->ca_cert != NULL && strcmp(params->ca_cert, "*") != 0) { + ctx->ssl_ca_cert = strdup(params->ca_cert); + } + /* TODO(rojer): cipher_suites. */ + if (params->server_name != NULL) { + ctx->ssl_server_name = strdup(params->server_name); + } + return MG_SSL_OK; +} + +void mg_ssl_if_conn_close_notify(struct mg_connection *nc) { + /* Nothing to do */ + (void) nc; +} + +void mg_ssl_if_conn_free(struct mg_connection *nc) { + struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; + if (ctx == NULL) return; + nc->ssl_if_data = NULL; + MG_FREE(ctx->ssl_cert); + MG_FREE(ctx->ssl_key); + MG_FREE(ctx->ssl_ca_cert); + MG_FREE(ctx->ssl_server_name); + memset(ctx, 0, sizeof(*ctx)); + MG_FREE(ctx); +} + +bool pem_to_der(const char *pem_file, const char *der_file) { + bool ret = false; + FILE *pf = NULL, *df = NULL; + bool writing = false; + pf = fopen(pem_file, "r"); + if (pf == NULL) goto clean; + remove(der_file); + fs_slfs_set_new_file_size(der_file + MG_SSL_IF_SIMPLELINK_SLFS_PREFIX_LEN, + 2048); + df = fopen(der_file, "w"); + if (df == NULL) goto clean; + while (1) { + char pem_buf[70]; + char der_buf[48]; + if (!fgets(pem_buf, sizeof(pem_buf), pf)) break; + if (writing) { + if (strstr(pem_buf, "-----END ") != NULL) { + ret = true; + break; + } + int l = 0; + while (!isspace((unsigned int) pem_buf[l])) l++; + int der_len = 0; + cs_base64_decode((const unsigned char *) pem_buf, sizeof(pem_buf), + der_buf, &der_len); + if (der_len <= 0) break; + if (fwrite(der_buf, 1, der_len, df) != der_len) break; + } else if (strstr(pem_buf, "-----BEGIN ") != NULL) { + writing = true; } - (void) mg_snprintf(conn, path + strlen(path), - sizeof(path) - strlen(path), "%s", file_name); - } else { - cry(conn, "Bad SSI #include: [%s]", tag); - return; } - if (!mg_fopen(conn, path, "rb", &file)) { - cry(conn, "Cannot open SSI #include: [%s]: fopen(%s): %s", - tag, path, strerror(ERRNO)); - } else { - fclose_on_exec(&file); - if (match_prefix(conn->ctx->config[SSI_EXTENSIONS], - strlen(conn->ctx->config[SSI_EXTENSIONS]), path) > 0) { - send_ssi_file(conn, path, &file, include_level + 1); - } else { - send_file_data(conn, &file, 0, INT64_MAX); - } - mg_fclose(&file); +clean: + if (pf != NULL) fclose(pf); + if (df != NULL) { + fclose(df); + if (!ret) remove(der_file); } + return ret; } -#if !defined(NO_POPEN) -static void do_ssi_exec(struct mg_connection *conn, char *tag) { - char cmd[MG_BUF_LEN]; - struct file file = STRUCT_FILE_INITIALIZER; - - if (sscanf(tag, " \"%[^\"]\"", cmd) != 1) { - cry(conn, "Bad SSI #exec: [%s]", tag); - } else if ((file.fp = popen(cmd, "r")) == NULL) { - cry(conn, "Cannot SSI #exec: [%s]: %s", cmd, strerror(ERRNO)); +#if MG_ENABLE_FILESYSTEM && defined(MG_FS_SLFS) +/* If the file's extension is .pem, convert it to DER format and put on SLFS. */ +static char *sl_pem2der(const char *pem_file) { + const char *pem_ext = strstr(pem_file, ".pem"); + if (pem_ext == NULL || *(pem_ext + 4) != '\0') { + return strdup(pem_file); + } + char *der_file = NULL; + /* DER file must be located on SLFS, add prefix. */ + int l = mg_asprintf(&der_file, 0, MG_SSL_IF_SIMPLELINK_SLFS_PREFIX "%.*s.der", + (int) (pem_ext - pem_file), pem_file); + if (der_file == NULL) return NULL; + bool result = false; + cs_stat_t st; + if (mg_stat(der_file, &st) != 0) { + result = pem_to_der(pem_file, der_file); + LOG(LL_DEBUG, ("%s -> %s = %d", pem_file, der_file, result)); } else { - send_file_data(conn, &file, 0, INT64_MAX); - pclose(file.fp); + /* File exists, assume it's already been converted. */ + result = true; } -} -#endif // !NO_POPEN - -static int mg_fgetc(struct file *filep, int offset) { - if (filep->membuf != NULL && offset >=0 && offset < filep->size) { - return ((unsigned char *) filep->membuf)[offset]; - } else if (filep->fp != NULL) { - return fgetc(filep->fp); + if (result) { + /* Strip the SL: prefix we added since NWP does not expect it. */ + memmove(der_file, der_file + MG_SSL_IF_SIMPLELINK_SLFS_PREFIX_LEN, + l - 2 /* including \0 */); } else { - return EOF; + MG_FREE(der_file); + der_file = NULL; } + return der_file; } +#else +static char *sl_pem2der(const char *pem_file) { + return strdup(pem_file); +} +#endif -static void send_ssi_file(struct mg_connection *conn, const char *path, - struct file *filep, int include_level) { - char buf[MG_BUF_LEN]; - int ch, offset, len, in_ssi_tag; - - if (include_level > 10) { - cry(conn, "SSI #include level is too deep (%s)", path); - return; - } - - in_ssi_tag = len = offset = 0; - while ((ch = mg_fgetc(filep, offset)) != EOF) { - if (in_ssi_tag && ch == '>') { - in_ssi_tag = 0; - buf[len++] = (char) ch; - buf[len] = '\0'; - assert(len <= (int) sizeof(buf)); - if (len < 6 || memcmp(buf, "<!--#", 5) != 0) { - // Not an SSI tag, pass it - (void) mg_write(conn, buf, (size_t) len); +int sl_set_ssl_opts(int sock, struct mg_connection *nc) { + int err; + const struct mg_ssl_if_ctx *ctx = (struct mg_ssl_if_ctx *) nc->ssl_if_data; + DBG(("%p ssl ctx: %p", nc, ctx)); + + if (ctx != NULL) { + DBG(("%p %s,%s,%s,%s", nc, (ctx->ssl_cert ? ctx->ssl_cert : "-"), + (ctx->ssl_key ? ctx->ssl_cert : "-"), + (ctx->ssl_ca_cert ? ctx->ssl_ca_cert : "-"), + (ctx->ssl_server_name ? ctx->ssl_server_name : "-"))); + if (ctx->ssl_cert != NULL && ctx->ssl_key != NULL) { + char *ssl_cert = sl_pem2der(ctx->ssl_cert); + char *ssl_key = sl_pem2der(ctx->ssl_key); + if (ssl_cert != NULL && ssl_key != NULL) { + err = sl_SetSockOpt(sock, SL_SOL_SOCKET, + SL_SO_SECURE_FILES_CERTIFICATE_FILE_NAME, ssl_cert, + strlen(ssl_cert)); + LOG(LL_INFO, ("CERTIFICATE_FILE_NAME %s -> %d", ssl_cert, err)); + err = sl_SetSockOpt(sock, SL_SOL_SOCKET, + SL_SO_SECURE_FILES_PRIVATE_KEY_FILE_NAME, ssl_key, + strlen(ssl_key)); + LOG(LL_INFO, ("PRIVATE_KEY_FILE_NAME %s -> %d", ssl_key, err)); } else { - if (!memcmp(buf + 5, "include", 7)) { - do_ssi_include(conn, path, buf + 12, include_level); -#if !defined(NO_POPEN) - } else if (!memcmp(buf + 5, "exec", 4)) { - do_ssi_exec(conn, buf + 9); -#endif // !NO_POPEN + err = -1; + } + MG_FREE(ssl_cert); + MG_FREE(ssl_key); + if (err != 0) return err; + } + if (ctx->ssl_ca_cert != NULL) { + if (ctx->ssl_ca_cert[0] != '\0') { + char *ssl_ca_cert = sl_pem2der(ctx->ssl_ca_cert); + if (ssl_ca_cert != NULL) { + err = sl_SetSockOpt(sock, SL_SOL_SOCKET, + SL_SO_SECURE_FILES_CA_FILE_NAME, ssl_ca_cert, + strlen(ssl_ca_cert)); + LOG(LL_INFO, ("CA_FILE_NAME %s -> %d", ssl_ca_cert, err)); } else { - cry(conn, "%s: unknown SSI " "command: \"%s\"", path, buf); + err = -1; } - } - len = 0; - } else if (in_ssi_tag) { - if (len == 5 && memcmp(buf, "<!--#", 5) != 0) { - // Not an SSI tag - in_ssi_tag = 0; - } else if (len == (int) sizeof(buf) - 2) { - cry(conn, "%s: SSI tag is too large", path); - len = 0; - } - buf[len++] = ch & 0xff; - } else if (ch == '<') { - in_ssi_tag = 1; - if (len > 0) { - mg_write(conn, buf, (size_t) len); - } - len = 0; - buf[len++] = ch & 0xff; - } else { - buf[len++] = ch & 0xff; - if (len == (int) sizeof(buf)) { - mg_write(conn, buf, (size_t) len); - len = 0; + MG_FREE(ssl_ca_cert); + if (err != 0) return err; } } + if (ctx->ssl_server_name != NULL) { + err = sl_SetSockOpt(sock, SL_SOL_SOCKET, + SL_SO_SECURE_DOMAIN_NAME_VERIFICATION, + ctx->ssl_server_name, strlen(ctx->ssl_server_name)); + DBG(("DOMAIN_NAME_VERIFICATION %s -> %d", ctx->ssl_server_name, err)); + /* Domain name verificationw as added in a NWP service pack, older + * versions return SL_ERROR_BSD_ENOPROTOOPT. There isn't much we can do + * about it, + * so we ignore the error. */ + if (err != 0 && err != SL_ERROR_BSD_ENOPROTOOPT) return err; + } } - - // Send the rest of buffered data - if (len > 0) { - mg_write(conn, buf, (size_t) len); - } + return 0; } -static void handle_ssi_file_request(struct mg_connection *conn, - const char *path) { - struct file file = STRUCT_FILE_INITIALIZER; +#endif /* MG_ENABLE_SSL && MG_SSL_IF == MG_SSL_IF_SIMPLELINK */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/lwip/mg_lwip_net_if.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_LWIP_MG_NET_IF_LWIP_H_ +#define CS_COMMON_PLATFORMS_LWIP_MG_NET_IF_LWIP_H_ + +#ifndef MG_ENABLE_NET_IF_LWIP_LOW_LEVEL +#define MG_ENABLE_NET_IF_LWIP_LOW_LEVEL MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL +#endif + +#if MG_ENABLE_NET_IF_LWIP_LOW_LEVEL - if (!mg_fopen(conn, path, "rb", &file)) { - send_http_error(conn, 500, http_500_error, "fopen(%s): %s", path, - strerror(ERRNO)); - } else { - conn->must_close = 1; - fclose_on_exec(&file); - mg_printf(conn, "HTTP/1.1 200 OK\r\n" - "Content-Type: text/html\r\nConnection: %s\r\n\r\n", - suggest_connection_header(conn)); - send_ssi_file(conn, path, &file, 0); - mg_fclose(&file); - } -} +#include <stdint.h> -static void send_options(struct mg_connection *conn) { - conn->status_code = 200; +extern const struct mg_iface_vtable mg_lwip_iface_vtable; + +struct mg_lwip_conn_state { + struct mg_connection *nc; + struct mg_connection *lc; + union { + struct tcp_pcb *tcp; + struct udp_pcb *udp; + } pcb; + err_t err; + size_t num_sent; /* Number of acknowledged bytes to be reported to the core */ + struct pbuf *rx_chain; /* Chain of incoming data segments. */ + size_t rx_offset; /* Offset within the first pbuf (if partially consumed) */ + /* Last SSL write size, for retries. */ + int last_ssl_write_size; + /* Whether MG_SIG_RECV is already pending for this connection */ + int recv_pending; +}; - mg_printf(conn, "%s", "HTTP/1.1 200 OK\r\n" - "Allow: GET, POST, HEAD, CONNECT, PUT, DELETE, OPTIONS\r\n" - "DAV: 1\r\n\r\n"); -} +enum mg_sig_type { + MG_SIG_CONNECT_RESULT = 1, + MG_SIG_RECV = 2, + MG_SIG_CLOSE_CONN = 3, + MG_SIG_TOMBSTONE = 4, + MG_SIG_ACCEPT = 5, +}; -// Writes PROPFIND properties for a collection element -static void print_props(struct mg_connection *conn, const char* uri, - struct file *filep) { - char mtime[64]; - gmt_time_string(mtime, sizeof(mtime), &filep->modification_time); - conn->num_bytes_sent += mg_printf(conn, - "<d:response>" - "<d:href>%s</d:href>" - "<d:propstat>" - "<d:prop>" - "<d:resourcetype>%s</d:resourcetype>" - "<d:getcontentlength>%" INT64_FMT "</d:getcontentlength>" - "<d:getlastmodified>%s</d:getlastmodified>" - "</d:prop>" - "<d:status>HTTP/1.1 200 OK</d:status>" - "</d:propstat>" - "</d:response>\n", - uri, - filep->is_directory ? "<d:collection/>" : "", - filep->size, - mtime); -} - -static void print_dav_dir_entry(struct de *de, void *data) { - char href[PATH_MAX]; - struct mg_connection *conn = (struct mg_connection *) data; - mg_snprintf(conn, href, sizeof(href), "%s%s", - conn->request_info.uri, de->file_name); - print_props(conn, href, &de->file); -} - -static void handle_propfind(struct mg_connection *conn, const char *path, - struct file *filep) { - const char *depth = mg_get_header(conn, "Depth"); - - conn->must_close = 1; - conn->status_code = 207; - mg_printf(conn, "HTTP/1.1 207 Multi-Status\r\n" - "Connection: close\r\n" - "Content-Type: text/xml; charset=utf-8\r\n\r\n"); - - conn->num_bytes_sent += mg_printf(conn, - "<?xml version=\"1.0\" encoding=\"utf-8\"?>" - "<d:multistatus xmlns:d='DAV:'>\n"); +void mg_lwip_post_signal(enum mg_sig_type sig, struct mg_connection *nc); - // Print properties for the requested resource itself - print_props(conn, conn->request_info.uri, filep); +/* To be implemented by the platform. */ +void mg_lwip_mgr_schedule_poll(struct mg_mgr *mgr); - // If it is a directory, print directory entries too if Depth is not 0 - if (filep->is_directory && - !mg_strcasecmp(conn->ctx->config[ENABLE_DIRECTORY_LISTING], "yes") && - (depth == NULL || strcmp(depth, "0") != 0)) { - scan_directory(conn, path, conn, &print_dav_dir_entry); - } +#endif /* MG_ENABLE_NET_IF_LWIP_LOW_LEVEL */ - conn->num_bytes_sent += mg_printf(conn, "%s\n", "</d:multistatus>"); -} +#endif /* CS_COMMON_PLATFORMS_LWIP_MG_NET_IF_LWIP_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/lwip/mg_lwip_net_if.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ -#if defined(USE_WEBSOCKET) +#if MG_ENABLE_NET_IF_LWIP_LOW_LEVEL -// START OF SHA-1 code -// Copyright(c) By Steve Reid <steve@edmweb.com> -#define SHA1HANDSOFF -#if defined(__sun) -#include "solarisfixes.h" -#endif +/* Amalgamated: #include "common/mg_mem.h" */ -union char64long16 { unsigned char c[64]; uint32_t l[16]; }; +#include <lwip/init.h> +#include <lwip/pbuf.h> +#include <lwip/tcp.h> +#include <lwip/tcpip.h> +#if LWIP_VERSION >= 0x01050000 +#include <lwip/priv/tcp_priv.h> /* For tcp_seg */ +#else +#include <lwip/tcp_impl.h> +#endif +#include <lwip/udp.h> -#define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) +/* Amalgamated: #include "common/cs_dbg.h" */ -static uint32_t blk0(union char64long16 *block, int i) { - // Forrest: SHA expect BIG_ENDIAN, swap if LITTLE_ENDIAN - if (!is_big_endian()) { - block->l[i] = (rol(block->l[i], 24) & 0xFF00FF00) | - (rol(block->l[i], 8) & 0x00FF00FF); - } - return block->l[i]; -} +/* + * Newest versions of LWIP have ip_2_ip4, older have ipX_2_ip, + * even older have nothing. + */ +#ifndef ip_2_ip4 +#ifdef ipX_2_ip +#define ip_2_ip4(addr) ipX_2_ip(addr) +#else +#define ip_2_ip4(addr) (addr) +#endif +#endif -#define blk(i) (block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \ - ^block->l[(i+2)&15]^block->l[i&15],1)) -#define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(block, i)+0x5A827999+rol(v,5);w=rol(w,30); -#define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x5A827999+rol(v,5);w=rol(w,30); -#define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); -#define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30); -#define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1D6+rol(v,5);w=rol(w,30); +/* + * Depending on whether Mongoose is compiled with ipv6 support, use right + * lwip functions + */ +#if MG_ENABLE_IPV6 +#define TCP_NEW tcp_new_ip6 +#define TCP_BIND tcp_bind_ip6 +#define UDP_BIND udp_bind_ip6 +#define IPADDR_NTOA(x) ip6addr_ntoa((const ip6_addr_t *)(x)) +#define SET_ADDR(dst, src) \ + memcpy((dst)->sin6.sin6_addr.s6_addr, (src)->ip6.addr, \ + sizeof((dst)->sin6.sin6_addr.s6_addr)) +#else +#define TCP_NEW tcp_new +#define TCP_BIND tcp_bind +#define UDP_BIND udp_bind +#define IPADDR_NTOA ipaddr_ntoa +#define SET_ADDR(dst, src) (dst)->sin.sin_addr.s_addr = ip_2_ip4(src)->addr +#endif -typedef struct { - uint32_t state[5]; - uint32_t count[2]; - unsigned char buffer[64]; -} SHA1_CTX; +#if NO_SYS +#define tcpip_callback(fn, arg) (fn)(arg) +typedef void (*tcpip_callback_fn)(void *arg); +#endif -static void SHA1Transform(uint32_t state[5], const unsigned char buffer[64]) { - uint32_t a, b, c, d, e; - union char64long16 block[1]; +void mg_lwip_ssl_do_hs(struct mg_connection *nc); +void mg_lwip_ssl_send(struct mg_connection *nc); +void mg_lwip_ssl_recv(struct mg_connection *nc); - memcpy(block, buffer, 64); - a = state[0]; - b = state[1]; - c = state[2]; - d = state[3]; - e = state[4]; - R0(a,b,c,d,e, 0); R0(e,a,b,c,d, 1); R0(d,e,a,b,c, 2); R0(c,d,e,a,b, 3); - R0(b,c,d,e,a, 4); R0(a,b,c,d,e, 5); R0(e,a,b,c,d, 6); R0(d,e,a,b,c, 7); - R0(c,d,e,a,b, 8); R0(b,c,d,e,a, 9); R0(a,b,c,d,e,10); R0(e,a,b,c,d,11); - R0(d,e,a,b,c,12); R0(c,d,e,a,b,13); R0(b,c,d,e,a,14); R0(a,b,c,d,e,15); - R1(e,a,b,c,d,16); R1(d,e,a,b,c,17); R1(c,d,e,a,b,18); R1(b,c,d,e,a,19); - R2(a,b,c,d,e,20); R2(e,a,b,c,d,21); R2(d,e,a,b,c,22); R2(c,d,e,a,b,23); - R2(b,c,d,e,a,24); R2(a,b,c,d,e,25); R2(e,a,b,c,d,26); R2(d,e,a,b,c,27); - R2(c,d,e,a,b,28); R2(b,c,d,e,a,29); R2(a,b,c,d,e,30); R2(e,a,b,c,d,31); - R2(d,e,a,b,c,32); R2(c,d,e,a,b,33); R2(b,c,d,e,a,34); R2(a,b,c,d,e,35); - R2(e,a,b,c,d,36); R2(d,e,a,b,c,37); R2(c,d,e,a,b,38); R2(b,c,d,e,a,39); - R3(a,b,c,d,e,40); R3(e,a,b,c,d,41); R3(d,e,a,b,c,42); R3(c,d,e,a,b,43); - R3(b,c,d,e,a,44); R3(a,b,c,d,e,45); R3(e,a,b,c,d,46); R3(d,e,a,b,c,47); - R3(c,d,e,a,b,48); R3(b,c,d,e,a,49); R3(a,b,c,d,e,50); R3(e,a,b,c,d,51); - R3(d,e,a,b,c,52); R3(c,d,e,a,b,53); R3(b,c,d,e,a,54); R3(a,b,c,d,e,55); - R3(e,a,b,c,d,56); R3(d,e,a,b,c,57); R3(c,d,e,a,b,58); R3(b,c,d,e,a,59); - R4(a,b,c,d,e,60); R4(e,a,b,c,d,61); R4(d,e,a,b,c,62); R4(c,d,e,a,b,63); - R4(b,c,d,e,a,64); R4(a,b,c,d,e,65); R4(e,a,b,c,d,66); R4(d,e,a,b,c,67); - R4(c,d,e,a,b,68); R4(b,c,d,e,a,69); R4(a,b,c,d,e,70); R4(e,a,b,c,d,71); - R4(d,e,a,b,c,72); R4(c,d,e,a,b,73); R4(b,c,d,e,a,74); R4(a,b,c,d,e,75); - R4(e,a,b,c,d,76); R4(d,e,a,b,c,77); R4(c,d,e,a,b,78); R4(b,c,d,e,a,79); - state[0] += a; - state[1] += b; - state[2] += c; - state[3] += d; - state[4] += e; - a = b = c = d = e = 0; - memset(block, '\0', sizeof(block)); -} +void mg_lwip_if_init(struct mg_iface *iface); +void mg_lwip_if_free(struct mg_iface *iface); +void mg_lwip_if_add_conn(struct mg_connection *nc); +void mg_lwip_if_remove_conn(struct mg_connection *nc); +time_t mg_lwip_if_poll(struct mg_iface *iface, int timeout_ms); -static void SHA1Init(SHA1_CTX* context) { - context->state[0] = 0x67452301; - context->state[1] = 0xEFCDAB89; - context->state[2] = 0x98BADCFE; - context->state[3] = 0x10325476; - context->state[4] = 0xC3D2E1F0; - context->count[0] = context->count[1] = 0; -} +#if defined(RTOS_SDK) || defined(ESP_PLATFORM) +extern void mgos_lock(); +extern void mgos_unlock(); +#else +#define mgos_lock() +#define mgos_unlock() +#endif -static void SHA1Update(SHA1_CTX* context, const unsigned char* data, - uint32_t len) { - uint32_t i, j; +static void mg_lwip_recv_common(struct mg_connection *nc, struct pbuf *p); - j = context->count[0]; - if ((context->count[0] += len << 3) < j) - context->count[1]++; - context->count[1] += (len>>29); - j = (j >> 3) & 63; - if ((j + len) > 63) { - memcpy(&context->buffer[j], data, (i = 64-j)); - SHA1Transform(context->state, context->buffer); - for ( ; i + 63 < len; i += 64) { - SHA1Transform(context->state, &data[i]); - } - j = 0; +#if LWIP_TCP_KEEPALIVE +void mg_lwip_set_keepalive_params(struct mg_connection *nc, int idle, + int interval, int count) { + if (nc->sock == INVALID_SOCKET || nc->flags & MG_F_UDP) { + return; + } + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + struct tcp_pcb *tpcb = cs->pcb.tcp; + if (idle > 0 && interval > 0 && count > 0) { + tpcb->keep_idle = idle * 1000; + tpcb->keep_intvl = interval * 1000; + tpcb->keep_cnt = count; + tpcb->so_options |= SOF_KEEPALIVE; + } else { + tpcb->so_options &= ~SOF_KEEPALIVE; } - else i = 0; - memcpy(&context->buffer[j], &data[i], len - i); } +#elif !defined(MG_NO_LWIP_TCP_KEEPALIVE) +#warning LWIP TCP keepalive is disabled. Please consider enabling it. +#endif /* LWIP_TCP_KEEPALIVE */ -static void SHA1Final(unsigned char digest[20], SHA1_CTX* context) { - unsigned i; - unsigned char finalcount[8], c; - - for (i = 0; i < 8; i++) { - finalcount[i] = (unsigned char)((context->count[(i >= 4 ? 0 : 1)] - >> ((3-(i & 3)) * 8) ) & 255); - } - c = 0200; - SHA1Update(context, &c, 1); - while ((context->count[0] & 504) != 448) { - c = 0000; - SHA1Update(context, &c, 1); +static err_t mg_lwip_tcp_conn_cb(void *arg, struct tcp_pcb *tpcb, err_t err) { + struct mg_connection *nc = (struct mg_connection *) arg; + DBG(("%p connect to %s:%u = %d", nc, IPADDR_NTOA(ipX_2_ip(&tpcb->remote_ip)), + tpcb->remote_port, err)); + if (nc == NULL) { + tcp_abort(tpcb); + return ERR_ARG; } - SHA1Update(context, finalcount, 8); - for (i = 0; i < 20; i++) { - digest[i] = (unsigned char) - ((context->state[i>>2] >> ((3-(i & 3)) * 8) ) & 255); + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + cs->err = err; +#if LWIP_TCP_KEEPALIVE + if (err == 0) mg_lwip_set_keepalive_params(nc, 60, 10, 6); +#endif + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); + return ERR_OK; +} + +static void mg_lwip_tcp_error_cb(void *arg, err_t err) { + struct mg_connection *nc = (struct mg_connection *) arg; + DBG(("%p conn error %d", nc, err)); + if (nc == NULL) return; + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + cs->pcb.tcp = NULL; /* Has already been deallocated */ + if (nc->flags & MG_F_CONNECTING) { + cs->err = err; + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); + } else { + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); } - memset(context, '\0', sizeof(*context)); - memset(&finalcount, '\0', sizeof(finalcount)); } -// END OF SHA1 CODE - -static void base64_encode(const unsigned char *src, int src_len, char *dst) { - static const char *b64 = - "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; - int i, j, a, b, c; - for (i = j = 0; i < src_len; i += 3) { - a = src[i]; - b = i + 1 >= src_len ? 0 : src[i + 1]; - c = i + 2 >= src_len ? 0 : src[i + 2]; - - dst[j++] = b64[a >> 2]; - dst[j++] = b64[((a & 3) << 4) | (b >> 4)]; - if (i + 1 < src_len) { - dst[j++] = b64[(b & 15) << 2 | (c >> 6)]; +static err_t mg_lwip_tcp_recv_cb(void *arg, struct tcp_pcb *tpcb, + struct pbuf *p, err_t err) { + struct mg_connection *nc = (struct mg_connection *) arg; + DBG(("%p %p %u %d", nc, tpcb, (p != NULL ? p->tot_len : 0), err)); + if (p == NULL) { + if (nc != NULL && !(nc->flags & MG_F_CLOSE_IMMEDIATELY)) { + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); + } else { + /* Tombstoned connection, do nothing. */ } - if (i + 2 < src_len) { - dst[j++] = b64[c & 63]; + return ERR_OK; + } else if (nc == NULL) { + tcp_abort(tpcb); + return ERR_ARG; + } + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + /* + * If we get a chain of more than one segment at once, we need to bump + * refcount on the subsequent bufs to make them independent. + */ + if (p->next != NULL) { + struct pbuf *q = p->next; + for (; q != NULL; q = q->next) pbuf_ref(q); + } + mgos_lock(); + if (cs->rx_chain == NULL) { + cs->rx_offset = 0; + } else if (pbuf_clen(cs->rx_chain) >= 4) { + /* ESP SDK has a limited pool of 5 pbufs. We must not hog them all or RX + * will be completely blocked. We already have at least 4 in the chain, + * this one is, so we have to make a copy and release this one. */ + struct pbuf *np = pbuf_alloc(PBUF_RAW, p->tot_len, PBUF_RAM); + if (np != NULL) { + pbuf_copy(np, p); + pbuf_free(p); + p = np; } } - while (j % 4 != 0) { - dst[j++] = '='; - } - dst[j++] = '\0'; -} - -static void send_websocket_handshake(struct mg_connection *conn) { - static const char *magic = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; - char buf[100], sha[20], b64_sha[sizeof(sha) * 2]; - SHA1_CTX sha_ctx; - - mg_snprintf(conn, buf, sizeof(buf), "%s%s", - mg_get_header(conn, "Sec-WebSocket-Key"), magic); - SHA1Init(&sha_ctx); - SHA1Update(&sha_ctx, (unsigned char *) buf, strlen(buf)); - SHA1Final((unsigned char *) sha, &sha_ctx); - base64_encode((unsigned char *) sha, sizeof(sha), b64_sha); - mg_printf(conn, "%s%s%s", - "HTTP/1.1 101 Switching Protocols\r\n" - "Upgrade: websocket\r\n" - "Connection: Upgrade\r\n" - "Sec-WebSocket-Accept: ", b64_sha, "\r\n\r\n"); + mgos_unlock(); + mg_lwip_recv_common(nc, p); + return ERR_OK; } -static void read_websocket(struct mg_connection *conn) { - unsigned char *buf = (unsigned char *) conn->buf + conn->request_len; - int n; - size_t i, len, mask_len, data_len, header_len, body_len; - char mem[4 * 1024], *data; - - assert(conn->content_len == 0); - for (;;) { - header_len = 0; - if ((body_len = conn->data_len - conn->request_len) >= 2) { - len = buf[1] & 127; - mask_len = buf[1] & 128 ? 4 : 0; - if (len < 126 && body_len >= mask_len) { - data_len = len; - header_len = 2 + mask_len; - } else if (len == 126 && body_len >= 4 + mask_len) { - header_len = 4 + mask_len; - data_len = ((((int) buf[2]) << 8) + buf[3]); - } else if (body_len >= 10 + mask_len) { - header_len = 10 + mask_len; - data_len = (((uint64_t) htonl(* (uint32_t *) &buf[2])) << 32) + - htonl(* (uint32_t *) &buf[6]); - } - } - - if (header_len > 0) { - // Allocate space to hold websocket payload - data = mem; - if (data_len > sizeof(mem) && (data = malloc(data_len)) == NULL) { - // Allocation failed, exit the loop and then close the connection - // TODO: notify user about the failure - break; - } - - // Read frame payload into the allocated buffer. - assert(body_len >= header_len); - if (data_len + header_len > body_len) { - len = body_len - header_len; - memcpy(data, buf + header_len, len); - // TODO: handle pull error - pull(NULL, conn, data + len, data_len - len); - conn->data_len = 0; - } else { - len = data_len + header_len; - memcpy(data, buf + header_len, data_len); - memmove(buf, buf + len, body_len - len); - conn->data_len -= len; - } - - // Apply mask if necessary - if (mask_len > 0) { - for (i = 0; i < data_len; i++) { - data[i] ^= buf[header_len - mask_len + (i % 4)]; - } - } - - // Exit the loop if callback signalled to exit, - // or "connection close" opcode received. - if ((conn->ctx->callbacks.websocket_data != NULL && - !conn->ctx->callbacks.websocket_data(conn, buf[0], data, data_len)) || - (buf[0] & 0xf) == 8) { // Opcode == 8, connection close - break; - } +static void mg_lwip_handle_recv_tcp(struct mg_connection *nc) { + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; - if (data != mem) { - free(data); - } - // Not breaking the loop, process next websocket frame. +#if MG_ENABLE_SSL + if (nc->flags & MG_F_SSL) { + if (nc->flags & MG_F_SSL_HANDSHAKE_DONE) { + mg_lwip_ssl_recv(nc); } else { - // Buffering websocket request - if ((n = pull(NULL, conn, conn->buf + conn->data_len, - conn->buf_size - conn->data_len)) <= 0) { - break; - } - conn->data_len += n; + mg_lwip_ssl_do_hs(nc); } + return; } -} +#endif -static void handle_websocket_request(struct mg_connection *conn) { - if (strcmp(mg_get_header(conn, "Sec-WebSocket-Version"), "13") != 0) { - send_http_error(conn, 426, "Upgrade Required", "%s", "Upgrade Required"); - } else if (conn->ctx->callbacks.websocket_connect != NULL && - conn->ctx->callbacks.websocket_connect(conn) != 0) { - // Callback has returned non-zero, do not proceed with handshake - } else { - send_websocket_handshake(conn); - if (conn->ctx->callbacks.websocket_ready != NULL) { - conn->ctx->callbacks.websocket_ready(conn); + mgos_lock(); + while (cs->rx_chain != NULL) { + struct pbuf *seg = cs->rx_chain; + size_t len = (seg->len - cs->rx_offset); + char *data = (char *) MG_MALLOC(len); + if (data == NULL) { + mgos_unlock(); + DBG(("OOM")); + return; + } + pbuf_copy_partial(seg, data, len, cs->rx_offset); + cs->rx_offset += len; + if (cs->rx_offset == cs->rx_chain->len) { + cs->rx_chain = pbuf_dechain(cs->rx_chain); + pbuf_free(seg); + cs->rx_offset = 0; } - read_websocket(conn); + mgos_unlock(); + mg_if_recv_tcp_cb(nc, data, len, 1 /* own */); + mgos_lock(); } -} - -static int is_websocket_request(const struct mg_connection *conn) { - const char *host, *upgrade, *connection, *version, *key; + mgos_unlock(); - host = mg_get_header(conn, "Host"); - upgrade = mg_get_header(conn, "Upgrade"); - connection = mg_get_header(conn, "Connection"); - key = mg_get_header(conn, "Sec-WebSocket-Key"); - version = mg_get_header(conn, "Sec-WebSocket-Version"); - - return host != NULL && upgrade != NULL && connection != NULL && - key != NULL && version != NULL && - mg_strcasestr(upgrade, "websocket") != NULL && - mg_strcasestr(connection, "Upgrade") != NULL; + if (nc->send_mbuf.len > 0) { + mg_lwip_mgr_schedule_poll(nc->mgr); + } } -#endif // !USE_WEBSOCKET -static int isbyte(int n) { - return n >= 0 && n <= 255; +static err_t mg_lwip_tcp_sent_cb(void *arg, struct tcp_pcb *tpcb, + u16_t num_sent) { + struct mg_connection *nc = (struct mg_connection *) arg; + DBG(("%p %p %u %p %p", nc, tpcb, num_sent, tpcb->unsent, tpcb->unacked)); + if (nc == NULL) return ERR_OK; + if ((nc->flags & MG_F_SEND_AND_CLOSE) && !(nc->flags & MG_F_WANT_WRITE) && + nc->send_mbuf.len == 0 && tpcb->unsent == NULL && tpcb->unacked == NULL) { + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); + } + return ERR_OK; } -static int parse_net(const char *spec, uint32_t *net, uint32_t *mask) { - int n, a, b, c, d, slash = 32, len = 0; +struct mg_lwip_if_connect_tcp_ctx { + struct mg_connection *nc; + const union socket_address *sa; +}; - if ((sscanf(spec, "%d.%d.%d.%d/%d%n", &a, &b, &c, &d, &slash, &n) == 5 || - sscanf(spec, "%d.%d.%d.%d%n", &a, &b, &c, &d, &n) == 4) && - isbyte(a) && isbyte(b) && isbyte(c) && isbyte(d) && - slash >= 0 && slash < 33) { - len = n; - *net = ((uint32_t)a << 24) | ((uint32_t)b << 16) | ((uint32_t)c << 8) | d; - *mask = slash ? 0xffffffffU << (32 - slash) : 0; +static void mg_lwip_if_connect_tcp_tcpip(void *arg) { + struct mg_lwip_if_connect_tcp_ctx *ctx = + (struct mg_lwip_if_connect_tcp_ctx *) arg; + struct mg_connection *nc = ctx->nc; + const union socket_address *sa = ctx->sa; + + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + struct tcp_pcb *tpcb = TCP_NEW(); + cs->pcb.tcp = tpcb; + ip_addr_t *ip = (ip_addr_t *) &sa->sin.sin_addr.s_addr; + u16_t port = ntohs(sa->sin.sin_port); + tcp_arg(tpcb, nc); + tcp_err(tpcb, mg_lwip_tcp_error_cb); + tcp_sent(tpcb, mg_lwip_tcp_sent_cb); + tcp_recv(tpcb, mg_lwip_tcp_recv_cb); + cs->err = TCP_BIND(tpcb, IP_ADDR_ANY, 0 /* any port */); + DBG(("%p tcp_bind = %d", nc, cs->err)); + if (cs->err != ERR_OK) { + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); + return; + } + cs->err = tcp_connect(tpcb, ip, port, mg_lwip_tcp_conn_cb); + DBG(("%p tcp_connect %p = %d", nc, tpcb, cs->err)); + if (cs->err != ERR_OK) { + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); + return; } - - return len; } -static int set_throttle(const char *spec, uint32_t remote_ip, const char *uri) { - int throttle = 0; - struct vec vec, val; - uint32_t net, mask; - char mult; - double v; +void mg_lwip_if_connect_tcp(struct mg_connection *nc, + const union socket_address *sa) { + struct mg_lwip_if_connect_tcp_ctx ctx = {.nc = nc, .sa = sa}; + tcpip_callback(mg_lwip_if_connect_tcp_tcpip, &ctx); +} - while ((spec = next_option(spec, &vec, &val)) != NULL) { - mult = ','; - if (sscanf(val.ptr, "%lf%c", &v, &mult) < 1 || v < 0 || - (lowercase(&mult) != 'k' && lowercase(&mult) != 'm' && mult != ',')) { - continue; - } - v *= lowercase(&mult) == 'k' ? 1024 : lowercase(&mult) == 'm' ? 1048576 : 1; - if (vec.len == 1 && vec.ptr[0] == '*') { - throttle = (int) v; - } else if (parse_net(vec.ptr, &net, &mask) > 0) { - if ((remote_ip & mask) == net) { - throttle = (int) v; - } - } else if (match_prefix(vec.ptr, vec.len, uri) > 0) { - throttle = (int) v; +/* + * Lwip included in the SDKs for nRF5x chips has different type for the + * callback of `udp_recv()` + */ +#if LWIP_VERSION >= 0x01050000 +static void mg_lwip_udp_recv_cb(void *arg, struct udp_pcb *pcb, struct pbuf *p, + const ip_addr_t *addr, u16_t port) +#else +static void mg_lwip_udp_recv_cb(void *arg, struct udp_pcb *pcb, struct pbuf *p, + ip_addr_t *addr, u16_t port) +#endif +{ + struct mg_connection *nc = (struct mg_connection *) arg; + DBG(("%p %s:%u %p %u %u", nc, IPADDR_NTOA(addr), port, p, p->ref, p->len)); + /* Put address in a separate pbuf and tack it onto the packet. */ + struct pbuf *sap = + pbuf_alloc(PBUF_RAW, sizeof(union socket_address), PBUF_RAM); + if (sap == NULL) { + pbuf_free(p); + return; + } + union socket_address *sa = (union socket_address *) sap->payload; +#if LWIP_VERSION >= 0x01050000 + sa->sin.sin_addr.s_addr = ip_2_ip4(addr)->addr; +#else + sa->sin.sin_addr.s_addr = addr->addr; +#endif + sa->sin.sin_port = htons(port); + /* Logic in the recv handler requires that there be exactly one data pbuf. */ + p = pbuf_coalesce(p, PBUF_RAW); + pbuf_chain(sap, p); + mg_lwip_recv_common(nc, sap); + (void) pcb; +} + +static void mg_lwip_recv_common(struct mg_connection *nc, struct pbuf *p) { + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + mgos_lock(); + if (cs->rx_chain == NULL) { + cs->rx_chain = p; + } else { + pbuf_chain(cs->rx_chain, p); + } + if (!cs->recv_pending) { + cs->recv_pending = 1; + mg_lwip_post_signal(MG_SIG_RECV, nc); + } + mgos_unlock(); +} + +static void mg_lwip_handle_recv_udp(struct mg_connection *nc) { + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + /* + * For UDP, RX chain consists of interleaved address and packet bufs: + * Address pbuf followed by exactly one data pbuf (recv_cb took care of that). + */ + while (cs->rx_chain != NULL) { + struct pbuf *sap = cs->rx_chain; + struct pbuf *p = sap->next; + cs->rx_chain = pbuf_dechain(p); + size_t data_len = p->len; + char *data = (char *) MG_MALLOC(data_len); + if (data != NULL) { + pbuf_copy_partial(p, data, data_len, 0); + pbuf_free(p); + mg_if_recv_udp_cb(nc, data, data_len, + (union socket_address *) sap->payload, sap->len); + pbuf_free(sap); + } else { + pbuf_free(p); + pbuf_free(sap); } } +} - return throttle; +static void mg_lwip_if_connect_udp_tcpip(void *arg) { + struct mg_connection *nc = (struct mg_connection *) arg; + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + struct udp_pcb *upcb = udp_new(); + cs->err = UDP_BIND(upcb, IP_ADDR_ANY, 0 /* any port */); + DBG(("%p udp_bind %p = %d", nc, upcb, cs->err)); + if (cs->err == ERR_OK) { + udp_recv(upcb, mg_lwip_udp_recv_cb, nc); + cs->pcb.udp = upcb; + } else { + udp_remove(upcb); + } + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); } -static uint32_t get_remote_ip(const struct mg_connection *conn) { - return ntohl(* (uint32_t *) &conn->client.rsa.sin.sin_addr); +void mg_lwip_if_connect_udp(struct mg_connection *nc) { + tcpip_callback(mg_lwip_if_connect_udp_tcpip, nc); } -#ifdef USE_LUA +void mg_lwip_accept_conn(struct mg_connection *nc, struct tcp_pcb *tpcb) { + union socket_address sa; + SET_ADDR(&sa, &tpcb->remote_ip); + sa.sin.sin_port = htons(tpcb->remote_port); + mg_if_accept_tcp_cb(nc, &sa, sizeof(sa.sin)); +} -#ifdef _WIN32 -static void *mmap(void *addr, int64_t len, int prot, int flags, int fd, - int offset) { - HANDLE fh = (HANDLE) _get_osfhandle(fd); - HANDLE mh = CreateFileMapping(fh, 0, PAGE_READONLY, 0, 0, 0); - void *p = MapViewOfFile(mh, FILE_MAP_READ, 0, 0, (size_t) len); - CloseHandle(mh); - return p; -} -#define munmap(x, y) UnmapViewOfFile(x) -#define MAP_FAILED NULL -#define MAP_PRIVATE 0 -#define PROT_READ 0 -#else -#include <sys/mman.h> -#endif +static void tcp_close_tcpip(void *arg) { + tcp_close((struct tcp_pcb *) arg); +} -static void handle_request(struct mg_connection *); +void mg_lwip_handle_accept(struct mg_connection *nc) { + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + if (cs->pcb.tcp == NULL) return; +#if MG_ENABLE_SSL + if (cs->lc->flags & MG_F_SSL) { + if (mg_ssl_if_conn_accept(nc, cs->lc) != MG_SSL_OK) { + LOG(LL_ERROR, ("SSL error")); + tcpip_callback(tcp_close_tcpip, cs->pcb.tcp); + } + } else +#endif + { + mg_lwip_accept_conn(nc, cs->pcb.tcp); + } +} + +static err_t mg_lwip_accept_cb(void *arg, struct tcp_pcb *newtpcb, err_t err) { + struct mg_connection *lc = (struct mg_connection *) arg, *nc; + struct mg_lwip_conn_state *lcs, *cs; + struct tcp_pcb_listen *lpcb; + LOG(LL_DEBUG, + ("%p conn %p from %s:%u", lc, newtpcb, + IPADDR_NTOA(ipX_2_ip(&newtpcb->remote_ip)), newtpcb->remote_port)); + if (lc == NULL) { + tcp_abort(newtpcb); + return ERR_ABRT; + } + lcs = (struct mg_lwip_conn_state *) lc->sock; + lpcb = (struct tcp_pcb_listen *) lcs->pcb.tcp; +#if TCP_LISTEN_BACKLOG + tcp_accepted(lpcb); +#endif + nc = mg_if_accept_new_conn(lc); + if (nc == NULL) { + tcp_abort(newtpcb); + return ERR_ABRT; + } + cs = (struct mg_lwip_conn_state *) nc->sock; + cs->lc = lc; + cs->pcb.tcp = newtpcb; + /* We need to set up callbacks before returning because data may start + * arriving immediately. */ + tcp_arg(newtpcb, nc); + tcp_err(newtpcb, mg_lwip_tcp_error_cb); + tcp_sent(newtpcb, mg_lwip_tcp_sent_cb); + tcp_recv(newtpcb, mg_lwip_tcp_recv_cb); +#if LWIP_TCP_KEEPALIVE + mg_lwip_set_keepalive_params(nc, 60, 10, 6); +#endif + mg_lwip_post_signal(MG_SIG_ACCEPT, nc); + (void) err; + (void) lpcb; + return ERR_OK; +} -static int handle_lsp_request(struct mg_connection *, const char *, - struct file *, struct lua_State *); +struct mg_lwip_if_listen_ctx { + struct mg_connection *nc; + union socket_address *sa; + int ret; +}; -static int lsp_mg_error(lua_State *L) { - struct mg_connection *conn = lua_touserdata(L, lua_upvalueindex(1)); - int top = lua_gettop(L); - if (top < 1) lua_pushstring(L, "unknown error"); - // Get mg.onerror. - lua_getglobal(L, "mg"); - lua_getfield(L, -1, "onerror"); - // If mg.onerror is nil, silently stop processing chunks. - if (lua_isnil(L, -1)) { - lua_pushinteger(L, 1); - return 1; +static void mg_lwip_if_listen_tcp_tcpip(void *arg) { + struct mg_lwip_if_listen_ctx *ctx = (struct mg_lwip_if_listen_ctx *) arg; + struct mg_connection *nc = ctx->nc; + union socket_address *sa = ctx->sa; + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + struct tcp_pcb *tpcb = TCP_NEW(); + ip_addr_t *ip = (ip_addr_t *) &sa->sin.sin_addr.s_addr; + u16_t port = ntohs(sa->sin.sin_port); + cs->err = TCP_BIND(tpcb, ip, port); + DBG(("%p tcp_bind(%s:%u) = %d", nc, IPADDR_NTOA(ip), port, cs->err)); + if (cs->err != ERR_OK) { + tcp_close(tpcb); + ctx->ret = -1; + return; } - // Call mg.onerror. - lua_pushvalue(L, top); - lua_remove(L, top); - if (lua_pcall(L, 1, 1, 0)) { - // If mg.onerror fails, cry the error message and stop processing chunks. - cry(conn, "mg.onerror failed: %s", lua_tostring(L, -1)); - lua_pushinteger(L, 1); - return 1; + tcp_arg(tpcb, nc); + tpcb = tcp_listen(tpcb); + cs->pcb.tcp = tpcb; + tcp_accept(tpcb, mg_lwip_accept_cb); + ctx->ret = 0; +} + +int mg_lwip_if_listen_tcp(struct mg_connection *nc, union socket_address *sa) { + struct mg_lwip_if_listen_ctx ctx = {.nc = nc, .sa = sa}; + tcpip_callback(mg_lwip_if_listen_tcp_tcpip, &ctx); + return ctx.ret; +} + +static void mg_lwip_if_listen_udp_tcpip(void *arg) { + struct mg_lwip_if_listen_ctx *ctx = (struct mg_lwip_if_listen_ctx *) arg; + struct mg_connection *nc = ctx->nc; + union socket_address *sa = ctx->sa; + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + struct udp_pcb *upcb = udp_new(); + ip_addr_t *ip = (ip_addr_t *) &sa->sin.sin_addr.s_addr; + u16_t port = ntohs(sa->sin.sin_port); + cs->err = UDP_BIND(upcb, ip, port); + DBG(("%p udb_bind(%s:%u) = %d", nc, IPADDR_NTOA(ip), port, cs->err)); + if (cs->err != ERR_OK) { + udp_remove(upcb); + ctx->ret = -1; + } else { + udp_recv(upcb, mg_lwip_udp_recv_cb, nc); + cs->pcb.udp = upcb; + ctx->ret = 0; } - // Return the return value from mg.onerror. Non-0 = stop processing chunks. - return 1; } -// Silently stop processing chunks. -static void lsp_abort(lua_State *L) { - int top = lua_gettop(L); - lua_getglobal(L, "mg"); - lua_pushnil(L); - lua_setfield(L, -2, "onerror"); - lua_settop(L, top); - lua_pushstring(L, "aborting"); - lua_error(L); +int mg_lwip_if_listen_udp(struct mg_connection *nc, union socket_address *sa) { + struct mg_lwip_if_listen_ctx ctx = {.nc = nc, .sa = sa}; + tcpip_callback(mg_lwip_if_listen_udp_tcpip, &ctx); + return ctx.ret; } -static int lsp(struct mg_connection *conn, const char *path, - const char *p, int64_t len, lua_State *L) { - int i, j, result, pos = 0, lines = 1, lualines = 0; - char chunkname [MG_BUF_LEN]; +struct mg_lwip_tcp_write_ctx { + struct mg_connection *nc; + const void *data; + uint16_t len; + int ret; +}; - for (i = 0; i < len; i++) { - if (p[i] == '\n') ++lines; - if (p[i] == '<' && p[i + 1] == '?') { - for (j = i + 1; j < len ; j++) { - if (p[j] == '\n') ++lualines; - if (p[j] == '?' && p[j + 1] == '>') { - mg_write(conn, p + pos, i - pos); - lua_pushlightuserdata(L, conn); - lua_pushcclosure(L, lsp_mg_error, 1); - snprintf (chunkname, sizeof(chunkname), "@%s+%i", path, lines); - if (luaL_loadbuffer(L, p + (i + 2), j - (i + 2), chunkname)) { - lua_pcall(L, 1, 1, 0); - result = lua_tointeger(L, -1); - if (result) return result; - } else { - lua_pcall(L, 0, 0, 1); - result = lua_tointeger(L, -1); - if (result) return result; - } - pos = j + 2; - i = pos - 1; - break; - } - } - if (lualines > 0) { - lines += lualines; - lualines = 0; - } - } +static void tcp_output_tcpip(void *arg) { + tcp_output((struct tcp_pcb *) arg); +} + +static void mg_lwip_tcp_write_tcpip(void *arg) { + struct mg_lwip_tcp_write_ctx *ctx = (struct mg_lwip_tcp_write_ctx *) arg; + struct mg_connection *nc = ctx->nc; + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + struct tcp_pcb *tpcb = cs->pcb.tcp; + size_t len = MIN(tpcb->mss, MIN(ctx->len, tpcb->snd_buf)); + size_t unsent, unacked; + if (len == 0) { + DBG(("%p no buf avail %u %u %u %p %p", tpcb, tpcb->acked, tpcb->snd_buf, + tpcb->snd_queuelen, tpcb->unsent, tpcb->unacked)); + tcpip_callback(tcp_output_tcpip, tpcb); + ctx->ret = 0; + return; } - - if (i > pos) { - mg_write(conn, p + pos, i - pos); + unsent = (tpcb->unsent != NULL ? tpcb->unsent->len : 0); + unacked = (tpcb->unacked != NULL ? tpcb->unacked->len : 0); +/* + * On ESP8266 we only allow one TCP segment in flight at any given time. + * This may increase latency and reduce efficiency of tcp windowing, + * but memory is scarce and precious on that platform so we do this to + * reduce footprint. + */ +#if CS_PLATFORM == CS_P_ESP8266 + if (unacked > 0) { + ctx->ret = 0; + return; } - - return 0; + len = MIN(len, (TCP_MSS - unsent)); +#endif + cs->err = tcp_write(tpcb, ctx->data, len, TCP_WRITE_FLAG_COPY); + unsent = (tpcb->unsent != NULL ? tpcb->unsent->len : 0); + unacked = (tpcb->unacked != NULL ? tpcb->unacked->len : 0); + DBG(("%p tcp_write %u = %d, %u %u", tpcb, len, cs->err, unsent, unacked)); + if (cs->err != ERR_OK) { + /* + * We ignore ERR_MEM because memory will be freed up when the data is sent + * and we'll retry. + */ + ctx->ret = (cs->err == ERR_MEM ? 0 : -1); + return; + } + ctx->ret = len; } -static int lsp_mg_print(lua_State *L) { - int i, num_args; - const char *str; - size_t size; - struct mg_connection *conn = lua_touserdata(L, lua_upvalueindex(1)); - - num_args = lua_gettop(L); - for (i = 1; i <= num_args; i++) { - if (lua_isstring(L, i)) { - str = lua_tolstring(L, i, &size); - mg_write(conn, str, size); - } +static int mg_lwip_tcp_write(struct mg_connection *nc, const void *data, + uint16_t len) { + struct mg_lwip_tcp_write_ctx ctx = {.nc = nc, .data = data, .len = len}; + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + struct tcp_pcb *tpcb = cs->pcb.tcp; + if (tpcb == NULL) { + return -1; } - - return 0; + tcpip_callback(mg_lwip_tcp_write_tcpip, &ctx); + return ctx.ret; } -static int lsp_mg_read(lua_State *L) { - struct mg_connection *conn = lua_touserdata(L, lua_upvalueindex(1)); - char buf[1024]; - int len = mg_read(conn, buf, sizeof(buf)); - - lua_settop(L, 0); - lua_pushlstring(L, buf, len); +struct udp_sendto_ctx { + struct udp_pcb *upcb; + struct pbuf *p; + ip_addr_t *ip; + uint16_t port; + int ret; +}; - return 1; +static void udp_sendto_tcpip(void *arg) { + struct udp_sendto_ctx *ctx = (struct udp_sendto_ctx *) arg; + ctx->ret = udp_sendto(ctx->upcb, ctx->p, ctx->ip, ctx->port); +} + +static int mg_lwip_udp_send(struct mg_connection *nc, const void *data, + uint16_t len) { + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + if (cs->pcb.udp == NULL) { + /* + * In case of UDP, this usually means, what + * async DNS resolve is still in progress and connection + * is not ready yet + */ + DBG(("%p socket is not connected", nc)); + return -1; + } + struct udp_pcb *upcb = cs->pcb.udp; + struct pbuf *p = pbuf_alloc(PBUF_TRANSPORT, len, PBUF_RAM); +#if defined(LWIP_IPV4) && LWIP_IPV4 && defined(LWIP_IPV6) && LWIP_IPV6 + ip_addr_t ip = {.u_addr.ip4.addr = nc->sa.sin.sin_addr.s_addr, .type = 0}; +#else + ip_addr_t ip = {.addr = nc->sa.sin.sin_addr.s_addr}; +#endif + u16_t port = ntohs(nc->sa.sin.sin_port); + if (p == NULL) { + DBG(("OOM")); + return 0; + } + memcpy(p->payload, data, len); + struct udp_sendto_ctx ctx = {.upcb = upcb, .p = p, .ip = &ip, .port = port}; + tcpip_callback(udp_sendto_tcpip, &ctx); + cs->err = ctx.ret; + pbuf_free(p); + return (cs->err == ERR_OK ? len : -1); } -// mg.include: Include another .lp file -static int lsp_mod_include(lua_State *L) { - struct mg_connection *conn = lua_touserdata(L, lua_upvalueindex(1)); - struct file file = STRUCT_FILE_INITIALIZER; - if (handle_lsp_request(conn, lua_tostring(L, -1), &file, L)) { - // handle_lsp_request returned an error code, meaning an error occurred in - // the included page and mg.onerror returned non-zero. Stop processing. - lsp_abort(L); +static void mg_lwip_send_more(struct mg_connection *nc) { + int num_sent = 0; + if (nc->sock == INVALID_SOCKET) return; + if (nc->flags & MG_F_UDP) { + num_sent = mg_lwip_udp_send(nc, nc->send_mbuf.buf, nc->send_mbuf.len); + DBG(("%p mg_lwip_udp_send %u = %d", nc, nc->send_mbuf.len, num_sent)); + } else { + num_sent = mg_lwip_tcp_write(nc, nc->send_mbuf.buf, nc->send_mbuf.len); + DBG(("%p mg_lwip_tcp_write %u = %d", nc, nc->send_mbuf.len, num_sent)); + } + if (num_sent == 0) return; + if (num_sent > 0) { + mg_if_sent_cb(nc, num_sent); + } else { + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); } - return 0; } -// mg.cry: Log an error. Default value for mg.onerror. -static int lsp_mod_cry(lua_State *L){ - struct mg_connection *conn = lua_touserdata(L, lua_upvalueindex(1)); - cry(conn, "%s", lua_tostring(L, -1)); - return 0; +void mg_lwip_if_tcp_send(struct mg_connection *nc, const void *buf, + size_t len) { + mbuf_append(&nc->send_mbuf, buf, len); + mg_lwip_mgr_schedule_poll(nc->mgr); } -// mg.redirect: Redirect the request (internally). -static int lsp_mod_redirect(lua_State *L) { - struct mg_connection *conn = lua_touserdata(L, lua_upvalueindex(1)); - conn->request_info.uri = lua_tostring(L, -1); - handle_request(conn); - lsp_abort(L); - return 0; +void mg_lwip_if_udp_send(struct mg_connection *nc, const void *buf, + size_t len) { + mbuf_append(&nc->send_mbuf, buf, len); + mg_lwip_mgr_schedule_poll(nc->mgr); } -static void reg_string(struct lua_State *L, const char *name, const char *val) { - lua_pushstring(L, name); - lua_pushstring(L, val); - lua_rawset(L, -3); -} +struct tcp_recved_ctx { + struct tcp_pcb *tpcb; + size_t len; +}; -static void reg_int(struct lua_State *L, const char *name, int val) { - lua_pushstring(L, name); - lua_pushinteger(L, val); - lua_rawset(L, -3); +void tcp_recved_tcpip(void *arg) { + struct tcp_recved_ctx *ctx = (struct tcp_recved_ctx *) arg; + tcp_recved(ctx->tpcb, ctx->len); } -static void reg_function(struct lua_State *L, const char *name, - lua_CFunction func, struct mg_connection *conn) { - lua_pushstring(L, name); - lua_pushlightuserdata(L, conn); - lua_pushcclosure(L, func, 1); - lua_rawset(L, -3); +void mg_lwip_if_recved(struct mg_connection *nc, size_t len) { + if (nc->flags & MG_F_UDP) return; + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + if (nc->sock == INVALID_SOCKET || cs->pcb.tcp == NULL) { + DBG(("%p invalid socket", nc)); + return; + } + DBG(("%p %p %u %u", nc, cs->pcb.tcp, len, + (cs->rx_chain ? cs->rx_chain->tot_len : 0))); + struct tcp_recved_ctx ctx = {.tpcb = cs->pcb.tcp, .len = len}; +#if MG_ENABLE_SSL + if (!(nc->flags & MG_F_SSL)) { + tcpip_callback(tcp_recved_tcpip, &ctx); + } else { + /* Currently SSL acknowledges data immediately. + * TODO(rojer): Find a way to propagate mg_lwip_if_recved. */ + } +#else + tcpip_callback(tcp_recved_tcpip, &ctx); +#endif + mbuf_trim(&nc->recv_mbuf); } -static void prepare_lua_environment(struct mg_connection *conn, lua_State *L) { - const struct mg_request_info *ri = mg_get_request_info(conn); - extern void luaL_openlibs(lua_State *); - int i; - - luaL_openlibs(L); -#ifdef USE_LUA_SQLITE3 - { extern int luaopen_lsqlite3(lua_State *); luaopen_lsqlite3(L); } -#endif - - // Register "print" function which calls mg_write() - lua_pushlightuserdata(L, conn); - lua_pushcclosure(L, lsp_mg_print, 1); - lua_setglobal(L, "print"); - - // Register mg_read() - lua_pushlightuserdata(L, conn); - lua_pushcclosure(L, lsp_mg_read, 1); - lua_setglobal(L, "read"); - - // Register mg module - lua_newtable(L); - reg_function(L, "cry", lsp_mod_cry, conn); - reg_function(L, "include", lsp_mod_include, conn); - reg_function(L, "onerror", lsp_mod_cry, conn); - reg_function(L, "redirect", lsp_mod_redirect, conn); - reg_string(L, "version", MONGOOSE_VERSION); - lua_setglobal(L, "mg"); - - // Export request_info - lua_newtable(L); - reg_string(L, "request_method", ri->request_method); - reg_string(L, "uri", ri->uri); - reg_string(L, "http_version", ri->http_version); - reg_string(L, "query_string", ri->query_string); - reg_int(L, "remote_ip", ri->remote_ip); - reg_int(L, "remote_port", ri->remote_port); - reg_int(L, "num_headers", ri->num_headers); - lua_pushstring(L, "http_headers"); - lua_newtable(L); - for (i = 0; i < ri->num_headers; i++) { - reg_string(L, ri->http_headers[i].name, ri->http_headers[i].value); - } - lua_rawset(L, -3); - lua_setglobal(L, "request_info"); -} - -// Throw a lua error. Called from handle_lsp_request via mg.include -static void send_lua_error(struct lua_State *L, - PRINTF_FORMAT_STRING(const char *fmt), ...) - PRINTF_ARGS(2, 3); - -static void send_lua_error(struct lua_State *L, const char *fmt, ...) { - char buf[MG_BUF_LEN]; - va_list ap; - int len = 0; - - va_start(ap, fmt); - len += vsnprintf(buf + len, sizeof(buf) - len, fmt, ap); - va_end(ap); - - lua_pushstring(L, buf); - lua_error(L); +int mg_lwip_if_create_conn(struct mg_connection *nc) { + struct mg_lwip_conn_state *cs = + (struct mg_lwip_conn_state *) MG_CALLOC(1, sizeof(*cs)); + if (cs == NULL) return 0; + cs->nc = nc; + nc->sock = (intptr_t) cs; + return 1; } -static int handle_lsp_request(struct mg_connection *conn, const char *path, - struct file *filep, struct lua_State *ls) { - void *p = NULL; - lua_State *L = NULL; - int error = 1; +static void udp_remove_tcpip(void *arg) { + udp_remove((struct udp_pcb *) arg); +} - if (!mg_stat(conn, path, filep) || !mg_fopen(conn, path, "r", filep)) { - if (ls == NULL) { - send_http_error(conn, 404, "Not Found", "%s", "File not found"); - } else { - send_lua_error(ls, "File not found: %s", path); - } - } else if (filep->membuf == NULL && - (p = mmap(NULL, (size_t) filep->size, PROT_READ, MAP_PRIVATE, - fileno(filep->fp), 0)) == MAP_FAILED) { - if (ls == NULL) { - send_http_error(conn, 500, http_500_error, "mmap(%s, %zu, %d): %s", path, - (size_t) filep->size, fileno(filep->fp), strerror(errno)); - } else { - send_lua_error(ls, "mmap(%s, %zu, %d): %s", path, - (size_t) filep->size, fileno(filep->fp), strerror(errno)); +void mg_lwip_if_destroy_conn(struct mg_connection *nc) { + if (nc->sock == INVALID_SOCKET) return; + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + if (!(nc->flags & MG_F_UDP)) { + struct tcp_pcb *tpcb = cs->pcb.tcp; + if (tpcb != NULL) { + tcp_arg(tpcb, NULL); + DBG(("%p tcp_close %p", nc, tpcb)); + tcp_arg(tpcb, NULL); + tcpip_callback(tcp_close_tcpip, tpcb); + } + while (cs->rx_chain != NULL) { + struct pbuf *seg = cs->rx_chain; + cs->rx_chain = pbuf_dechain(cs->rx_chain); + pbuf_free(seg); + } + memset(cs, 0, sizeof(*cs)); + MG_FREE(cs); + } else if (nc->listener == NULL) { + /* Only close outgoing UDP pcb or listeners. */ + struct udp_pcb *upcb = cs->pcb.udp; + if (upcb != NULL) { + DBG(("%p udp_remove %p", nc, upcb)); + tcpip_callback(udp_remove_tcpip, upcb); + } + memset(cs, 0, sizeof(*cs)); + MG_FREE(cs); + } + nc->sock = INVALID_SOCKET; +} + +void mg_lwip_if_get_conn_addr(struct mg_connection *nc, int remote, + union socket_address *sa) { + memset(sa, 0, sizeof(*sa)); + if (nc == NULL || nc->sock == INVALID_SOCKET) return; + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + if (nc->flags & MG_F_UDP) { + struct udp_pcb *upcb = cs->pcb.udp; + if (remote) { + memcpy(sa, &nc->sa, sizeof(*sa)); + } else if (upcb != NULL) { + sa->sin.sin_port = htons(upcb->local_port); + SET_ADDR(sa, &upcb->local_ip); } - } else if ((L = ls != NULL ? ls : luaL_newstate()) == NULL) { - send_http_error(conn, 500, http_500_error, "%s", "luaL_newstate failed"); } else { - // We're not sending HTTP headers here, Lua page must do it. - if (ls == NULL) { - prepare_lua_environment(conn, L); - if (conn->ctx->callbacks.init_lua != NULL) { - conn->ctx->callbacks.init_lua(conn, L); - } + struct tcp_pcb *tpcb = cs->pcb.tcp; + if (remote) { + memcpy(sa, &nc->sa, sizeof(*sa)); + } else if (tpcb != NULL) { + sa->sin.sin_port = htons(tpcb->local_port); + SET_ADDR(sa, &tpcb->local_ip); } - error = lsp(conn, path, filep->membuf == NULL ? p : filep->membuf, - filep->size, L); } - - if (L && ls == NULL) lua_close(L); - if (p) munmap(p, filep->size); - mg_fclose(filep); - return error; } -#endif // USE_LUA -int mg_upload(struct mg_connection *conn, const char *destination_dir) { - const char *content_type_header, *boundary_start; - char buf[MG_BUF_LEN], path[PATH_MAX], fname[1024], boundary[100], *s; - FILE *fp; - int bl, n, i, j, headers_len, boundary_len, len = 0, num_uploaded_files = 0; - - // Request looks like this: - // - // POST /upload HTTP/1.1 - // Host: 127.0.0.1:8080 - // Content-Length: 244894 - // Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryRVr - // - // ------WebKitFormBoundaryRVr - // Content-Disposition: form-data; name="file"; filename="accum.png" - // Content-Type: image/png - // - // <89>PNG - // <PNG DATA> - // ------WebKitFormBoundaryRVr - - // Extract boundary string from the Content-Type header - if ((content_type_header = mg_get_header(conn, "Content-Type")) == NULL || - (boundary_start = mg_strcasestr(content_type_header, - "boundary=")) == NULL || - (sscanf(boundary_start, "boundary=\"%99[^\"]\"", boundary) == 0 && - sscanf(boundary_start, "boundary=%99s", boundary) == 0) || - boundary[0] == '\0') { - return num_uploaded_files; - } - - boundary_len = strlen(boundary); - bl = boundary_len + 4; // \r\n--<boundary> - for (;;) { - // Pull in headers - assert(len >= 0 && len <= (int) sizeof(buf)); - while ((n = mg_read(conn, buf + len, sizeof(buf) - len)) > 0) { - len += n; - } - if ((headers_len = get_request_len(buf, len)) <= 0) { - break; - } +void mg_lwip_if_sock_set(struct mg_connection *nc, sock_t sock) { + nc->sock = sock; +} + +/* clang-format off */ +#define MG_LWIP_IFACE_VTABLE \ + { \ + mg_lwip_if_init, \ + mg_lwip_if_free, \ + mg_lwip_if_add_conn, \ + mg_lwip_if_remove_conn, \ + mg_lwip_if_poll, \ + mg_lwip_if_listen_tcp, \ + mg_lwip_if_listen_udp, \ + mg_lwip_if_connect_tcp, \ + mg_lwip_if_connect_udp, \ + mg_lwip_if_tcp_send, \ + mg_lwip_if_udp_send, \ + mg_lwip_if_recved, \ + mg_lwip_if_create_conn, \ + mg_lwip_if_destroy_conn, \ + mg_lwip_if_sock_set, \ + mg_lwip_if_get_conn_addr, \ + } +/* clang-format on */ + +const struct mg_iface_vtable mg_lwip_iface_vtable = MG_LWIP_IFACE_VTABLE; +#if MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL +const struct mg_iface_vtable mg_default_iface_vtable = MG_LWIP_IFACE_VTABLE; +#endif - // Fetch file name. - fname[0] = '\0'; - for (i = j = 0; i < headers_len; i++) { - if (buf[i] == '\r' && buf[i + 1] == '\n') { - buf[i] = buf[i + 1] = '\0'; - // TODO(lsm): don't expect filename to be the 3rd field, - // parse the header properly instead. - sscanf(&buf[j], "Content-Disposition: %*s %*s filename=\"%1023[^\"]", - fname); - j = i + 2; - } - } +#endif /* MG_ENABLE_NET_IF_LWIP_LOW_LEVEL */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/lwip/mg_lwip_ev_mgr.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ - // Give up if the headers are not what we expect - if (fname[0] == '\0') { - break; - } +#if MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL - // Move data to the beginning of the buffer - assert(len >= headers_len); - memmove(buf, &buf[headers_len], len - headers_len); - len -= headers_len; +#ifndef MG_SIG_QUEUE_LEN +#define MG_SIG_QUEUE_LEN 32 +#endif - // We open the file with exclusive lock held. This guarantee us - // there is no other thread can save into the same file simultaneously. - fp = NULL; - // Construct destination file name. Do not allow paths to have slashes. - if ((s = strrchr(fname, '/')) == NULL) { - s = fname; - } - // Open file in binary mode. TODO: set an exclusive lock. - snprintf(path, sizeof(path), "%s/%s", destination_dir, s); - if ((fp = fopen(path, "wb")) == NULL) { - break; - } +struct mg_ev_mgr_lwip_signal { + int sig; + struct mg_connection *nc; +}; - // Read POST data, write into file until boundary is found. - n = 0; - do { - len += n; - for (i = 0; i < len - bl; i++) { - if (!memcmp(&buf[i], "\r\n--", 4) && - !memcmp(&buf[i + 4], boundary, boundary_len)) { - // Found boundary, that's the end of file data. - fwrite(buf, 1, i, fp); - fflush(fp); - num_uploaded_files++; - if (conn->ctx->callbacks.upload != NULL) { - conn->ctx->callbacks.upload(conn, path); - } - memmove(buf, &buf[i + bl], len - (i + bl)); - len -= i + bl; - break; +struct mg_ev_mgr_lwip_data { + struct mg_ev_mgr_lwip_signal sig_queue[MG_SIG_QUEUE_LEN]; + int sig_queue_len; + int start_index; +}; + +void mg_lwip_post_signal(enum mg_sig_type sig, struct mg_connection *nc) { + struct mg_ev_mgr_lwip_data *md = + (struct mg_ev_mgr_lwip_data *) nc->iface->data; + mgos_lock(); + if (md->sig_queue_len >= MG_SIG_QUEUE_LEN) { + mgos_unlock(); + return; + } + int end_index = (md->start_index + md->sig_queue_len) % MG_SIG_QUEUE_LEN; + md->sig_queue[end_index].sig = sig; + md->sig_queue[end_index].nc = nc; + md->sig_queue_len++; + mg_lwip_mgr_schedule_poll(nc->mgr); + mgos_unlock(); +} + +void mg_ev_mgr_lwip_process_signals(struct mg_mgr *mgr) { + struct mg_ev_mgr_lwip_data *md = + (struct mg_ev_mgr_lwip_data *) mgr->ifaces[MG_MAIN_IFACE]->data; + while (md->sig_queue_len > 0) { + mgos_lock(); + int sig = md->sig_queue[md->start_index].sig; + struct mg_connection *nc = md->sig_queue[md->start_index].nc; + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + md->start_index = (md->start_index + 1) % MG_SIG_QUEUE_LEN; + md->sig_queue_len--; + mgos_unlock(); + if (nc->iface == NULL || nc->mgr == NULL) continue; + switch (sig) { + case MG_SIG_CONNECT_RESULT: { +#if MG_ENABLE_SSL + if (cs->err == 0 && (nc->flags & MG_F_SSL) && + !(nc->flags & MG_F_SSL_HANDSHAKE_DONE)) { + mg_lwip_ssl_do_hs(nc); + } else +#endif + { + mg_if_connect_cb(nc, cs->err); + } + break; + } + case MG_SIG_CLOSE_CONN: { + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + mg_close_conn(nc); + break; + } + case MG_SIG_RECV: { + cs->recv_pending = 0; + if (nc->flags & MG_F_UDP) { + mg_lwip_handle_recv_udp(nc); + } else { + mg_lwip_handle_recv_tcp(nc); } + break; } - if (len > bl) { - fwrite(buf, 1, len - bl, fp); - memmove(buf, &buf[len - bl], bl); - len = bl; + case MG_SIG_TOMBSTONE: { + break; } - } while ((n = mg_read(conn, buf + len, sizeof(buf) - len)) > 0); - fclose(fp); - } - - return num_uploaded_files; -} - -static int is_put_or_delete_request(const struct mg_connection *conn) { - const char *s = conn->request_info.request_method; - return s != NULL && (!strcmp(s, "PUT") || !strcmp(s, "DELETE")); -} - -static int get_first_ssl_listener_index(const struct mg_context *ctx) { - int i, index = -1; - for (i = 0; index == -1 && i < ctx->num_listening_sockets; i++) { - index = ctx->listening_sockets[i].is_ssl ? i : -1; - } - return index; -} - -static void redirect_to_https_port(struct mg_connection *conn, int ssl_index) { - char host[1025]; - const char *host_header; - - if ((host_header = mg_get_header(conn, "Host")) == NULL || - sscanf(host_header, "%1024[^:]", host) == 0) { - // Cannot get host from the Host: header. Fallback to our IP address. - sockaddr_to_string(host, sizeof(host), &conn->client.lsa); - } - - mg_printf(conn, "HTTP/1.1 302 Found\r\nLocation: https://%s:%d%s\r\n\r\n", - host, (int) ntohs(conn->ctx->listening_sockets[ssl_index]. - lsa.sin.sin_port), conn->request_info.uri); -} - -// This is the heart of the Mongoose's logic. -// This function is called when the request is read, parsed and validated, -// and Mongoose must decide what action to take: serve a file, or -// a directory, or call embedded function, etcetera. -static void handle_request(struct mg_connection *conn) { - struct mg_request_info *ri = &conn->request_info; - char path[PATH_MAX]; - int uri_len, ssl_index; - struct file file = STRUCT_FILE_INITIALIZER; - - if ((conn->request_info.query_string = strchr(ri->uri, '?')) != NULL) { - * ((char *) conn->request_info.query_string++) = '\0'; - } - uri_len = (int) strlen(ri->uri); - url_decode(ri->uri, uri_len, (char *) ri->uri, uri_len + 1, 0); - remove_double_dots_and_double_slashes((char *) ri->uri); - convert_uri_to_file_name(conn, path, sizeof(path), &file); - conn->throttle = set_throttle(conn->ctx->config[THROTTLE], - get_remote_ip(conn), ri->uri); - - DEBUG_TRACE(("%s", ri->uri)); - // Perform redirect and auth checks before calling begin_request() handler. - // Otherwise, begin_request() would need to perform auth checks and redirects. - if (!conn->client.is_ssl && conn->client.ssl_redir && - (ssl_index = get_first_ssl_listener_index(conn->ctx)) > -1) { - redirect_to_https_port(conn, ssl_index); - } else if (!is_put_or_delete_request(conn) && - !check_authorization(conn, path)) { - send_authorization_request(conn); - } else if (conn->ctx->callbacks.begin_request != NULL && - conn->ctx->callbacks.begin_request(conn)) { - // Do nothing, callback has served the request -#if defined(USE_WEBSOCKET) - } else if (is_websocket_request(conn)) { - handle_websocket_request(conn); -#endif - } else if (!strcmp(ri->request_method, "OPTIONS")) { - send_options(conn); - } else if (conn->ctx->config[DOCUMENT_ROOT] == NULL) { - send_http_error(conn, 404, "Not Found", "Not Found"); - } else if (is_put_or_delete_request(conn) && - (conn->ctx->config[PUT_DELETE_PASSWORDS_FILE] == NULL || - is_authorized_for_put(conn) != 1)) { - send_authorization_request(conn); - } else if (!strcmp(ri->request_method, "PUT")) { - put_file(conn, path); - } else if (!strcmp(ri->request_method, "DELETE")) { - if (mg_remove(path) == 0) { - send_http_error(conn, 200, "OK", "%s", ""); - } else { - send_http_error(conn, 500, http_500_error, "remove(%s): %s", path, - strerror(ERRNO)); - } - } else if ((file.membuf == NULL && file.modification_time == (time_t) 0) || - must_hide_file(conn, path)) { - send_http_error(conn, 404, "Not Found", "%s", "File not found"); - } else if (file.is_directory && ri->uri[uri_len - 1] != '/') { - mg_printf(conn, "HTTP/1.1 301 Moved Permanently\r\n" - "Location: %s/\r\n\r\n", ri->uri); - } else if (!strcmp(ri->request_method, "PROPFIND")) { - handle_propfind(conn, path, &file); - } else if (file.is_directory && - !substitute_index_file(conn, path, sizeof(path), &file)) { - if (!mg_strcasecmp(conn->ctx->config[ENABLE_DIRECTORY_LISTING], "yes")) { - handle_directory_request(conn, path); - } else { - send_http_error(conn, 403, "Directory Listing Denied", - "Directory listing denied"); - } -#ifdef USE_LUA - } else if (match_prefix("**.lp$", 6, path) > 0) { - handle_lsp_request(conn, path, &file, NULL); -#endif -#if !defined(NO_CGI) - } else if (match_prefix(conn->ctx->config[CGI_EXTENSIONS], - strlen(conn->ctx->config[CGI_EXTENSIONS]), - path) > 0) { - if (strcmp(ri->request_method, "POST") && - strcmp(ri->request_method, "HEAD") && - strcmp(ri->request_method, "GET")) { - send_http_error(conn, 501, "Not Implemented", - "Method %s is not implemented", ri->request_method); - } else { - handle_cgi_request(conn, path); - } -#endif // !NO_CGI - } else if (match_prefix(conn->ctx->config[SSI_EXTENSIONS], - strlen(conn->ctx->config[SSI_EXTENSIONS]), - path) > 0) { - handle_ssi_file_request(conn, path); - } else if (is_not_modified(conn, &file)) { - send_http_error(conn, 304, "Not Modified", "%s", ""); - } else { - handle_file_request(conn, path, &file); + case MG_SIG_ACCEPT: { + mg_lwip_handle_accept(nc); + break; + } + } } } -static void close_all_listening_sockets(struct mg_context *ctx) { - int i; - for (i = 0; i < ctx->num_listening_sockets; i++) { - closesocket(ctx->listening_sockets[i].sock); - } - free(ctx->listening_sockets); -} - -// Valid listening port specification is: [ip_address:]port[s] -// Examples: 80, 443s, 127.0.0.1:3128, 1.2.3.4:8080s -// TODO(lsm): add parsing of the IPv6 address -static int parse_port_string(const struct vec *vec, struct socket *so) { - int a, b, c, d, port, len; - - // MacOS needs that. If we do not zero it, subsequent bind() will fail. - // Also, all-zeroes in the socket address means binding to all addresses - // for both IPv4 and IPv6 (INADDR_ANY and IN6ADDR_ANY_INIT). - memset(so, 0, sizeof(*so)); - - if (sscanf(vec->ptr, "%d.%d.%d.%d:%d%n", &a, &b, &c, &d, &port, &len) == 5) { - // Bind to a specific IPv4 address - so->lsa.sin.sin_addr.s_addr = htonl((a << 24) | (b << 16) | (c << 8) | d); - } else if (sscanf(vec->ptr, "%d%n", &port, &len) != 1 || - len <= 0 || - len > (int) vec->len || - (vec->ptr[len] && vec->ptr[len] != 's' && - vec->ptr[len] != 'r' && vec->ptr[len] != ',')) { - return 0; - } +void mg_lwip_if_init(struct mg_iface *iface) { + LOG(LL_INFO, ("%p Mongoose init", iface)); + iface->data = MG_CALLOC(1, sizeof(struct mg_ev_mgr_lwip_data)); +} - so->is_ssl = vec->ptr[len] == 's'; - so->ssl_redir = vec->ptr[len] == 'r'; -#if defined(USE_IPV6) - so->lsa.sin6.sin6_family = AF_INET6; - so->lsa.sin6.sin6_port = htons((uint16_t) port); -#else - so->lsa.sin.sin_family = AF_INET; - so->lsa.sin.sin_port = htons((uint16_t) port); -#endif +void mg_lwip_if_free(struct mg_iface *iface) { + MG_FREE(iface->data); + iface->data = NULL; +} - return 1; +void mg_lwip_if_add_conn(struct mg_connection *nc) { + (void) nc; } -static int set_ports_option(struct mg_context *ctx) { - const char *list = ctx->config[LISTENING_PORTS]; - int on = 1, success = 1; -#if defined(USE_IPV6) - int off = 0; -#endif - struct vec vec; - struct socket so; - - while (success && (list = next_option(list, &vec, NULL)) != NULL) { - if (!parse_port_string(&vec, &so)) { - cry(fc(ctx), "%s: %.*s: invalid port spec. Expecting list of: %s", - __func__, (int) vec.len, vec.ptr, "[IP_ADDRESS:]PORT[s|p]"); - success = 0; - } else if (so.is_ssl && ctx->ssl_ctx == NULL) { - cry(fc(ctx), "Cannot add SSL socket, is -ssl_certificate option set?"); - success = 0; - } else if ((so.sock = socket(so.lsa.sa.sa_family, SOCK_STREAM, 6)) == - INVALID_SOCKET || - // On Windows, SO_REUSEADDR is recommended only for - // broadcast UDP sockets - setsockopt(so.sock, SOL_SOCKET, SO_REUSEADDR, - (void *) &on, sizeof(on)) != 0 || -#if defined(USE_IPV6) - setsockopt(so.sock, IPPROTO_IPV6, IPV6_V6ONLY, (void *) &off, - sizeof(off)) != 0 || -#endif - bind(so.sock, &so.lsa.sa, sizeof(so.lsa)) != 0 || - listen(so.sock, SOMAXCONN) != 0) { - cry(fc(ctx), "%s: cannot bind to %.*s: %s", __func__, - (int) vec.len, vec.ptr, strerror(ERRNO)); - closesocket(so.sock); - success = 0; - } else { - set_close_on_exec(so.sock); - // TODO: handle realloc failure - ctx->listening_sockets = realloc(ctx->listening_sockets, - (ctx->num_listening_sockets + 1) * - sizeof(ctx->listening_sockets[0])); - ctx->listening_sockets[ctx->num_listening_sockets] = so; - ctx->num_listening_sockets++; +void mg_lwip_if_remove_conn(struct mg_connection *nc) { + struct mg_ev_mgr_lwip_data *md = + (struct mg_ev_mgr_lwip_data *) nc->iface->data; + /* Walk the queue and null-out further signals for this conn. */ + for (int i = 0; i < MG_SIG_QUEUE_LEN; i++) { + if (md->sig_queue[i].nc == nc) { + md->sig_queue[i].sig = MG_SIG_TOMBSTONE; } } - - if (!success) { - close_all_listening_sockets(ctx); - } - - return success; } -static void log_header(const struct mg_connection *conn, const char *header, - FILE *fp) { - const char *header_value; - - if ((header_value = mg_get_header(conn, header)) == NULL) { - (void) fprintf(fp, "%s", " -"); - } else { - (void) fprintf(fp, " \"%s\"", header_value); +time_t mg_lwip_if_poll(struct mg_iface *iface, int timeout_ms) { + struct mg_mgr *mgr = iface->mgr; + int n = 0; + double now = mg_time(); + struct mg_connection *nc, *tmp; + double min_timer = 0; + int num_timers = 0; +#if 0 + DBG(("begin poll @%u", (unsigned int) (now * 1000))); +#endif + mg_ev_mgr_lwip_process_signals(mgr); + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + tmp = nc->next; + n++; + if ((nc->flags & MG_F_CLOSE_IMMEDIATELY) || + ((nc->flags & MG_F_SEND_AND_CLOSE) && (nc->flags & MG_F_UDP) && + (nc->send_mbuf.len == 0))) { + mg_close_conn(nc); + continue; + } + mg_if_poll(nc, now); + mg_if_timer(nc, now); +#if MG_ENABLE_SSL + if ((nc->flags & MG_F_SSL) && cs != NULL && cs->pcb.tcp != NULL && + cs->pcb.tcp->state == ESTABLISHED) { + if (((nc->flags & MG_F_WANT_WRITE) || + ((nc->send_mbuf.len > 0) && + (nc->flags & MG_F_SSL_HANDSHAKE_DONE))) && + cs->pcb.tcp->snd_buf > 0) { + /* Can write more. */ + if (nc->flags & MG_F_SSL_HANDSHAKE_DONE) { + if (!(nc->flags & MG_F_CONNECTING)) mg_lwip_ssl_send(nc); + } else { + mg_lwip_ssl_do_hs(nc); + } + } + if (cs->rx_chain != NULL || (nc->flags & MG_F_WANT_READ)) { + if (nc->flags & MG_F_SSL_HANDSHAKE_DONE) { + if (!(nc->flags & MG_F_CONNECTING)) mg_lwip_ssl_recv(nc); + } else { + mg_lwip_ssl_do_hs(nc); + } + } + } else +#endif /* MG_ENABLE_SSL */ + { + if (nc->send_mbuf.len > 0 && !(nc->flags & MG_F_CONNECTING)) { + mg_lwip_send_more(nc); + } + } + if (nc->sock != INVALID_SOCKET && + !(nc->flags & (MG_F_UDP | MG_F_LISTENING)) && cs->pcb.tcp != NULL && + cs->pcb.tcp->unsent != NULL) { + tcpip_callback(tcp_output_tcpip, cs->pcb.tcp); + } + if (nc->ev_timer_time > 0) { + if (num_timers == 0 || nc->ev_timer_time < min_timer) { + min_timer = nc->ev_timer_time; + } + num_timers++; + } + } +#if 0 + DBG(("end poll @%u, %d conns, %d timers (min %u), next in %d ms", + (unsigned int) (now * 1000), n, num_timers, + (unsigned int) (min_timer * 1000), timeout_ms)); +#endif + (void) timeout_ms; + return now; +} + +uint32_t mg_lwip_get_poll_delay_ms(struct mg_mgr *mgr) { + struct mg_connection *nc; + double now; + double min_timer = 0; + int num_timers = 0; + mg_ev_mgr_lwip_process_signals(mgr); + for (nc = mg_next(mgr, NULL); nc != NULL; nc = mg_next(mgr, nc)) { + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + if (nc->ev_timer_time > 0) { + if (num_timers == 0 || nc->ev_timer_time < min_timer) { + min_timer = nc->ev_timer_time; + } + num_timers++; + } + if (nc->send_mbuf.len > 0 +#if MG_ENABLE_SSL + || (nc->flags & MG_F_WANT_WRITE) +#endif + ) { + int can_send = 0; + /* We have stuff to send, but can we? */ + if (nc->flags & MG_F_UDP) { + /* UDP is always ready for sending. */ + can_send = (cs->pcb.udp != NULL); + } else { + can_send = (cs->pcb.tcp != NULL && cs->pcb.tcp->snd_buf > 0); + } + /* We want and can send, request a poll immediately. */ + if (can_send) return 0; + } + } + uint32_t timeout_ms = ~0; + now = mg_time(); + if (num_timers > 0) { + /* If we have a timer that is past due, do a poll ASAP. */ + if (min_timer < now) return 0; + double timer_timeout_ms = (min_timer - now) * 1000 + 1 /* rounding */; + if (timer_timeout_ms < timeout_ms) { + timeout_ms = timer_timeout_ms; + } } + return timeout_ms; } -static void log_access(const struct mg_connection *conn) { - const struct mg_request_info *ri; - FILE *fp; - char date[64], src_addr[20]; - - fp = conn->ctx->config[ACCESS_LOG_FILE] == NULL ? NULL : - fopen(conn->ctx->config[ACCESS_LOG_FILE], "a+"); - - if (fp == NULL) - return; +#endif /* MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/lwip/mg_lwip_ssl_if.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ - strftime(date, sizeof(date), "%d/%b/%Y:%H:%M:%S %z", - localtime(&conn->birth_time)); +#if MG_ENABLE_SSL && MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL - ri = &conn->request_info; - flockfile(fp); +/* Amalgamated: #include "common/mg_mem.h" */ +/* Amalgamated: #include "common/cs_dbg.h" */ - sockaddr_to_string(src_addr, sizeof(src_addr), &conn->client.rsa); - fprintf(fp, "%s - %s [%s] \"%s %s HTTP/%s\" %d %" INT64_FMT, - src_addr, ri->remote_user == NULL ? "-" : ri->remote_user, date, - ri->request_method ? ri->request_method : "-", - ri->uri ? ri->uri : "-", ri->http_version, - conn->status_code, conn->num_bytes_sent); - log_header(conn, "Referer", fp); - log_header(conn, "User-Agent", fp); - fputc('\n', fp); - fflush(fp); +#include <lwip/pbuf.h> +#include <lwip/tcp.h> - funlockfile(fp); - fclose(fp); -} +#ifndef MG_LWIP_SSL_IO_SIZE +#define MG_LWIP_SSL_IO_SIZE 1024 +#endif -// Verify given socket address against the ACL. -// Return -1 if ACL is malformed, 0 if address is disallowed, 1 if allowed. -static int check_acl(struct mg_context *ctx, uint32_t remote_ip) { - int allowed, flag; - uint32_t net, mask; - struct vec vec; - const char *list = ctx->config[ACCESS_CONTROL_LIST]; +/* + * Stop processing incoming SSL traffic when recv_mbuf.size is this big. + * It'a a uick solution for SSL recv pushback. + */ +#ifndef MG_LWIP_SSL_RECV_MBUF_LIMIT +#define MG_LWIP_SSL_RECV_MBUF_LIMIT 3072 +#endif - // If any ACL is set, deny by default - allowed = list == NULL ? '+' : '-'; +#ifndef MIN +#define MIN(a, b) ((a) < (b) ? (a) : (b)) +#endif - while ((list = next_option(list, &vec, NULL)) != NULL) { - flag = vec.ptr[0]; - if ((flag != '+' && flag != '-') || - parse_net(&vec.ptr[1], &net, &mask) == 0) { - cry(fc(ctx), "%s: subnet must be [+|-]x.x.x.x[/x]", __func__); - return -1; +void mg_lwip_ssl_do_hs(struct mg_connection *nc) { + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + int server_side = (nc->listener != NULL); + enum mg_ssl_if_result res; + if (nc->flags & MG_F_CLOSE_IMMEDIATELY) return; + res = mg_ssl_if_handshake(nc); + DBG(("%p %lu %d %d", nc, nc->flags, server_side, res)); + if (res != MG_SSL_OK) { + if (res == MG_SSL_WANT_WRITE) { + nc->flags |= MG_F_WANT_WRITE; + cs->err = 0; + } else if (res == MG_SSL_WANT_READ) { + /* + * Nothing to do in particular, we are callback-driven. + * What we definitely do not need anymore is SSL reading (nothing left). + */ + nc->flags &= ~MG_F_WANT_READ; + cs->err = 0; + } else { + cs->err = res; + if (server_side) { + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); + } else { + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); + } } - - if (net == (remote_ip & mask)) { - allowed = flag; + } else { + cs->err = 0; + nc->flags &= ~MG_F_WANT_WRITE; + /* + * Handshake is done. Schedule a read immediately to consume app data + * which may already be waiting. + */ + nc->flags |= (MG_F_SSL_HANDSHAKE_DONE | MG_F_WANT_READ); + if (server_side) { + mg_lwip_accept_conn(nc, cs->pcb.tcp); + } else { + mg_lwip_post_signal(MG_SIG_CONNECT_RESULT, nc); } } - - return allowed == '+'; } -#if !defined(_WIN32) -static int set_uid_option(struct mg_context *ctx) { - struct passwd *pw; - const char *uid = ctx->config[RUN_AS_USER]; - int success = 0; - - if (uid == NULL) { - success = 1; +void mg_lwip_ssl_send(struct mg_connection *nc) { + if (nc->sock == INVALID_SOCKET) { + DBG(("%p invalid socket", nc)); + return; + } + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + /* It's ok if the buffer is empty. Return value of 0 may also be valid. */ + int len = cs->last_ssl_write_size; + if (len == 0) { + len = MIN(MG_LWIP_SSL_IO_SIZE, nc->send_mbuf.len); + } + int ret = mg_ssl_if_write(nc, nc->send_mbuf.buf, len); + DBG(("%p SSL_write %u = %d", nc, len, ret)); + if (ret > 0) { + mg_if_sent_cb(nc, ret); + cs->last_ssl_write_size = 0; + } else if (ret < 0) { + /* This is tricky. We must remember the exact data we were sending to retry + * exactly the same send next time. */ + cs->last_ssl_write_size = len; + } + if (ret == len) { + nc->flags &= ~MG_F_WANT_WRITE; + } else if (ret == MG_SSL_WANT_WRITE) { + nc->flags |= MG_F_WANT_WRITE; } else { - if ((pw = getpwnam(uid)) == NULL) { - cry(fc(ctx), "%s: unknown user [%s]", __func__, uid); - } else if (setgid(pw->pw_gid) == -1) { - cry(fc(ctx), "%s: setgid(%s): %s", __func__, uid, strerror(errno)); - } else if (setuid(pw->pw_uid) == -1) { - cry(fc(ctx), "%s: setuid(%s): %s", __func__, uid, strerror(errno)); + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); + } +} + +void mg_lwip_ssl_recv(struct mg_connection *nc) { + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + /* Don't deliver data before connect callback */ + if (nc->flags & MG_F_CONNECTING) return; + while (nc->recv_mbuf.len < MG_LWIP_SSL_RECV_MBUF_LIMIT) { + char *buf = (char *) MG_MALLOC(MG_LWIP_SSL_IO_SIZE); + if (buf == NULL) return; + int ret = mg_ssl_if_read(nc, buf, MG_LWIP_SSL_IO_SIZE); + DBG(("%p %p SSL_read %u = %d", nc, cs->rx_chain, MG_LWIP_SSL_IO_SIZE, ret)); + if (ret <= 0) { + MG_FREE(buf); + if (ret == MG_SSL_WANT_WRITE) { + nc->flags |= MG_F_WANT_WRITE; + return; + } else if (ret == MG_SSL_WANT_READ) { + /* + * Nothing to do in particular, we are callback-driven. + * What we definitely do not need anymore is SSL reading (nothing left). + */ + nc->flags &= ~MG_F_WANT_READ; + cs->err = 0; + return; + } else { + mg_lwip_post_signal(MG_SIG_CLOSE_CONN, nc); + return; + } } else { - success = 1; + mg_if_recv_tcp_cb(nc, buf, ret, 1 /* own */); } } - - return success; } -#endif // !_WIN32 -#if !defined(NO_SSL) -static pthread_mutex_t *ssl_mutexes; +#ifdef KR_VERSION -static int sslize(struct mg_connection *conn, SSL_CTX *s, int (*func)(SSL *)) { - return (conn->ssl = SSL_new(s)) != NULL && - SSL_set_fd(conn->ssl, conn->client.sock) == 1 && - func(conn->ssl) == 1; +ssize_t kr_send(int fd, const void *buf, size_t len) { + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) fd; + int ret = mg_lwip_tcp_write(cs->nc, buf, len); + DBG(("%p mg_lwip_tcp_write %u = %d", cs->nc, len, ret)); + if (ret == 0) ret = KR_IO_WOULDBLOCK; + return ret; } -// Return OpenSSL error message -static const char *ssl_error(void) { - unsigned long err; - err = ERR_get_error(); - return err == 0 ? "" : ERR_error_string(err, NULL); +ssize_t kr_recv(int fd, void *buf, size_t len) { + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) fd; + struct pbuf *seg = cs->rx_chain; + if (seg == NULL) { + DBG(("%u - nothing to read", len)); + return KR_IO_WOULDBLOCK; + } + size_t seg_len = (seg->len - cs->rx_offset); + DBG(("%u %u %u %u", len, cs->rx_chain->len, seg_len, cs->rx_chain->tot_len)); + len = MIN(len, seg_len); + pbuf_copy_partial(seg, buf, len, cs->rx_offset); + cs->rx_offset += len; + tcp_recved(cs->pcb.tcp, len); + if (cs->rx_offset == cs->rx_chain->len) { + cs->rx_chain = pbuf_dechain(cs->rx_chain); + pbuf_free(seg); + cs->rx_offset = 0; + } + return len; } -static void ssl_locking_callback(int mode, int mutex_num, const char *file, - int line) { - (void) line; - (void) file; +#elif MG_SSL_IF == MG_SSL_IF_MBEDTLS - if (mode & 1) { // 1 is CRYPTO_LOCK - (void) pthread_mutex_lock(&ssl_mutexes[mutex_num]); - } else { - (void) pthread_mutex_unlock(&ssl_mutexes[mutex_num]); - } +int ssl_socket_send(void *ctx, const unsigned char *buf, size_t len) { + struct mg_connection *nc = (struct mg_connection *) ctx; + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + int ret = mg_lwip_tcp_write(cs->nc, buf, len); + if (ret == 0) ret = MBEDTLS_ERR_SSL_WANT_WRITE; + LOG(LL_DEBUG, ("%p %d -> %d", nc, len, ret)); + return ret; } -static unsigned long ssl_id_callback(void) { - return (unsigned long) pthread_self(); +int ssl_socket_recv(void *ctx, unsigned char *buf, size_t len) { + struct mg_connection *nc = (struct mg_connection *) ctx; + struct mg_lwip_conn_state *cs = (struct mg_lwip_conn_state *) nc->sock; + struct pbuf *seg = cs->rx_chain; + if (seg == NULL) { + DBG(("%u - nothing to read", len)); + return MBEDTLS_ERR_SSL_WANT_READ; + } + size_t seg_len = (seg->len - cs->rx_offset); + DBG(("%u %u %u %u", len, cs->rx_chain->len, seg_len, cs->rx_chain->tot_len)); + mgos_lock(); + len = MIN(len, seg_len); + pbuf_copy_partial(seg, buf, len, cs->rx_offset); + cs->rx_offset += len; + /* TCP PCB may be NULL if connection has already been closed + * but we still have data to deliver to SSL. */ + if (cs->pcb.tcp != NULL) tcp_recved(cs->pcb.tcp, len); + if (cs->rx_offset == cs->rx_chain->len) { + cs->rx_chain = pbuf_dechain(cs->rx_chain); + pbuf_free(seg); + cs->rx_offset = 0; + } + mgos_unlock(); + LOG(LL_DEBUG, ("%p <- %d", nc, (int) len)); + return len; } -#if !defined(NO_SSL_DL) -static int load_dll(struct mg_context *ctx, const char *dll_name, - struct ssl_func *sw) { - union {void *p; void (*fp)(void);} u; - void *dll_handle; - struct ssl_func *fp; +#endif - if ((dll_handle = dlopen(dll_name, RTLD_LAZY)) == NULL) { - cry(fc(ctx), "%s: cannot load %s", __func__, dll_name); - return 0; - } +#endif /* MG_ENABLE_SSL && MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/wince/wince_libc.c" +#endif +/* + * Copyright (c) 2016 Cesanta Software Limited + * All rights reserved + */ + +#ifdef WINCE + +const char *strerror(int err) { + /* + * TODO(alashkin): there is no strerror on WinCE; + * look for similar wce_xxxx function + */ + static char buf[10]; + snprintf(buf, sizeof(buf), "%d", err); + return buf; +} - for (fp = sw; fp->name != NULL; fp++) { -#ifdef _WIN32 - // GetProcAddress() returns pointer to function - u.fp = (void (*)(void)) dlsym(dll_handle, fp->name); -#else - // dlsym() on UNIX returns void *. ISO C forbids casts of data pointers to - // function pointers. We need to use a union to make a cast. - u.p = dlsym(dll_handle, fp->name); -#endif // _WIN32 - if (u.fp == NULL) { - cry(fc(ctx), "%s: %s: cannot find %s", __func__, dll_name, fp->name); - return 0; - } else { - fp->ptr = u.fp; +int open(const char *filename, int oflag, int pmode) { + /* + * TODO(alashkin): mg_open function is not used in mongoose + * but exists in documentation as utility function + * Shall we delete it at all or implement for WinCE as well? + */ + DebugBreak(); + return 0; /* for compiler */ +} + +int _wstati64(const wchar_t *path, cs_stat_t *st) { + DWORD fa = GetFileAttributesW(path); + if (fa == INVALID_FILE_ATTRIBUTES) { + return -1; + } + memset(st, 0, sizeof(*st)); + if ((fa & FILE_ATTRIBUTE_DIRECTORY) == 0) { + HANDLE h; + FILETIME ftime; + st->st_mode |= _S_IFREG; + h = CreateFileW(path, GENERIC_READ, 0, NULL, OPEN_EXISTING, + FILE_ATTRIBUTE_NORMAL, NULL); + if (h == INVALID_HANDLE_VALUE) { + return -1; } + st->st_size = GetFileSize(h, NULL); + GetFileTime(h, NULL, NULL, &ftime); + st->st_mtime = (uint32_t)((((uint64_t) ftime.dwLowDateTime + + ((uint64_t) ftime.dwHighDateTime << 32)) / + 10000000.0) - + 11644473600); + CloseHandle(h); + } else { + st->st_mode |= _S_IFDIR; } - - return 1; + return 0; } -#endif // NO_SSL_DL -// Dynamically load SSL library. Set up ctx->ssl_ctx pointer. -static int set_ssl_option(struct mg_context *ctx) { - int i, size; - const char *pem; - - // If PEM file is not specified, skip SSL initialization. - if ((pem = ctx->config[SSL_CERTIFICATE]) == NULL) { - return 1; +/* Windows CE doesn't have neither gmtime nor strftime */ +static void mg_gmt_time_string(char *buf, size_t buf_len, time_t *t) { + FILETIME ft; + SYSTEMTIME systime; + if (t != NULL) { + uint64_t filetime = (*t + 11644473600) * 10000000; + ft.dwLowDateTime = filetime & 0xFFFFFFFF; + ft.dwHighDateTime = (filetime & 0xFFFFFFFF00000000) >> 32; + FileTimeToSystemTime(&ft, &systime); + } else { + GetSystemTime(&systime); } + /* There is no PRIu16 in WinCE SDK */ + snprintf(buf, buf_len, "%d.%d.%d %d:%d:%d GMT", (int) systime.wYear, + (int) systime.wMonth, (int) systime.wDay, (int) systime.wHour, + (int) systime.wMinute, (int) systime.wSecond); +} -#if !defined(NO_SSL_DL) - if (!load_dll(ctx, SSL_LIB, ssl_sw) || - !load_dll(ctx, CRYPTO_LIB, crypto_sw)) { - return 0; - } -#endif // NO_SSL_DL +#endif +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/pic32/pic32_net_if.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ - // Initialize SSL library - SSL_library_init(); - SSL_load_error_strings(); +#ifndef CS_COMMON_PLATFORMS_PIC32_NET_IF_H_ +#define CS_COMMON_PLATFORMS_PIC32_NET_IF_H_ - if ((ctx->ssl_ctx = SSL_CTX_new(SSLv23_server_method())) == NULL) { - cry(fc(ctx), "SSL_CTX_new (server) error: %s", ssl_error()); - return 0; - } +/* Amalgamated: #include "mongoose/src/net_if.h" */ - // If user callback returned non-NULL, that means that user callback has - // set up certificate itself. In this case, skip sertificate setting. - if ((ctx->callbacks.init_ssl == NULL || - !ctx->callbacks.init_ssl(ctx->ssl_ctx, ctx->user_data)) && - (SSL_CTX_use_certificate_file(ctx->ssl_ctx, pem, 1) == 0 || - SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, pem, 1) == 0)) { - cry(fc(ctx), "%s: cannot open %s: %s", __func__, pem, ssl_error()); - return 0; - } +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ - if (pem != NULL) { - (void) SSL_CTX_use_certificate_chain_file(ctx->ssl_ctx, pem); - } +#ifndef MG_ENABLE_NET_IF_PIC32 +#define MG_ENABLE_NET_IF_PIC32 MG_NET_IF == MG_NET_IF_PIC32 +#endif - // Initialize locking callbacks, needed for thread safety. - // http://www.openssl.org/support/faq.html#PROG1 - size = sizeof(pthread_mutex_t) * CRYPTO_num_locks(); - if ((ssl_mutexes = (pthread_mutex_t *) malloc((size_t)size)) == NULL) { - cry(fc(ctx), "%s: cannot allocate mutexes: %s", __func__, ssl_error()); - return 0; - } +extern const struct mg_iface_vtable mg_pic32_iface_vtable; - for (i = 0; i < CRYPTO_num_locks(); i++) { - pthread_mutex_init(&ssl_mutexes[i], NULL); - } +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* CS_COMMON_PLATFORMS_PIC32_NET_IF_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/pic32/pic32_net_if.c" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ - CRYPTO_set_locking_callback(&ssl_locking_callback); - CRYPTO_set_id_callback(&ssl_id_callback); +#if MG_ENABLE_NET_IF_PIC32 +int mg_pic32_if_create_conn(struct mg_connection *nc) { + (void) nc; return 1; } -static void uninitialize_ssl(struct mg_context *ctx) { - int i; - if (ctx->ssl_ctx != NULL) { - CRYPTO_set_locking_callback(NULL); - for (i = 0; i < CRYPTO_num_locks(); i++) { - pthread_mutex_destroy(&ssl_mutexes[i]); - } - CRYPTO_set_locking_callback(NULL); - CRYPTO_set_id_callback(NULL); - } +void mg_pic32_if_recved(struct mg_connection *nc, size_t len) { + (void) nc; + (void) len; } -#endif // !NO_SSL -static int set_gpass_option(struct mg_context *ctx) { - struct file file = STRUCT_FILE_INITIALIZER; - const char *path = ctx->config[GLOBAL_PASSWORDS_FILE]; - if (path != NULL && !mg_stat(fc(ctx), path, &file)) { - cry(fc(ctx), "Cannot open %s: %s", path, strerror(ERRNO)); - return 0; - } - return 1; +void mg_pic32_if_add_conn(struct mg_connection *nc) { + (void) nc; } -static int set_acl_option(struct mg_context *ctx) { - return check_acl(ctx, (uint32_t) 0x7f000001UL) != -1; +void mg_pic32_if_init(struct mg_iface *iface) { + (void) iface; + (void) mg_get_errno(); /* Shutup compiler */ } -static void reset_per_request_attributes(struct mg_connection *conn) { - conn->path_info = NULL; - conn->num_bytes_sent = conn->consumed_content = 0; - conn->status_code = -1; - conn->must_close = conn->request_len = conn->throttle = 0; +void mg_pic32_if_free(struct mg_iface *iface) { + (void) iface; } -static void close_socket_gracefully(struct mg_connection *conn) { -#if defined(_WIN32) - char buf[MG_BUF_LEN]; - int n; -#endif - struct linger linger; - - // Set linger option to avoid socket hanging out after close. This prevent - // ephemeral port exhaust problem under high QPS. - linger.l_onoff = 1; - linger.l_linger = 1; - setsockopt(conn->client.sock, SOL_SOCKET, SO_LINGER, - (char *) &linger, sizeof(linger)); - - // Send FIN to the client - shutdown(conn->client.sock, SHUT_WR); - set_non_blocking_mode(conn->client.sock); - -#if defined(_WIN32) - // Read and discard pending incoming data. If we do not do that and close the - // socket, the data in the send buffer may be discarded. This - // behaviour is seen on Windows, when client keeps sending data - // when server decides to close the connection; then when client - // does recv() it gets no data back. - do { - n = pull(NULL, conn, buf, sizeof(buf)); - } while (n > 0); -#endif - - // Now we know that our FIN is ACK-ed, safe to close - closesocket(conn->client.sock); +void mg_pic32_if_remove_conn(struct mg_connection *nc) { + (void) nc; } -static void close_connection(struct mg_connection *conn) { - conn->must_close = 1; - if (conn->client.sock != INVALID_SOCKET) { - close_socket_gracefully(conn); - } -#ifndef NO_SSL - // Must be done AFTER socket is closed - if (conn->ssl != NULL) { - SSL_free(conn->ssl); +void mg_pic32_if_destroy_conn(struct mg_connection *nc) { + if (nc->sock == INVALID_SOCKET) return; + /* For UDP, only close outgoing sockets or listeners. */ + if (!(nc->flags & MG_F_UDP)) { + /* Close TCP */ + TCPIP_TCP_Close((TCP_SOCKET) nc->sock); + } else if (nc->listener == NULL) { + /* Only close outgoing UDP or listeners. */ + TCPIP_UDP_Close((UDP_SOCKET) nc->sock); } -#endif -} -void mg_close_connection(struct mg_connection *conn) { -#ifndef NO_SSL - if (conn->client_ssl_ctx != NULL) { - SSL_CTX_free((SSL_CTX *) conn->client_ssl_ctx); - } -#endif - close_connection(conn); - free(conn); + nc->sock = INVALID_SOCKET; } -struct mg_connection *mg_connect(const char *host, int port, int use_ssl, - char *ebuf, size_t ebuf_len) { - static struct mg_context fake_ctx; - struct mg_connection *conn = NULL; - struct sockaddr_in sin; - struct hostent *he; - SOCKET sock; - - if (host == NULL) { - snprintf(ebuf, ebuf_len, "%s", "NULL host"); - } else if ((he = gethostbyname(host)) == NULL) { - snprintf(ebuf, ebuf_len, "gethostbyname(%s): %s", host, strerror(ERRNO)); - } else if ((sock = socket(PF_INET, SOCK_STREAM, 0)) == INVALID_SOCKET) { - snprintf(ebuf, ebuf_len, "socket(): %s", strerror(ERRNO)); - } else { - sin.sin_family = AF_INET; - sin.sin_port = htons((uint16_t) port); - sin.sin_addr = * (struct in_addr *) he->h_addr_list[0]; - if (connect(sock, (struct sockaddr *) &sin, sizeof(sin)) != 0) { - snprintf(ebuf, ebuf_len, "connect(%s:%d): %s", - host, port, strerror(ERRNO)); - closesocket(sock); - } else if ((conn = (struct mg_connection *) - calloc(1, sizeof(*conn) + MAX_REQUEST_SIZE)) == NULL) { - snprintf(ebuf, ebuf_len, "calloc(): %s", strerror(ERRNO)); - closesocket(sock); -#ifndef NO_SSL - } else if (use_ssl && (conn->client_ssl_ctx = - SSL_CTX_new(SSLv23_client_method())) == NULL) { - snprintf(ebuf, ebuf_len, "SSL_CTX_new error"); - closesocket(sock); - free(conn); - conn = NULL; -#endif // NO_SSL - } else { - conn->buf_size = MAX_REQUEST_SIZE; - conn->buf = (char *) (conn + 1); - conn->ctx = &fake_ctx; - conn->client.sock = sock; - conn->client.rsa.sin = sin; - conn->client.is_ssl = use_ssl; -#ifndef NO_SSL - if (use_ssl) { - // SSL_CTX_set_verify call is needed to switch off server certificate - // checking, which is off by default in OpenSSL and on in yaSSL. - SSL_CTX_set_verify(conn->client_ssl_ctx, 0, 0); - sslize(conn, conn->client_ssl_ctx, SSL_connect); - } -#endif - } +int mg_pic32_if_listen_udp(struct mg_connection *nc, union socket_address *sa) { + nc->sock = TCPIP_UDP_ServerOpen( + sa->sin.sin_family == AF_INET ? IP_ADDRESS_TYPE_IPV4 + : IP_ADDRESS_TYPE_IPV6, + ntohs(sa->sin.sin_port), + sa->sin.sin_addr.s_addr == 0 ? 0 : (IP_MULTI_ADDRESS *) &sa->sin); + if (nc->sock == INVALID_SOCKET) { + return -1; } - - return conn; + return 0; } -static int is_valid_uri(const char *uri) { - // Conform to http://www.w3.org/Protocols/rfc2616/rfc2616-sec5.html#sec5.1.2 - // URI can be an asterisk (*) or should start with slash. - return uri[0] == '/' || (uri[0] == '*' && uri[1] == '\0'); +void mg_pic32_if_udp_send(struct mg_connection *nc, const void *buf, + size_t len) { + mbuf_append(&nc->send_mbuf, buf, len); } -static int getreq(struct mg_connection *conn, char *ebuf, size_t ebuf_len) { - const char *cl; - - ebuf[0] = '\0'; - reset_per_request_attributes(conn); - conn->request_len = read_request(NULL, conn, conn->buf, conn->buf_size, - &conn->data_len); - assert(conn->request_len < 0 || conn->data_len >= conn->request_len); - - if (conn->request_len == 0 && conn->data_len == conn->buf_size) { - snprintf(ebuf, ebuf_len, "%s", "Request Too Large"); - } else if (conn->request_len <= 0) { - snprintf(ebuf, ebuf_len, "%s", "Client closed connection"); - } else if (parse_http_message(conn->buf, conn->buf_size, - &conn->request_info) <= 0) { - snprintf(ebuf, ebuf_len, "Bad request: [%.*s]", conn->data_len, conn->buf); - } else { - // Request is valid - if ((cl = get_header(&conn->request_info, "Content-Length")) != NULL) { - conn->content_len = strtoll(cl, NULL, 10); - } else if (!mg_strcasecmp(conn->request_info.request_method, "POST") || - !mg_strcasecmp(conn->request_info.request_method, "PUT")) { - conn->content_len = -1; - } else { - conn->content_len = 0; - } - conn->birth_time = time(NULL); - } - return ebuf[0] == '\0'; +void mg_pic32_if_tcp_send(struct mg_connection *nc, const void *buf, + size_t len) { + mbuf_append(&nc->send_mbuf, buf, len); } -struct mg_connection *mg_download(const char *host, int port, int use_ssl, - char *ebuf, size_t ebuf_len, - const char *fmt, ...) { - struct mg_connection *conn; - va_list ap; - - va_start(ap, fmt); - ebuf[0] = '\0'; - if ((conn = mg_connect(host, port, use_ssl, ebuf, ebuf_len)) == NULL) { - } else if (mg_vprintf(conn, fmt, ap) <= 0) { - snprintf(ebuf, ebuf_len, "%s", "Error sending request"); - } else { - getreq(conn, ebuf, ebuf_len); +int mg_pic32_if_listen_tcp(struct mg_connection *nc, union socket_address *sa) { + nc->sock = TCPIP_TCP_ServerOpen( + sa->sin.sin_family == AF_INET ? IP_ADDRESS_TYPE_IPV4 + : IP_ADDRESS_TYPE_IPV6, + ntohs(sa->sin.sin_port), + sa->sin.sin_addr.s_addr == 0 ? 0 : (IP_MULTI_ADDRESS *) &sa->sin); + memcpy(&nc->sa, sa, sizeof(*sa)); + if (nc->sock == INVALID_SOCKET) { + return -1; } - if (ebuf[0] != '\0' && conn != NULL) { - mg_close_connection(conn); - conn = NULL; - } - - return conn; + return 0; } -static void process_new_connection(struct mg_connection *conn) { - struct mg_request_info *ri = &conn->request_info; - int keep_alive_enabled, keep_alive, discard_len; - char ebuf[100]; - - keep_alive_enabled = !strcmp(conn->ctx->config[ENABLE_KEEP_ALIVE], "yes"); - keep_alive = 0; - - // Important: on new connection, reset the receiving buffer. Credit goes - // to crule42. - conn->data_len = 0; - do { - if (!getreq(conn, ebuf, sizeof(ebuf))) { - send_http_error(conn, 500, "Server Error", "%s", ebuf); - conn->must_close = 1; - } else if (!is_valid_uri(conn->request_info.uri)) { - snprintf(ebuf, sizeof(ebuf), "Invalid URI: [%s]", ri->uri); - send_http_error(conn, 400, "Bad Request", "%s", ebuf); - } else if (strcmp(ri->http_version, "1.0") && - strcmp(ri->http_version, "1.1")) { - snprintf(ebuf, sizeof(ebuf), "Bad HTTP version: [%s]", ri->http_version); - send_http_error(conn, 505, "Bad HTTP version", "%s", ebuf); - } - - if (ebuf[0] == '\0') { - handle_request(conn); - if (conn->ctx->callbacks.end_request != NULL) { - conn->ctx->callbacks.end_request(conn, conn->status_code); - } - log_access(conn); - } - if (ri->remote_user != NULL) { - free((void *) ri->remote_user); - ri->remote_user = NULL; // when having connections with and without auth would cause double free and then crash - } +static int mg_accept_conn(struct mg_connection *lc) { + struct mg_connection *nc; + TCP_SOCKET_INFO si; + union socket_address sa; - // NOTE(lsm): order is important here. should_keep_alive() call - // is using parsed request, which will be invalid after memmove's below. - // Therefore, memorize should_keep_alive() result now for later use - // in loop exit condition. - keep_alive = conn->ctx->stop_flag == 0 && keep_alive_enabled && - conn->content_len >= 0 && should_keep_alive(conn); + nc = mg_if_accept_new_conn(lc); - // Discard all buffered data for this request - discard_len = conn->content_len >= 0 && conn->request_len > 0 && - conn->request_len + conn->content_len < (int64_t) conn->data_len ? - (int) (conn->request_len + conn->content_len) : conn->data_len; - assert(discard_len >= 0); - memmove(conn->buf, conn->buf + discard_len, conn->data_len - discard_len); - conn->data_len -= discard_len; - assert(conn->data_len >= 0); - assert(conn->data_len <= conn->buf_size); - } while (keep_alive); -} + if (nc == NULL) { + return 0; + } -// Worker threads take accepted socket from the queue -static int consume_socket(struct mg_context *ctx, struct socket *sp) { - (void) pthread_mutex_lock(&ctx->mutex); - DEBUG_TRACE(("going idle")); + nc->sock = lc->sock; + nc->flags &= ~MG_F_LISTENING; - // If the queue is empty, wait. We're idle at this point. - while (ctx->sq_head == ctx->sq_tail && ctx->stop_flag == 0) { - pthread_cond_wait(&ctx->sq_full, &ctx->mutex); + if (!TCPIP_TCP_SocketInfoGet((TCP_SOCKET) nc->sock, &si)) { + return 0; } - // If we're stopping, sq_head may be equal to sq_tail. - if (ctx->sq_head > ctx->sq_tail) { - // Copy socket from the queue and increment tail - *sp = ctx->queue[ctx->sq_tail % ARRAY_SIZE(ctx->queue)]; - ctx->sq_tail++; - DEBUG_TRACE(("grabbed socket %d, going busy", sp->sock)); - - // Wrap pointers if needed - while (ctx->sq_tail > (int) ARRAY_SIZE(ctx->queue)) { - ctx->sq_tail -= ARRAY_SIZE(ctx->queue); - ctx->sq_head -= ARRAY_SIZE(ctx->queue); - } + if (si.addressType == IP_ADDRESS_TYPE_IPV4) { + sa.sin.sin_family = AF_INET; + sa.sin.sin_port = htons(si.remotePort); + sa.sin.sin_addr.s_addr = si.remoteIPaddress.v4Add.Val; + } else { + /* TODO(alashkin): do something with _potential_ IPv6 */ + memset(&sa, 0, sizeof(sa)); } - (void) pthread_cond_signal(&ctx->sq_empty); - (void) pthread_mutex_unlock(&ctx->mutex); + mg_if_accept_tcp_cb(nc, (union socket_address *) &sa, sizeof(sa)); - return !ctx->stop_flag; + return mg_pic32_if_listen_tcp(lc, &lc->sa) >= 0; } -static void *worker_thread(void *thread_func_param) { - struct mg_context *ctx = thread_func_param; - struct mg_connection *conn; +char *inet_ntoa(struct in_addr in) { + static char addr[17]; + snprintf(addr, sizeof(addr), "%d.%d.%d.%d", (int) in.S_un.S_un_b.s_b1, + (int) in.S_un.S_un_b.s_b2, (int) in.S_un.S_un_b.s_b3, + (int) in.S_un.S_un_b.s_b4); + return addr; +} - conn = (struct mg_connection *) calloc(1, sizeof(*conn) + MAX_REQUEST_SIZE); - if (conn == NULL) { - cry(fc(ctx), "%s", "Cannot create new connection struct, OOM"); +static void mg_handle_send(struct mg_connection *nc) { + uint16_t bytes_written = 0; + if (nc->flags & MG_F_UDP) { + if (!TCPIP_UDP_RemoteBind( + (UDP_SOCKET) nc->sock, + nc->sa.sin.sin_family == AF_INET ? IP_ADDRESS_TYPE_IPV4 + : IP_ADDRESS_TYPE_IPV6, + ntohs(nc->sa.sin.sin_port), (IP_MULTI_ADDRESS *) &nc->sa.sin)) { + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + return; + } + bytes_written = TCPIP_UDP_TxPutIsReady((UDP_SOCKET) nc->sock, 0); + if (bytes_written >= nc->send_mbuf.len) { + if (TCPIP_UDP_ArrayPut((UDP_SOCKET) nc->sock, + (uint8_t *) nc->send_mbuf.buf, + nc->send_mbuf.len) != nc->send_mbuf.len) { + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + bytes_written = 0; + } + } } else { - conn->buf_size = MAX_REQUEST_SIZE; - conn->buf = (char *) (conn + 1); - conn->ctx = ctx; - conn->request_info.user_data = ctx->user_data; - - // Call consume_socket() even when ctx->stop_flag > 0, to let it signal - // sq_empty condvar to wake up the master waiting in produce_socket() - while (consume_socket(ctx, &conn->client)) { - conn->birth_time = time(NULL); - - // Fill in IP, port info early so even if SSL setup below fails, - // error handler would have the corresponding info. - // Thanks to Johannes Winkelmann for the patch. - // TODO(lsm): Fix IPv6 case - conn->request_info.remote_port = ntohs(conn->client.rsa.sin.sin_port); - memcpy(&conn->request_info.remote_ip, - &conn->client.rsa.sin.sin_addr.s_addr, 4); - conn->request_info.remote_ip = ntohl(conn->request_info.remote_ip); - conn->request_info.is_ssl = conn->client.is_ssl; - - if (!conn->client.is_ssl -#ifndef NO_SSL - || sslize(conn, conn->ctx->ssl_ctx, SSL_accept) -#endif - ) { - process_new_connection(conn); + bytes_written = TCPIP_TCP_FifoTxFreeGet((TCP_SOCKET) nc->sock); + if (bytes_written != 0) { + if (bytes_written > nc->send_mbuf.len) { + bytes_written = nc->send_mbuf.len; + } + if (TCPIP_TCP_ArrayPut((TCP_SOCKET) nc->sock, + (uint8_t *) nc->send_mbuf.buf, + bytes_written) != bytes_written) { + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + bytes_written = 0; } - - close_connection(conn); } - free(conn); } - // Signal master that we're done with connection and exiting - (void) pthread_mutex_lock(&ctx->mutex); - ctx->num_threads--; - (void) pthread_cond_signal(&ctx->cond); - assert(ctx->num_threads >= 0); - (void) pthread_mutex_unlock(&ctx->mutex); - - DEBUG_TRACE(("exiting")); - return NULL; + mg_if_sent_cb(nc, bytes_written); } -// Master thread adds accepted socket to a queue -static void produce_socket(struct mg_context *ctx, const struct socket *sp) { - (void) pthread_mutex_lock(&ctx->mutex); - - // If the queue is full, wait - while (ctx->stop_flag == 0 && - ctx->sq_head - ctx->sq_tail >= (int) ARRAY_SIZE(ctx->queue)) { - (void) pthread_cond_wait(&ctx->sq_empty, &ctx->mutex); +static void mg_handle_recv(struct mg_connection *nc) { + uint16_t bytes_read = 0; + uint8_t *buf = NULL; + if (nc->flags & MG_F_UDP) { + bytes_read = TCPIP_UDP_GetIsReady((UDP_SOCKET) nc->sock); + if (bytes_read != 0 && + (nc->recv_mbuf_limit == -1 || + nc->recv_mbuf.len + bytes_read < nc->recv_mbuf_limit)) { + buf = (uint8_t *) MG_MALLOC(bytes_read); + if (TCPIP_UDP_ArrayGet((UDP_SOCKET) nc->sock, buf, bytes_read) != + bytes_read) { + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + bytes_read = 0; + MG_FREE(buf); + } + } + } else { + bytes_read = TCPIP_TCP_GetIsReady((TCP_SOCKET) nc->sock); + if (bytes_read != 0) { + if (nc->recv_mbuf_limit != -1 && + nc->recv_mbuf_limit - nc->recv_mbuf.len > bytes_read) { + bytes_read = nc->recv_mbuf_limit - nc->recv_mbuf.len; + } + buf = (uint8_t *) MG_MALLOC(bytes_read); + if (TCPIP_TCP_ArrayGet((TCP_SOCKET) nc->sock, buf, bytes_read) != + bytes_read) { + nc->flags |= MG_F_CLOSE_IMMEDIATELY; + MG_FREE(buf); + bytes_read = 0; + } + } } - if (ctx->sq_head - ctx->sq_tail < (int) ARRAY_SIZE(ctx->queue)) { - // Copy socket to the queue and increment head - ctx->queue[ctx->sq_head % ARRAY_SIZE(ctx->queue)] = *sp; - ctx->sq_head++; - DEBUG_TRACE(("queued socket %d", sp->sock)); + if (bytes_read != 0) { + mg_if_recv_tcp_cb(nc, buf, bytes_read, 1 /* own */); } - - (void) pthread_cond_signal(&ctx->sq_full); - (void) pthread_mutex_unlock(&ctx->mutex); -} - -static int set_sock_timeout(SOCKET sock, int milliseconds) { -#ifdef _WIN32 - DWORD t = milliseconds; -#else - struct timeval t; - t.tv_sec = milliseconds / 1000; - t.tv_usec = (milliseconds * 1000) % 1000000; -#endif - return setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, (void *) &t, sizeof(t)) || - setsockopt(sock, SOL_SOCKET, SO_SNDTIMEO, (void *) &t, sizeof(t)); } -static void accept_new_connection(const struct socket *listener, - struct mg_context *ctx) { - struct socket so; - char src_addr[20]; - socklen_t len = sizeof(so.rsa); - int on = 1; - - if ((so.sock = accept(listener->sock, &so.rsa.sa, &len)) == INVALID_SOCKET) { - } else if (!check_acl(ctx, ntohl(* (uint32_t *) &so.rsa.sin.sin_addr))) { - sockaddr_to_string(src_addr, sizeof(src_addr), &so.rsa); - cry(fc(ctx), "%s: %s is not allowed to connect", __func__, src_addr); - closesocket(so.sock); - } else { - // Put so socket structure into the queue - DEBUG_TRACE(("Accepted socket %d", (int) so.sock)); - so.is_ssl = listener->is_ssl; - so.ssl_redir = listener->ssl_redir; - getsockname(so.sock, &so.lsa.sa, &len); - // Set TCP keep-alive. This is needed because if HTTP-level keep-alive - // is enabled, and client resets the connection, server won't get - // TCP FIN or RST and will keep the connection open forever. With TCP - // keep-alive, next keep-alive handshake will figure out that the client - // is down and will close the server end. - // Thanks to Igor Klopov who suggested the patch. - setsockopt(so.sock, SOL_SOCKET, SO_KEEPALIVE, (void *) &on, sizeof(on)); - set_sock_timeout(so.sock, atoi(ctx->config[REQUEST_TIMEOUT])); - produce_socket(ctx, &so); - } -} - -static void *master_thread(void *thread_func_param) { - struct mg_context *ctx = thread_func_param; - struct pollfd *pfd; - int i; +time_t mg_pic32_if_poll(struct mg_iface *iface, int timeout_ms) { + struct mg_mgr *mgr = iface->mgr; + double now = mg_time(); + struct mg_connection *nc, *tmp; - // Increase priority of the master thread -#if defined(_WIN32) - SetThreadPriority(GetCurrentThread(), THREAD_PRIORITY_ABOVE_NORMAL); -#endif - -#if defined(ISSUE_317) - struct sched_param sched_param; - sched_param.sched_priority = sched_get_priority_max(SCHED_RR); - pthread_setschedparam(pthread_self(), SCHED_RR, &sched_param); -#endif + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { + tmp = nc->next; - pfd = calloc(ctx->num_listening_sockets, sizeof(pfd[0])); - while (ctx->stop_flag == 0) { - for (i = 0; i < ctx->num_listening_sockets; i++) { - pfd[i].fd = ctx->listening_sockets[i].sock; - pfd[i].events = POLLIN; - } + if (nc->flags & MG_F_CONNECTING) { + /* processing connections */ + if (nc->flags & MG_F_UDP || + TCPIP_TCP_IsConnected((TCP_SOCKET) nc->sock)) { + mg_if_connect_cb(nc, 0); + } + } else if (nc->flags & MG_F_LISTENING) { + if (TCPIP_TCP_IsConnected((TCP_SOCKET) nc->sock)) { + /* accept new connections */ + mg_accept_conn(nc); + } + } else { + if (nc->send_mbuf.len != 0) { + mg_handle_send(nc); + } - if (poll(pfd, ctx->num_listening_sockets, 200) > 0) { - for (i = 0; i < ctx->num_listening_sockets; i++) { - // NOTE(lsm): on QNX, poll() returns POLLRDNORM after the - // successful poll, and POLLIN is defined as (POLLRDNORM | POLLRDBAND) - // Therefore, we're checking pfd[i].revents & POLLIN, not - // pfd[i].revents == POLLIN. - if (ctx->stop_flag == 0 && (pfd[i].revents & POLLIN)) { - accept_new_connection(&ctx->listening_sockets[i], ctx); - } + if (nc->recv_mbuf_limit == -1 || + nc->recv_mbuf.len < nc->recv_mbuf_limit) { + mg_handle_recv(nc); } } } - free(pfd); - DEBUG_TRACE(("stopping workers")); - - // Stop signal received: somebody called mg_stop. Quit. - close_all_listening_sockets(ctx); - // Wakeup workers that are waiting for connections to handle. - pthread_cond_broadcast(&ctx->sq_full); - - // Wait until all threads finish - (void) pthread_mutex_lock(&ctx->mutex); - while (ctx->num_threads > 0) { - (void) pthread_cond_wait(&ctx->cond, &ctx->mutex); + for (nc = mgr->active_connections; nc != NULL; nc = tmp) { + tmp = nc->next; + if ((nc->flags & MG_F_CLOSE_IMMEDIATELY) || + (nc->send_mbuf.len == 0 && (nc->flags & MG_F_SEND_AND_CLOSE))) { + mg_close_conn(nc); + } } - (void) pthread_mutex_unlock(&ctx->mutex); - // All threads exited, no sync is needed. Destroy mutex and condvars - (void) pthread_mutex_destroy(&ctx->mutex); - (void) pthread_cond_destroy(&ctx->cond); - (void) pthread_cond_destroy(&ctx->sq_empty); - (void) pthread_cond_destroy(&ctx->sq_full); - -#if !defined(NO_SSL) - uninitialize_ssl(ctx); -#endif - DEBUG_TRACE(("exiting")); - - // Signal mg_stop() that we're done. - // WARNING: This must be the very last thing this - // thread does, as ctx becomes invalid after this line. - ctx->stop_flag = 2; - return NULL; + return now; } -static void free_context(struct mg_context *ctx) { - int i; - - // Deallocate config parameters - for (i = 0; i < NUM_OPTIONS; i++) { - if (ctx->config[i] != NULL) - free(ctx->config[i]); - } - -#ifndef NO_SSL - // Deallocate SSL context - if (ctx->ssl_ctx != NULL) { - SSL_CTX_free(ctx->ssl_ctx); - } - if (ssl_mutexes != NULL) { - free(ssl_mutexes); - ssl_mutexes = NULL; - } -#endif // !NO_SSL - - // Deallocate context itself - free(ctx); +void mg_pic32_if_sock_set(struct mg_connection *nc, sock_t sock) { + nc->sock = sock; } -void mg_stop(struct mg_context *ctx) { - ctx->stop_flag = 1; - - // Wait until mg_fini() stops - while (ctx->stop_flag != 2) { - (void) mg_sleep(10); - } - free_context(ctx); - -#if defined(_WIN32) && !defined(__SYMBIAN32__) - (void) WSACleanup(); -#endif // _WIN32 +void mg_pic32_if_get_conn_addr(struct mg_connection *nc, int remote, + union socket_address *sa) { + /* TODO(alaskin): not implemented yet */ } -struct mg_context *mg_start(const struct mg_callbacks *callbacks, - void *user_data, - const char **options) { - struct mg_context *ctx; - const char *name, *value, *default_value; - int i; - -#if defined(_WIN32) && !defined(__SYMBIAN32__) - WSADATA data; - WSAStartup(MAKEWORD(2,2), &data); - InitializeCriticalSection(&global_log_file_lock); -#endif // _WIN32 - - // Allocate context and initialize reasonable general case defaults. - // TODO(lsm): do proper error handling here. - if ((ctx = (struct mg_context *) calloc(1, sizeof(*ctx))) == NULL) { - return NULL; - } - ctx->callbacks = *callbacks; - ctx->user_data = user_data; +void mg_pic32_if_connect_tcp(struct mg_connection *nc, + const union socket_address *sa) { + nc->sock = TCPIP_TCP_ClientOpen( + sa->sin.sin_family == AF_INET ? IP_ADDRESS_TYPE_IPV4 + : IP_ADDRESS_TYPE_IPV6, + ntohs(sa->sin.sin_port), (IP_MULTI_ADDRESS *) &sa->sin); + nc->err = (nc->sock == INVALID_SOCKET) ? -1 : 0; +} - while (options && (name = *options++) != NULL) { - if ((i = get_option_index(name)) == -1) { - cry(fc(ctx), "Invalid option: %s", name); - free_context(ctx); - return NULL; - } else if ((value = *options++) == NULL) { - cry(fc(ctx), "%s: option value cannot be NULL", name); - free_context(ctx); - return NULL; - } - if (ctx->config[i] != NULL) { - cry(fc(ctx), "warning: %s: duplicate option", name); - free(ctx->config[i]); - } - ctx->config[i] = mg_strdup(value); - DEBUG_TRACE(("[%s] -> [%s]", name, value)); - } +void mg_pic32_if_connect_udp(struct mg_connection *nc) { + nc->sock = TCPIP_UDP_ClientOpen(IP_ADDRESS_TYPE_ANY, 0, NULL); + nc->err = (nc->sock == INVALID_SOCKET) ? -1 : 0; +} - // Set default value if needed - for (i = 0; config_options[i * 2] != NULL; i++) { - default_value = config_options[i * 2 + 1]; - if (ctx->config[i] == NULL && default_value != NULL) { - ctx->config[i] = mg_strdup(default_value); - } +/* clang-format off */ +#define MG_PIC32_IFACE_VTABLE \ + { \ + mg_pic32_if_init, \ + mg_pic32_if_free, \ + mg_pic32_if_add_conn, \ + mg_pic32_if_remove_conn, \ + mg_pic32_if_poll, \ + mg_pic32_if_listen_tcp, \ + mg_pic32_if_listen_udp, \ + mg_pic32_if_connect_tcp, \ + mg_pic32_if_connect_udp, \ + mg_pic32_if_tcp_send, \ + mg_pic32_if_udp_send, \ + mg_pic32_if_recved, \ + mg_pic32_if_create_conn, \ + mg_pic32_if_destroy_conn, \ + mg_pic32_if_sock_set, \ + mg_pic32_if_get_conn_addr, \ } +/* clang-format on */ - // NOTE(lsm): order is important here. SSL certificates must - // be initialized before listening ports. UID must be set last. - if (!set_gpass_option(ctx) || -#if !defined(NO_SSL) - !set_ssl_option(ctx) || +const struct mg_iface_vtable mg_pic32_iface_vtable = MG_PIC32_IFACE_VTABLE; +#if MG_NET_IF == MG_NET_IF_PIC32 +const struct mg_iface_vtable mg_default_iface_vtable = MG_PIC32_IFACE_VTABLE; #endif - !set_ports_option(ctx) || -#if !defined(_WIN32) - !set_uid_option(ctx) || -#endif - !set_acl_option(ctx)) { - free_context(ctx); - return NULL; - } - -#if !defined(_WIN32) && !defined(__SYMBIAN32__) - // Ignore SIGPIPE signal, so if browser cancels the request, it - // won't kill the whole process. - (void) signal(SIGPIPE, SIG_IGN); - // Also ignoring SIGCHLD to let the OS to reap zombies properly. - //(void) signal(SIGCHLD, SIG_IGN); -#endif // !_WIN32 - (void) pthread_mutex_init(&ctx->mutex, NULL); - (void) pthread_cond_init(&ctx->cond, NULL); - (void) pthread_cond_init(&ctx->sq_empty, NULL); - (void) pthread_cond_init(&ctx->sq_full, NULL); +#endif /* MG_ENABLE_NET_IF_PIC32 */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/windows/windows_direct.c" +#endif +/* + * Copyright (c) 2017 Cesanta Software Limited + * All rights reserved + */ - // Start master (listening) thread - mg_start_thread(master_thread, ctx); +#ifdef _WIN32 - // Start worker threads - for (i = 0; i < atoi(ctx->config[NUM_THREADS]); i++) { - if (mg_start_thread(worker_thread, ctx) != 0) { - cry(fc(ctx), "Cannot start worker thread: %ld", (long) ERRNO); - } else { - ctx->num_threads++; - } - } +int rmdir(const char *dirname) { + return _rmdir(dirname); +} - return ctx; +unsigned int sleep(unsigned int seconds) { + Sleep(seconds * 1000); + return 0; } + +#endif /* _WIN32 */ diff --git a/mongoose/mongoose.h b/mongoose/mongoose.h index bf26182..3b56e26 100644 --- a/mongoose/mongoose.h +++ b/mongoose/mongoose.h @@ -1,357 +1,6107 @@ -// Copyright (c) 2004-2012 Sergey Lyubka -// -// Permission is hereby granted, free of charge, to any person obtaining a copy -// of this software and associated documentation files (the "Software"), to deal -// in the Software without restriction, including without limitation the rights -// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -// copies of the Software, and to permit persons to whom the Software is -// furnished to do so, subject to the following conditions: -// -// The above copyright notice and this permission notice shall be included in -// all copies or substantial portions of the Software. -// -// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -// THE SOFTWARE. - -#ifndef MONGOOSE_HEADER_INCLUDED -#define MONGOOSE_HEADER_INCLUDED +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/common.h" +#endif +/* + * Copyright (c) 2004-2013 Sergey Lyubka + * Copyright (c) 2013-2015 Cesanta Software Limited + * All rights reserved + * + * This software is dual-licensed: you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 as + * published by the Free Software Foundation. For the terms of this + * license, see <http://www.gnu.org/licenses/>. + * + * You are free to use this software under the terms of the GNU General + * Public License, but WITHOUT ANY WARRANTY; without even the implied + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. + * See the GNU General Public License for more details. + * + * Alternatively, you can license this software under a commercial + * license, as set out in <https://www.cesanta.com/license>. + */ -#include <stdio.h> +#ifndef CS_MONGOOSE_SRC_COMMON_H_ +#define CS_MONGOOSE_SRC_COMMON_H_ + +#define MG_VERSION "6.10" + +/* Local tweaks, applied before any of Mongoose's own headers. */ +#ifdef MG_LOCALS +#include <mg_locals.h> +#endif + +#endif /* CS_MONGOOSE_SRC_COMMON_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platform.h" +#endif +#ifndef CS_COMMON_PLATFORM_H_ +#define CS_COMMON_PLATFORM_H_ + +/* + * For the "custom" platform, includes and dependencies can be + * provided through mg_locals.h. + */ +#define CS_P_CUSTOM 0 +#define CS_P_UNIX 1 +#define CS_P_WINDOWS 2 +#define CS_P_ESP32 15 +#define CS_P_ESP8266 3 +#define CS_P_CC3100 6 +#define CS_P_CC3200 4 +#define CS_P_CC3220 17 +#define CS_P_MSP432 5 +#define CS_P_TM4C129 14 +#define CS_P_MBED 7 +#define CS_P_WINCE 8 +#define CS_P_NXP_LPC 13 +#define CS_P_NXP_KINETIS 9 +#define CS_P_NRF51 12 +#define CS_P_NRF52 10 +#define CS_P_PIC32 11 +#define CS_P_STM32 16 +/* Next id: 18 */ + +/* If not specified explicitly, we guess platform by defines. */ +#ifndef CS_PLATFORM + +#if defined(TARGET_IS_MSP432P4XX) || defined(__MSP432P401R__) +#define CS_PLATFORM CS_P_MSP432 +#elif defined(cc3200) || defined(TARGET_IS_CC3200) +#define CS_PLATFORM CS_P_CC3200 +#elif defined(cc3220) || defined(TARGET_IS_CC3220) +#define CS_PLATFORM CS_P_CC3220 +#elif defined(__unix__) || defined(__APPLE__) +#define CS_PLATFORM CS_P_UNIX +#elif defined(WINCE) +#define CS_PLATFORM CS_P_WINCE +#elif defined(_WIN32) +#define CS_PLATFORM CS_P_WINDOWS +#elif defined(__MBED__) +#define CS_PLATFORM CS_P_MBED +#elif defined(__USE_LPCOPEN) +#define CS_PLATFORM CS_P_NXP_LPC +#elif defined(FRDM_K64F) || defined(FREEDOM) +#define CS_PLATFORM CS_P_NXP_KINETIS +#elif defined(PIC32) +#define CS_PLATFORM CS_P_PIC32 +#elif defined(ESP_PLATFORM) +#define CS_PLATFORM CS_P_ESP32 +#elif defined(ICACHE_FLASH) +#define CS_PLATFORM CS_P_ESP8266 +#elif defined(TARGET_IS_TM4C129_RA0) || defined(TARGET_IS_TM4C129_RA1) || \ + defined(TARGET_IS_TM4C129_RA2) +#define CS_PLATFORM CS_P_TM4C129 +#elif defined(STM32) +#define CS_PLATFORM CS_P_STM32 +#endif + +#ifndef CS_PLATFORM +#error "CS_PLATFORM is not specified and we couldn't guess it." +#endif + +#endif /* !defined(CS_PLATFORM) */ + +#define MG_NET_IF_SOCKET 1 +#define MG_NET_IF_SIMPLELINK 2 +#define MG_NET_IF_LWIP_LOW_LEVEL 3 +#define MG_NET_IF_PIC32 4 + +#define MG_SSL_IF_OPENSSL 1 +#define MG_SSL_IF_MBEDTLS 2 +#define MG_SSL_IF_SIMPLELINK 3 + +/* Amalgamated: #include "common/platforms/platform_unix.h" */ +/* Amalgamated: #include "common/platforms/platform_windows.h" */ +/* Amalgamated: #include "common/platforms/platform_esp32.h" */ +/* Amalgamated: #include "common/platforms/platform_esp8266.h" */ +/* Amalgamated: #include "common/platforms/platform_cc3100.h" */ +/* Amalgamated: #include "common/platforms/platform_cc3200.h" */ +/* Amalgamated: #include "common/platforms/platform_cc3220.h" */ +/* Amalgamated: #include "common/platforms/platform_mbed.h" */ +/* Amalgamated: #include "common/platforms/platform_nrf51.h" */ +/* Amalgamated: #include "common/platforms/platform_nrf52.h" */ +/* Amalgamated: #include "common/platforms/platform_wince.h" */ +/* Amalgamated: #include "common/platforms/platform_nxp_lpc.h" */ +/* Amalgamated: #include "common/platforms/platform_nxp_kinetis.h" */ +/* Amalgamated: #include "common/platforms/platform_pic32.h" */ +/* Amalgamated: #include "common/platforms/platform_stm32.h" */ + +/* Common stuff */ + +#if !defined(WEAK) +#if (defined(__GNUC__) || defined(__TI_COMPILER_VERSION__)) && !defined(_WIN32) +#define WEAK __attribute__((weak)) +#else +#define WEAK +#endif +#endif + +#ifdef __GNUC__ +#define NORETURN __attribute__((noreturn)) +#define NOINLINE __attribute__((noinline)) +#define WARN_UNUSED_RESULT __attribute__((warn_unused_result)) +#define NOINSTR __attribute__((no_instrument_function)) +#define DO_NOT_WARN_UNUSED __attribute__((unused)) +#else +#define NORETURN +#define NOINLINE +#define WARN_UNUSED_RESULT +#define NOINSTR +#define DO_NOT_WARN_UNUSED +#endif /* __GNUC__ */ + +#ifndef ARRAY_SIZE +#define ARRAY_SIZE(array) (sizeof(array) / sizeof(array[0])) +#endif + +#endif /* CS_COMMON_PLATFORM_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_windows.h" +#endif +#ifndef CS_COMMON_PLATFORMS_PLATFORM_WINDOWS_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_WINDOWS_H_ +#if CS_PLATFORM == CS_P_WINDOWS + +/* + * MSVC++ 14.0 _MSC_VER == 1900 (Visual Studio 2015) + * MSVC++ 12.0 _MSC_VER == 1800 (Visual Studio 2013) + * MSVC++ 11.0 _MSC_VER == 1700 (Visual Studio 2012) + * MSVC++ 10.0 _MSC_VER == 1600 (Visual Studio 2010) + * MSVC++ 9.0 _MSC_VER == 1500 (Visual Studio 2008) + * MSVC++ 8.0 _MSC_VER == 1400 (Visual Studio 2005) + * MSVC++ 7.1 _MSC_VER == 1310 (Visual Studio 2003) + * MSVC++ 7.0 _MSC_VER == 1300 + * MSVC++ 6.0 _MSC_VER == 1200 + * MSVC++ 5.0 _MSC_VER == 1100 + */ +#ifdef _MSC_VER +#pragma warning(disable : 4127) /* FD_SET() emits warning, disable it */ +#pragma warning(disable : 4204) /* missing c99 support */ +#endif + +#ifndef _WINSOCK_DEPRECATED_NO_WARNINGS +#define _WINSOCK_DEPRECATED_NO_WARNINGS 1 +#endif + +#ifndef _CRT_SECURE_NO_WARNINGS +#define _CRT_SECURE_NO_WARNINGS +#endif + +#include <assert.h> +#include <direct.h> +#include <errno.h> +#include <fcntl.h> +#include <io.h> +#include <limits.h> +#include <signal.h> #include <stddef.h> +#include <stdio.h> +#include <stdlib.h> +#include <sys/stat.h> +#include <time.h> +#include <ctype.h> -#ifdef __cplusplus -extern "C" { -#endif // __cplusplus - -struct mg_context; // Handle for the HTTP service itself -struct mg_connection; // Handle for the individual connection - - -// This structure contains information about the HTTP request. -struct mg_request_info { - const char *request_method; // "GET", "POST", etc - const char *uri; // URL-decoded URI - const char *http_version; // E.g. "1.0", "1.1" - const char *query_string; // URL part after '?', not including '?', or NULL - const char *remote_user; // Authenticated user, or NULL if no auth used - long remote_ip; // Client's IP address - int remote_port; // Client's port - int is_ssl; // 1 if SSL-ed, 0 if not - void *user_data; // User data pointer passed to mg_start() - - int num_headers; // Number of HTTP headers - struct mg_header { - const char *name; // HTTP header name - const char *value; // HTTP header value - } http_headers[64]; // Maximum 64 headers -}; - - -// This structure needs to be passed to mg_start(), to let mongoose know -// which callbacks to invoke. For detailed description, see -// https://github.com/valenok/mongoose/blob/master/UserManual.md -struct mg_callbacks { - // Called when mongoose has received new HTTP request. - // If callback returns non-zero, - // callback must process the request by sending valid HTTP headers and body, - // and mongoose will not do any further processing. - // If callback returns 0, mongoose processes the request itself. In this case, - // callback must not send any data to the client. - int (*begin_request)(struct mg_connection *); - - // Called when mongoose has finished processing request. - void (*end_request)(const struct mg_connection *, int reply_status_code); - - // Called when mongoose is about to log a message. If callback returns - // non-zero, mongoose does not log anything. - int (*log_message)(const struct mg_connection *, const char *message); - - // Called when mongoose initializes SSL library. - int (*init_ssl)(void *ssl_context, void *user_data); - - // Called when websocket request is received, before websocket handshake. - // If callback returns 0, mongoose proceeds with handshake, otherwise - // cinnection is closed immediately. - int (*websocket_connect)(const struct mg_connection *); - - // Called when websocket handshake is successfully completed, and - // connection is ready for data exchange. - void (*websocket_ready)(struct mg_connection *); - - // Called when data frame has been received from the client. - // Parameters: - // bits: first byte of the websocket frame, see websocket RFC at - // http://tools.ietf.org/html/rfc6455, section 5.2 - // data, data_len: payload, with mask (if any) already applied. - // Return value: - // 0: keep this websocket connection opened. - // non-0: close this websocket connection. - int (*websocket_data)(struct mg_connection *, int bits, - char *data, size_t data_len); - - // Called when mongoose tries to open a file. Used to intercept file open - // calls, and serve file data from memory instead. - // Parameters: - // path: Full path to the file to open. - // data_len: Placeholder for the file size, if file is served from memory. - // Return value: - // NULL: do not serve file from memory, proceed with normal file open. - // non-NULL: pointer to the file contents in memory. data_len must be - // initilized with the size of the memory block. - const char * (*open_file)(const struct mg_connection *, - const char *path, size_t *data_len); - - // Called when mongoose is about to serve Lua server page (.lp file), if - // Lua support is enabled. - // Parameters: - // lua_context: "lua_State *" pointer. - void (*init_lua)(struct mg_connection *, void *lua_context); - - // Called when mongoose has uploaded a file to a temporary directory as a - // result of mg_upload() call. - // Parameters: - // file_file: full path name to the uploaded file. - void (*upload)(struct mg_connection *, const char *file_name); - - // Called when mongoose is about to send HTTP error to the client. - // Implementing this callback allows to create custom error pages. - // Parameters: - // status: HTTP error status code. - int (*http_error)(struct mg_connection *, int status); -}; - -// Start web server. -// -// Parameters: -// callbacks: mg_callbacks structure with user-defined callbacks. -// options: NULL terminated list of option_name, option_value pairs that -// specify Mongoose configuration parameters. -// -// Side-effects: on UNIX, ignores SIGCHLD and SIGPIPE signals. If custom -// processing is required for these, signal handlers must be set up -// after calling mg_start(). -// -// -// Example: -// const char *options[] = { -// "document_root", "/var/www", -// "listening_ports", "80,443s", -// NULL -// }; -// struct mg_context *ctx = mg_start(&my_func, NULL, options); -// -// Refer to https://github.com/valenok/mongoose/blob/master/UserManual.md -// for the list of valid option and their possible values. -// -// Return: -// web server context, or NULL on error. -struct mg_context *mg_start(const struct mg_callbacks *callbacks, - void *user_data, - const char **configuration_options); - - -// Stop the web server. -// -// Must be called last, when an application wants to stop the web server and -// release all associated resources. This function blocks until all Mongoose -// threads are stopped. Context pointer becomes invalid. -void mg_stop(struct mg_context *); - - -// Get the value of particular configuration parameter. -// The value returned is read-only. Mongoose does not allow changing -// configuration at run time. -// If given parameter name is not valid, NULL is returned. For valid -// names, return value is guaranteed to be non-NULL. If parameter is not -// set, zero-length string is returned. -const char *mg_get_option(const struct mg_context *ctx, const char *name); - - -// Return array of strings that represent valid configuration options. -// For each option, a short name, long name, and default value is returned. -// Array is NULL terminated. -const char **mg_get_valid_option_names(void); - - -// Add, edit or delete the entry in the passwords file. -// -// This function allows an application to manipulate .htpasswd files on the -// fly by adding, deleting and changing user records. This is one of the -// several ways of implementing authentication on the server side. For another, -// cookie-based way please refer to the examples/chat.c in the source tree. -// -// If password is not NULL, entry is added (or modified if already exists). -// If password is NULL, entry is deleted. -// -// Return: -// 1 on success, 0 on error. -int mg_modify_passwords_file(const char *passwords_file_name, - const char *domain, - const char *user, - const char *password); - - -// Return information associated with the request. -struct mg_request_info *mg_get_request_info(struct mg_connection *); - - -// Send data to the client. -// Return: -// 0 when the connection has been closed -// -1 on error -// >0 number of bytes written on success -int mg_write(struct mg_connection *, const void *buf, size_t len); - - -// Macros for enabling compiler-specific checks for printf-like arguments. -#undef PRINTF_FORMAT_STRING +#ifdef _MSC_VER +#pragma comment(lib, "ws2_32.lib") /* Linking with winsock library */ +#endif + +#include <winsock2.h> +#include <ws2tcpip.h> +#include <windows.h> +#include <process.h> + +#if defined(_MSC_VER) && _MSC_VER >= 1800 +#define strdup _strdup +#endif + +#ifndef EINPROGRESS +#define EINPROGRESS WSAEINPROGRESS +#endif +#ifndef EWOULDBLOCK +#define EWOULDBLOCK WSAEWOULDBLOCK +#endif +#ifndef __func__ +#define STRX(x) #x +#define STR(x) STRX(x) +#define __func__ __FILE__ ":" STR(__LINE__) +#endif +#define snprintf _snprintf +#define vsnprintf _vsnprintf +#define to64(x) _atoi64(x) +#if !defined(__MINGW32__) && !defined(__MINGW64__) +#define popen(x, y) _popen((x), (y)) +#define pclose(x) _pclose(x) +#define fileno _fileno +#endif #if defined(_MSC_VER) && _MSC_VER >= 1400 -#include <sal.h> -#if _MSC_VER > 1400 -#define PRINTF_FORMAT_STRING(s) _Printf_format_string_ s +#define fseeko(x, y, z) _fseeki64((x), (y), (z)) #else -#define PRINTF_FORMAT_STRING(s) __format_string s +#define fseeko(x, y, z) fseek((x), (y), (z)) #endif +#if defined(_MSC_VER) && _MSC_VER <= 1200 +typedef unsigned long uintptr_t; +typedef long intptr_t; +#endif +typedef int socklen_t; +#if _MSC_VER >= 1700 +#include <stdint.h> #else -#define PRINTF_FORMAT_STRING(s) s +typedef signed char int8_t; +typedef unsigned char uint8_t; +typedef int int32_t; +typedef unsigned int uint32_t; +typedef short int16_t; +typedef unsigned short uint16_t; +typedef __int64 int64_t; +typedef unsigned __int64 uint64_t; +#endif +typedef SOCKET sock_t; +typedef uint32_t in_addr_t; +#ifndef UINT16_MAX +#define UINT16_MAX 65535 +#endif +#ifndef UINT32_MAX +#define UINT32_MAX 4294967295 +#endif +#ifndef pid_t +#define pid_t HANDLE #endif +#define INT64_FMT "I64d" +#define INT64_X_FMT "I64x" +#define SIZE_T_FMT "Iu" +typedef struct _stati64 cs_stat_t; +#ifndef S_ISDIR +#define S_ISDIR(x) (((x) &_S_IFMT) == _S_IFDIR) +#endif +#ifndef S_ISREG +#define S_ISREG(x) (((x) &_S_IFMT) == _S_IFREG) +#endif +#define DIRSEP '\\' +#define CS_DEFINE_DIRENT -#ifdef __GNUC__ -#define PRINTF_ARGS(x, y) __attribute__((format(printf, x, y))) +#ifndef va_copy +#ifdef __va_copy +#define va_copy __va_copy +#else +#define va_copy(x, y) (x) = (y) +#endif +#endif + +#ifndef MG_MAX_HTTP_REQUEST_SIZE +#define MG_MAX_HTTP_REQUEST_SIZE 8192 +#endif + +#ifndef MG_MAX_HTTP_SEND_MBUF +#define MG_MAX_HTTP_SEND_MBUF 4096 +#endif + +#ifndef MG_MAX_HTTP_HEADERS +#define MG_MAX_HTTP_HEADERS 40 +#endif + +#ifndef CS_ENABLE_STDIO +#define CS_ENABLE_STDIO 1 +#endif + +#ifndef MG_ENABLE_BROADCAST +#define MG_ENABLE_BROADCAST 1 +#endif + +#ifndef MG_ENABLE_DIRECTORY_LISTING +#define MG_ENABLE_DIRECTORY_LISTING 1 +#endif + +#ifndef MG_ENABLE_FILESYSTEM +#define MG_ENABLE_FILESYSTEM 1 +#endif + +#ifndef MG_ENABLE_HTTP_CGI +#define MG_ENABLE_HTTP_CGI MG_ENABLE_FILESYSTEM +#endif + +#ifndef MG_NET_IF +#define MG_NET_IF MG_NET_IF_SOCKET +#endif + +int rmdir(const char *dirname); +unsigned int sleep(unsigned int seconds); + +#endif /* CS_PLATFORM == CS_P_WINDOWS */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_WINDOWS_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_unix.h" +#endif +#ifndef CS_COMMON_PLATFORMS_PLATFORM_UNIX_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_UNIX_H_ +#if CS_PLATFORM == CS_P_UNIX + +#ifndef _XOPEN_SOURCE +#define _XOPEN_SOURCE 600 +#endif + +/* <inttypes.h> wants this for C++ */ +#ifndef __STDC_FORMAT_MACROS +#define __STDC_FORMAT_MACROS +#endif + +/* C++ wants that for INT64_MAX */ +#ifndef __STDC_LIMIT_MACROS +#define __STDC_LIMIT_MACROS +#endif + +/* Enable fseeko() and ftello() functions */ +#ifndef _LARGEFILE_SOURCE +#define _LARGEFILE_SOURCE +#endif + +/* Enable 64-bit file offsets */ +#ifndef _FILE_OFFSET_BITS +#define _FILE_OFFSET_BITS 64 +#endif + +#include <arpa/inet.h> +#include <assert.h> +#include <ctype.h> +#include <dirent.h> +#include <errno.h> +#include <fcntl.h> +#include <inttypes.h> +#include <stdint.h> +#include <limits.h> +#include <math.h> +#include <netdb.h> +#include <netinet/in.h> +#include <pthread.h> +#include <signal.h> +#include <stdarg.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <sys/param.h> +#include <sys/socket.h> +#include <sys/select.h> +#include <sys/stat.h> +#include <sys/time.h> +#include <sys/types.h> +#include <unistd.h> + +#ifdef __APPLE__ +#include <machine/endian.h> +#ifndef BYTE_ORDER +#define LITTLE_ENDIAN __DARWIN_LITTLE_ENDIAN +#define BIG_ENDIAN __DARWIN_BIG_ENDIAN +#define PDP_ENDIAN __DARWIN_PDP_ENDIAN +#define BYTE_ORDER __DARWIN_BYTE_ORDER +#endif +#endif + +/* + * osx correctly avoids defining strtoll when compiling in strict ansi mode. + * c++ 11 standard defines strtoll as well. + * We require strtoll, and if your embedded pre-c99 compiler lacks one, please + * implement a shim. + */ +#if !(defined(__cplusplus) && __cplusplus >= 201103L) && \ + !(defined(__DARWIN_C_LEVEL) && __DARWIN_C_LEVEL >= 200809L) +long long strtoll(const char *, char **, int); +#endif + +typedef int sock_t; +#define INVALID_SOCKET (-1) +#define SIZE_T_FMT "zu" +typedef struct stat cs_stat_t; +#define DIRSEP '/' +#define to64(x) strtoll(x, NULL, 10) +#define INT64_FMT PRId64 +#define INT64_X_FMT PRIx64 + +#ifndef __cdecl +#define __cdecl +#endif + +#ifndef va_copy +#ifdef __va_copy +#define va_copy __va_copy +#else +#define va_copy(x, y) (x) = (y) +#endif +#endif + +#define closesocket(x) close(x) + +#ifndef MG_MAX_HTTP_REQUEST_SIZE +#define MG_MAX_HTTP_REQUEST_SIZE 8192 +#endif + +#ifndef MG_MAX_HTTP_SEND_MBUF +#define MG_MAX_HTTP_SEND_MBUF 4096 +#endif + +#ifndef MG_MAX_HTTP_HEADERS +#define MG_MAX_HTTP_HEADERS 40 +#endif + +#ifndef CS_ENABLE_STDIO +#define CS_ENABLE_STDIO 1 +#endif + +#ifndef MG_ENABLE_BROADCAST +#define MG_ENABLE_BROADCAST 1 +#endif + +#ifndef MG_ENABLE_DIRECTORY_LISTING +#define MG_ENABLE_DIRECTORY_LISTING 1 +#endif + +#ifndef MG_ENABLE_FILESYSTEM +#define MG_ENABLE_FILESYSTEM 1 +#endif + +#ifndef MG_ENABLE_HTTP_CGI +#define MG_ENABLE_HTTP_CGI MG_ENABLE_FILESYSTEM +#endif + +#ifndef MG_NET_IF +#define MG_NET_IF MG_NET_IF_SOCKET +#endif + +#ifndef MG_HOSTS_FILE_NAME +#define MG_HOSTS_FILE_NAME "/etc/hosts" +#endif + +#ifndef MG_RESOLV_CONF_FILE_NAME +#define MG_RESOLV_CONF_FILE_NAME "/etc/resolv.conf" +#endif + +#endif /* CS_PLATFORM == CS_P_UNIX */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_UNIX_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_esp32.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_PLATFORM_ESP32_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_ESP32_H_ +#if CS_PLATFORM == CS_P_ESP32 + +#include <assert.h> +#include <ctype.h> +#include <dirent.h> +#include <fcntl.h> +#include <inttypes.h> +#include <machine/endian.h> +#include <stdint.h> +#include <string.h> +#include <sys/stat.h> +#include <sys/time.h> + +#define SIZE_T_FMT "u" +typedef struct stat cs_stat_t; +#define DIRSEP '/' +#define to64(x) strtoll(x, NULL, 10) +#define INT64_FMT PRId64 +#define INT64_X_FMT PRIx64 +#define __cdecl +#define _FILE_OFFSET_BITS 32 + +#define MG_LWIP 1 + +#ifndef MG_NET_IF +#define MG_NET_IF MG_NET_IF_SOCKET +#endif + +#ifndef CS_ENABLE_STDIO +#define CS_ENABLE_STDIO 1 +#endif + +#endif /* CS_PLATFORM == CS_P_ESP32 */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_ESP32_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_esp8266.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_PLATFORM_ESP8266_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_ESP8266_H_ +#if CS_PLATFORM == CS_P_ESP8266 + +#include <assert.h> +#include <ctype.h> +#include <fcntl.h> +#include <inttypes.h> +#include <machine/endian.h> +#include <string.h> +#include <sys/stat.h> +#include <sys/time.h> + +#define SIZE_T_FMT "u" +typedef struct stat cs_stat_t; +#define DIRSEP '/' +#if !defined(MGOS_VFS_DEFINE_DIRENT) +#define CS_DEFINE_DIRENT +#endif + +#define to64(x) strtoll(x, NULL, 10) +#define INT64_FMT PRId64 +#define INT64_X_FMT PRIx64 +#define __cdecl +#define _FILE_OFFSET_BITS 32 + +#if !defined(RTOS_SDK) && !defined(__cplusplus) +#define fileno(x) -1 +#endif + +#define MG_LWIP 1 + +/* struct timeval is defined in sys/time.h. */ +#define LWIP_TIMEVAL_PRIVATE 0 + +#ifndef MG_NET_IF +#include <lwip/opt.h> +#if LWIP_SOCKET /* RTOS SDK has LWIP sockets */ +#define MG_NET_IF MG_NET_IF_SOCKET +#else +#define MG_NET_IF MG_NET_IF_LWIP_LOW_LEVEL +#endif +#endif + +#ifndef CS_ENABLE_STDIO +#define CS_ENABLE_STDIO 1 +#endif + +#endif /* CS_PLATFORM == CS_P_ESP8266 */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_ESP8266_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_cc3100.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_PLATFORM_CC3100_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_CC3100_H_ +#if CS_PLATFORM == CS_P_CC3100 + +#include <assert.h> +#include <ctype.h> +#include <errno.h> +#include <inttypes.h> +#include <stdint.h> +#include <string.h> +#include <time.h> + +#define MG_NET_IF MG_NET_IF_SIMPLELINK +#define MG_SSL_IF MG_SSL_IF_SIMPLELINK + +/* + * CC3100 SDK and STM32 SDK include headers w/out path, just like + * #include "simplelink.h". As result, we have to add all required directories + * into Makefile IPATH and do the same thing (include w/out path) + */ + +#include <simplelink.h> +#include <netapp.h> +#undef timeval + +typedef int sock_t; +#define INVALID_SOCKET (-1) + +#define to64(x) strtoll(x, NULL, 10) +#define INT64_FMT PRId64 +#define INT64_X_FMT PRIx64 +#define SIZE_T_FMT "u" + +#define SOMAXCONN 8 + +const char *inet_ntop(int af, const void *src, char *dst, socklen_t size); +char *inet_ntoa(struct in_addr in); +int inet_pton(int af, const char *src, void *dst); + +#endif /* CS_PLATFORM == CS_P_CC3100 */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_CC3100_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_cc3200.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_PLATFORM_CC3200_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_CC3200_H_ +#if CS_PLATFORM == CS_P_CC3200 + +#include <assert.h> +#include <ctype.h> +#include <errno.h> +#include <inttypes.h> +#include <stdint.h> +#include <string.h> +#include <time.h> + +#ifndef __TI_COMPILER_VERSION__ +#include <fcntl.h> +#include <sys/time.h> +#endif + +#define MG_NET_IF MG_NET_IF_SIMPLELINK +#define MG_SSL_IF MG_SSL_IF_SIMPLELINK + +/* Only SPIFFS supports directories, SLFS does not. */ +#if defined(CC3200_FS_SPIFFS) && !defined(MG_ENABLE_DIRECTORY_LISTING) +#define MG_ENABLE_DIRECTORY_LISTING 1 +#endif + +/* Amalgamated: #include "common/platforms/simplelink/cs_simplelink.h" */ + +typedef int sock_t; +#define INVALID_SOCKET (-1) +#define SIZE_T_FMT "u" +typedef struct stat cs_stat_t; +#define DIRSEP '/' +#define to64(x) strtoll(x, NULL, 10) +#define INT64_FMT PRId64 +#define INT64_X_FMT PRIx64 +#define __cdecl + +#define fileno(x) -1 + +/* Some functions we implement for Mongoose. */ + +#ifdef __cplusplus +extern "C" { +#endif + +#ifdef __TI_COMPILER_VERSION__ +struct SlTimeval_t; +#define timeval SlTimeval_t +int gettimeofday(struct timeval *t, void *tz); +int settimeofday(const struct timeval *tv, const void *tz); + +int asprintf(char **strp, const char *fmt, ...); + +#endif + +/* TI's libc does not have stat & friends, add them. */ +#ifdef __TI_COMPILER_VERSION__ + +#include <file.h> + +typedef unsigned int mode_t; +typedef size_t _off_t; +typedef long ssize_t; + +struct stat { + int st_ino; + mode_t st_mode; + int st_nlink; + time_t st_mtime; + off_t st_size; +}; + +int _stat(const char *pathname, struct stat *st); +int stat(const char *pathname, struct stat *st); + +#define __S_IFMT 0170000 + +#define __S_IFDIR 0040000 +#define __S_IFCHR 0020000 +#define __S_IFREG 0100000 + +#define __S_ISTYPE(mode, mask) (((mode) &__S_IFMT) == (mask)) + +#define S_IFDIR __S_IFDIR +#define S_IFCHR __S_IFCHR +#define S_IFREG __S_IFREG +#define S_ISDIR(mode) __S_ISTYPE((mode), __S_IFDIR) +#define S_ISREG(mode) __S_ISTYPE((mode), __S_IFREG) + +/* 5.x series compilers don't have va_copy, 16.x do. */ +#if __TI_COMPILER_VERSION__ < 16000000 +#define va_copy(apc, ap) ((apc) = (ap)) +#endif + +#endif /* __TI_COMPILER_VERSION__ */ + +#ifdef CC3200_FS_SLFS +#define MG_FS_SLFS +#endif + +#if (defined(CC3200_FS_SPIFFS) || defined(CC3200_FS_SLFS)) && \ + !defined(MG_ENABLE_FILESYSTEM) +#define MG_ENABLE_FILESYSTEM 1 +#define CS_DEFINE_DIRENT +#endif + +#ifndef CS_ENABLE_STDIO +#define CS_ENABLE_STDIO 1 +#endif + +#ifdef __cplusplus +} +#endif + +#endif /* CS_PLATFORM == CS_P_CC3200 */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_CC3200_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_msp432.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_PLATFORM_MSP432_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_MSP432_H_ +#if CS_PLATFORM == CS_P_MSP432 + +#include <assert.h> +#include <ctype.h> +#include <errno.h> +#include <inttypes.h> +#include <stdint.h> +#include <string.h> +#include <time.h> + +#ifndef __TI_COMPILER_VERSION__ +#include <fcntl.h> +#include <sys/time.h> +#endif + +#define MG_NET_IF MG_NET_IF_SIMPLELINK +#define MG_SSL_IF MG_SSL_IF_SIMPLELINK + +/* Amalgamated: #include "common/platforms/simplelink/cs_simplelink.h" */ + +typedef int sock_t; +#define INVALID_SOCKET (-1) +#define SIZE_T_FMT "u" +typedef struct stat cs_stat_t; +#define DIRSEP '/' +#define to64(x) strtoll(x, NULL, 10) +#define INT64_FMT PRId64 +#define INT64_X_FMT PRIx64 +#define __cdecl + +#define fileno(x) -1 + +/* Some functions we implement for Mongoose. */ + +#ifdef __cplusplus +extern "C" { +#endif + +#ifdef __TI_COMPILER_VERSION__ +struct SlTimeval_t; +#define timeval SlTimeval_t +int gettimeofday(struct timeval *t, void *tz); +#endif + +/* TI's libc does not have stat & friends, add them. */ +#ifdef __TI_COMPILER_VERSION__ + +#include <file.h> + +typedef unsigned int mode_t; +typedef size_t _off_t; +typedef long ssize_t; + +struct stat { + int st_ino; + mode_t st_mode; + int st_nlink; + time_t st_mtime; + off_t st_size; +}; + +int _stat(const char *pathname, struct stat *st); +#define stat(a, b) _stat(a, b) + +#define __S_IFMT 0170000 + +#define __S_IFDIR 0040000 +#define __S_IFCHR 0020000 +#define __S_IFREG 0100000 + +#define __S_ISTYPE(mode, mask) (((mode) &__S_IFMT) == (mask)) + +#define S_IFDIR __S_IFDIR +#define S_IFCHR __S_IFCHR +#define S_IFREG __S_IFREG +#define S_ISDIR(mode) __S_ISTYPE((mode), __S_IFDIR) +#define S_ISREG(mode) __S_ISTYPE((mode), __S_IFREG) + +/* As of 5.2.7, TI compiler does not support va_copy() yet. */ +#define va_copy(apc, ap) ((apc) = (ap)) + +#endif /* __TI_COMPILER_VERSION__ */ + +#ifndef CS_ENABLE_STDIO +#define CS_ENABLE_STDIO 1 +#endif + +#if (defined(CC3200_FS_SPIFFS) || defined(CC3200_FS_SLFS)) && \ + !defined(MG_ENABLE_FILESYSTEM) +#define MG_ENABLE_FILESYSTEM 1 +#endif + +#ifdef __cplusplus +} +#endif + +#endif /* CS_PLATFORM == CS_P_MSP432 */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_MSP432_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_tm4c129.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_PLATFORM_TM4C129_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_TM4C129_H_ +#if CS_PLATFORM == CS_P_TM4C129 + +#include <assert.h> +#include <ctype.h> +#include <errno.h> +#include <inttypes.h> +#include <stdint.h> +#include <string.h> +#include <time.h> + +#ifndef __TI_COMPILER_VERSION__ +#include <fcntl.h> +#include <sys/time.h> +#endif + +#define SIZE_T_FMT "u" +typedef struct stat cs_stat_t; +#define DIRSEP '/' +#define to64(x) strtoll(x, NULL, 10) +#define INT64_FMT PRId64 +#define INT64_X_FMT PRIx64 +#define __cdecl + +#ifndef MG_NET_IF +#include <lwip/opt.h> +#if LWIP_SOCKET +#define MG_NET_IF MG_NET_IF_SOCKET #else -#define PRINTF_ARGS(x, y) -#endif - -// Send data to the client using printf() semantics. -// -// Works exactly like mg_write(), but allows to do message formatting. -int mg_printf(struct mg_connection *, - PRINTF_FORMAT_STRING(const char *fmt), ...) PRINTF_ARGS(2, 3); - - -// Send contents of the entire file together with HTTP headers. -void mg_send_file(struct mg_connection *conn, const char *path); - - -// Read data from the remote end, return number of bytes read. -int mg_read(struct mg_connection *, void *buf, size_t len); - - -// Get the value of particular HTTP header. -// -// This is a helper function. It traverses request_info->http_headers array, -// and if the header is present in the array, returns its value. If it is -// not present, NULL is returned. -const char *mg_get_header(const struct mg_connection *, const char *name); - - -// Get a value of particular form variable. -// -// Parameters: -// data: pointer to form-uri-encoded buffer. This could be either POST data, -// or request_info.query_string. -// data_len: length of the encoded data. -// var_name: variable name to decode from the buffer -// dst: destination buffer for the decoded variable -// dst_len: length of the destination buffer -// -// Return: -// On success, length of the decoded variable. -// On error: -// -1 (variable not found). -// -2 (destination buffer is NULL, zero length or too small to hold the -// decoded variable). -// -// Destination buffer is guaranteed to be '\0' - terminated if it is not -// NULL or zero length. -int mg_get_var(const char *data, size_t data_len, - const char *var_name, char *dst, size_t dst_len); - -// Fetch value of certain cookie variable into the destination buffer. -// -// Destination buffer is guaranteed to be '\0' - terminated. In case of -// failure, dst[0] == '\0'. Note that RFC allows many occurrences of the same -// parameter. This function returns only first occurrence. -// -// Return: -// On success, value length. -// On error: -// -1 (either "Cookie:" header is not present at all or the requested -// parameter is not found). -// -2 (destination buffer is NULL, zero length or too small to hold the -// value). -int mg_get_cookie(const char *cookie, const char *var_name, - char *buf, size_t buf_len); - - -// Download data from the remote web server. -// host: host name to connect to, e.g. "foo.com", or "10.12.40.1". -// port: port number, e.g. 80. -// use_ssl: wether to use SSL connection. -// error_buffer, error_buffer_size: error message placeholder. -// request_fmt,...: HTTP request. -// Return: -// On success, valid pointer to the new connection, suitable for mg_read(). -// On error, NULL. error_buffer contains error message. -// Example: -// char ebuf[100]; -// struct mg_connection *conn; -// conn = mg_download("google.com", 80, 0, ebuf, sizeof(ebuf), -// "%s", "GET / HTTP/1.0\r\nHost: google.com\r\n\r\n"); -struct mg_connection *mg_download(const char *host, int port, int use_ssl, - char *error_buffer, size_t error_buffer_size, - PRINTF_FORMAT_STRING(const char *request_fmt), - ...) PRINTF_ARGS(6, 7); - - -// Close the connection opened by mg_download(). -void mg_close_connection(struct mg_connection *conn); - -struct mg_connection *mg_connect(const char *host, int port, int use_ssl, - char *ebuf, size_t ebuf_len); - -// File upload functionality. Each uploaded file gets saved into a temporary -// file and MG_UPLOAD event is sent. -// Return number of uploaded files. -int mg_upload(struct mg_connection *conn, const char *destination_dir); - - -// Convenience function -- create detached thread. -// Return: 0 on success, non-0 on error. -typedef void * (*mg_thread_func_t)(void *); -int mg_start_thread(mg_thread_func_t f, void *p); - - -// Return builtin mime type for the given file name. -// For unrecognized extensions, "text/plain" is returned. -const char *mg_get_builtin_mime_type(const char *file_name); - - -// Return Mongoose version. -const char *mg_version(void); - - -// MD5 hash given strings. -// Buffer 'buf' must be 33 bytes long. Varargs is a NULL terminated list of -// ASCIIz strings. When function returns, buf will contain human-readable -// MD5 hash. Example: -// char buf[33]; -// mg_md5(buf, "aa", "bb", NULL); -char *mg_md5(char buf[33], ...); - - -// Added some general functions -const char *mg_strcasestr(const char *big_str, const char *small_str); -int get_request_len(const char *buf, int buflen); -int mg_vprintf(struct mg_connection *conn, const char *fmt, va_list ap); - -#ifdef __cplusplus -} -#endif // __cplusplus - -#endif // MONGOOSE_HEADER_INCLUDED +#define MG_NET_IF MG_NET_IF_LWIP_LOW_LEVEL +#endif +#define MG_LWIP 1 +#elif MG_NET_IF == MG_NET_IF_SIMPLELINK +/* Amalgamated: #include "common/platforms/simplelink/cs_simplelink.h" */ +#endif + +#ifndef CS_ENABLE_STDIO +#define CS_ENABLE_STDIO 1 +#endif + +#ifdef __TI_COMPILER_VERSION__ +/* As of 5.2.8, TI compiler does not support va_copy() yet. */ +#define va_copy(apc, ap) ((apc) = (ap)) +#endif /* __TI_COMPILER_VERSION__ */ + +#ifdef __cplusplus +} +#endif + +#endif /* CS_PLATFORM == CS_P_TM4C129 */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_TM4C129_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_mbed.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_PLATFORM_MBED_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_MBED_H_ +#if CS_PLATFORM == CS_P_MBED + +/* + * mbed.h contains C++ code (e.g. templates), thus, it should be processed + * only if included directly to startup file (ex: main.cpp) + */ +#ifdef __cplusplus +/* Amalgamated: #include "mbed.h" */ +#endif /* __cplusplus */ + +#include <assert.h> +#include <ctype.h> +#include <errno.h> +#include <inttypes.h> +#include <stdint.h> +#include <string.h> +#include <time.h> +#include <sys/stat.h> +#include <sys/types.h> +#include <fcntl.h> +#include <stdio.h> + +typedef struct stat cs_stat_t; +#define DIRSEP '/' + +#ifndef CS_ENABLE_STDIO +#define CS_ENABLE_STDIO 1 +#endif + +/* + * mbed can be compiled with the ARM compiler which + * just doesn't come with a gettimeofday shim + * because it's a BSD API and ARM targets embedded + * non-unix platforms. + */ +#if defined(__ARMCC_VERSION) || defined(__ICCARM__) +#define _TIMEVAL_DEFINED +#define gettimeofday _gettimeofday + +/* copied from GCC on ARM; for some reason useconds are signed */ +typedef long suseconds_t; /* microseconds (signed) */ +struct timeval { + time_t tv_sec; /* seconds */ + suseconds_t tv_usec; /* and microseconds */ +}; + +#endif + +#if MG_NET_IF == MG_NET_IF_SIMPLELINK + +#define MG_SIMPLELINK_NO_OSI 1 + +#include <simplelink.h> + +typedef int sock_t; +#define INVALID_SOCKET (-1) + +#define to64(x) strtoll(x, NULL, 10) +#define INT64_FMT PRId64 +#define INT64_X_FMT PRIx64 +#define SIZE_T_FMT "u" + +#define SOMAXCONN 8 + +const char *inet_ntop(int af, const void *src, char *dst, socklen_t size); +char *inet_ntoa(struct in_addr in); +int inet_pton(int af, const char *src, void *dst); +int inet_aton(const char *cp, struct in_addr *inp); +in_addr_t inet_addr(const char *cp); + +#endif /* MG_NET_IF == MG_NET_IF_SIMPLELINK */ + +#endif /* CS_PLATFORM == CS_P_MBED */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_MBED_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_nrf51.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ +#ifndef CS_COMMON_PLATFORMS_PLATFORM_NRF51_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_NRF51_H_ +#if CS_PLATFORM == CS_P_NRF51 + +#include <assert.h> +#include <ctype.h> +#include <inttypes.h> +#include <stdint.h> +#include <string.h> +#include <time.h> + +#define to64(x) strtoll(x, NULL, 10) + +#define MG_NET_IF MG_NET_IF_LWIP_LOW_LEVEL +#define MG_LWIP 1 +#define MG_ENABLE_IPV6 1 + +/* + * For ARM C Compiler, make lwip to export `struct timeval`; for other + * compilers, suppress it. + */ +#if !defined(__ARMCC_VERSION) +#define LWIP_TIMEVAL_PRIVATE 0 +#else +struct timeval; +int gettimeofday(struct timeval *tp, void *tzp); +#endif + +#define INT64_FMT PRId64 +#define SIZE_T_FMT "u" + +/* + * ARM C Compiler doesn't have strdup, so we provide it + */ +#define CS_ENABLE_STRDUP defined(__ARMCC_VERSION) + +#endif /* CS_PLATFORM == CS_P_NRF51 */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_NRF51_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_nrf52.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ +#ifndef CS_COMMON_PLATFORMS_PLATFORM_NRF52_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_NRF52_H_ +#if CS_PLATFORM == CS_P_NRF52 + +#include <assert.h> +#include <ctype.h> +#include <errno.h> +#include <inttypes.h> +#include <stdint.h> +#include <string.h> +#include <time.h> + +#define to64(x) strtoll(x, NULL, 10) + +#define MG_NET_IF MG_NET_IF_LWIP_LOW_LEVEL +#define MG_LWIP 1 +#define MG_ENABLE_IPV6 1 + +#if !defined(ENOSPC) +#define ENOSPC 28 /* No space left on device */ +#endif + +/* + * For ARM C Compiler, make lwip to export `struct timeval`; for other + * compilers, suppress it. + */ +#if !defined(__ARMCC_VERSION) +#define LWIP_TIMEVAL_PRIVATE 0 +#endif + +#define INT64_FMT PRId64 +#define SIZE_T_FMT "u" + +/* + * ARM C Compiler doesn't have strdup, so we provide it + */ +#define CS_ENABLE_STRDUP defined(__ARMCC_VERSION) + +#endif /* CS_PLATFORM == CS_P_NRF52 */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_NRF52_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/simplelink/cs_simplelink.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_SIMPLELINK_CS_SIMPLELINK_H_ +#define CS_COMMON_PLATFORMS_SIMPLELINK_CS_SIMPLELINK_H_ + +#if defined(MG_NET_IF) && MG_NET_IF == MG_NET_IF_SIMPLELINK + +/* If simplelink.h is already included, all bets are off. */ +#if !defined(__SIMPLELINK_H__) + +#include <stdbool.h> + +#ifndef __TI_COMPILER_VERSION__ +#undef __CONCAT +#undef FD_CLR +#undef FD_ISSET +#undef FD_SET +#undef FD_SETSIZE +#undef FD_ZERO +#undef fd_set +#endif + +#if CS_PLATFORM == CS_P_CC3220 +#include <ti/drivers/net/wifi/porting/user.h> +#include <ti/drivers/net/wifi/simplelink.h> +#include <ti/drivers/net/wifi/sl_socket.h> +#include <ti/drivers/net/wifi/netapp.h> +#else +/* We want to disable SL_INC_STD_BSD_API_NAMING, so we include user.h ourselves + * and undef it. */ +#define PROVISIONING_API_H_ +#include <simplelink/user.h> +#undef PROVISIONING_API_H_ +#undef SL_INC_STD_BSD_API_NAMING + +#include <simplelink/include/simplelink.h> +#include <simplelink/include/netapp.h> +#endif /* CS_PLATFORM == CS_P_CC3220 */ + +/* Now define only the subset of the BSD API that we use. + * Notably, close(), read() and write() are not defined. */ +#define AF_INET SL_AF_INET + +#define socklen_t SlSocklen_t +#define sockaddr SlSockAddr_t +#define sockaddr_in SlSockAddrIn_t +#define in_addr SlInAddr_t + +#define SOCK_STREAM SL_SOCK_STREAM +#define SOCK_DGRAM SL_SOCK_DGRAM + +#define htonl sl_Htonl +#define ntohl sl_Ntohl +#define htons sl_Htons +#define ntohs sl_Ntohs + +#ifndef EACCES +#define EACCES SL_EACCES +#endif +#ifndef EAFNOSUPPORT +#define EAFNOSUPPORT SL_EAFNOSUPPORT +#endif +#ifndef EAGAIN +#define EAGAIN SL_EAGAIN +#endif +#ifndef EBADF +#define EBADF SL_EBADF +#endif +#ifndef EINVAL +#define EINVAL SL_EINVAL +#endif +#ifndef ENOMEM +#define ENOMEM SL_ENOMEM +#endif +#ifndef EWOULDBLOCK +#define EWOULDBLOCK SL_EWOULDBLOCK +#endif + +#define SOMAXCONN 8 + +#ifdef __cplusplus +extern "C" { +#endif + +const char *inet_ntop(int af, const void *src, char *dst, socklen_t size); +char *inet_ntoa(struct in_addr in); +int inet_pton(int af, const char *src, void *dst); + +struct mg_mgr; +struct mg_connection; + +typedef void (*mg_init_cb)(struct mg_mgr *mgr); +bool mg_start_task(int priority, int stack_size, mg_init_cb mg_init); + +void mg_run_in_task(void (*cb)(struct mg_mgr *mgr, void *arg), void *cb_arg); + +int sl_fs_init(void); + +void sl_restart_cb(struct mg_mgr *mgr); + +int sl_set_ssl_opts(int sock, struct mg_connection *nc); + +#ifdef __cplusplus +} +#endif + +#endif /* !defined(__SIMPLELINK_H__) */ + +/* Compatibility with older versions of SimpleLink */ +#if SL_MAJOR_VERSION_NUM < 2 + +#define SL_ERROR_BSD_EAGAIN SL_EAGAIN +#define SL_ERROR_BSD_EALREADY SL_EALREADY +#define SL_ERROR_BSD_ENOPROTOOPT SL_ENOPROTOOPT +#define SL_ERROR_BSD_ESECDATEERROR SL_ESECDATEERROR +#define SL_ERROR_BSD_ESECSNOVERIFY SL_ESECSNOVERIFY +#define SL_ERROR_FS_FAILED_TO_ALLOCATE_MEM SL_FS_ERR_FAILED_TO_ALLOCATE_MEM +#define SL_ERROR_FS_FILE_HAS_NOT_BEEN_CLOSE_CORRECTLY \ + SL_FS_FILE_HAS_NOT_BEEN_CLOSE_CORRECTLY +#define SL_ERROR_FS_FILE_NAME_EXIST SL_FS_FILE_NAME_EXIST +#define SL_ERROR_FS_FILE_NOT_EXISTS SL_FS_ERR_FILE_NOT_EXISTS +#define SL_ERROR_FS_NO_AVAILABLE_NV_INDEX SL_FS_ERR_NO_AVAILABLE_NV_INDEX +#define SL_ERROR_FS_NOT_ENOUGH_STORAGE_SPACE SL_FS_ERR_NO_AVAILABLE_BLOCKS +#define SL_ERROR_FS_NOT_SUPPORTED SL_FS_ERR_NOT_SUPPORTED +#define SL_ERROR_FS_WRONG_FILE_NAME SL_FS_WRONG_FILE_NAME +#define SL_ERROR_FS_INVALID_HANDLE SL_FS_ERR_INVALID_HANDLE +#define SL_NETCFG_MAC_ADDRESS_GET SL_MAC_ADDRESS_GET +#define SL_SOCKET_FD_ZERO SL_FD_ZERO +#define SL_SOCKET_FD_SET SL_FD_SET +#define SL_SOCKET_FD_ISSET SL_FD_ISSET +#define SL_SO_SECURE_DOMAIN_NAME_VERIFICATION SO_SECURE_DOMAIN_NAME_VERIFICATION + +#define SL_FS_READ FS_MODE_OPEN_READ +#define SL_FS_WRITE FS_MODE_OPEN_WRITE + +#define SL_FI_FILE_SIZE(fi) ((fi).FileLen) +#define SL_FI_FILE_MAX_SIZE(fi) ((fi).AllocatedLen) + +#define SlDeviceVersion_t SlVersionFull +#define sl_DeviceGet sl_DevGet +#define SL_DEVICE_GENERAL SL_DEVICE_GENERAL_CONFIGURATION +#define SL_LEN_TYPE _u8 +#define SL_OPT_TYPE _u8 + +#else /* SL_MAJOR_VERSION_NUM >= 2 */ + +#define FS_MODE_OPEN_CREATE(max_size, flag) \ + (SL_FS_CREATE | SL_FS_CREATE_MAX_SIZE(max_size)) +#define SL_FI_FILE_SIZE(fi) ((fi).Len) +#define SL_FI_FILE_MAX_SIZE(fi) ((fi).MaxSize) + +#define SL_LEN_TYPE _u16 +#define SL_OPT_TYPE _u16 + +#endif /* SL_MAJOR_VERSION_NUM < 2 */ + +int slfs_open(const unsigned char *fname, uint32_t flags); + +#endif /* MG_NET_IF == MG_NET_IF_SIMPLELINK */ + +#endif /* CS_COMMON_PLATFORMS_SIMPLELINK_CS_SIMPLELINK_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_wince.h" +#endif +#ifndef CS_COMMON_PLATFORMS_PLATFORM_WINCE_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_WINCE_H_ + +#if CS_PLATFORM == CS_P_WINCE + +/* + * MSVC++ 14.0 _MSC_VER == 1900 (Visual Studio 2015) + * MSVC++ 12.0 _MSC_VER == 1800 (Visual Studio 2013) + * MSVC++ 11.0 _MSC_VER == 1700 (Visual Studio 2012) + * MSVC++ 10.0 _MSC_VER == 1600 (Visual Studio 2010) + * MSVC++ 9.0 _MSC_VER == 1500 (Visual Studio 2008) + * MSVC++ 8.0 _MSC_VER == 1400 (Visual Studio 2005) + * MSVC++ 7.1 _MSC_VER == 1310 (Visual Studio 2003) + * MSVC++ 7.0 _MSC_VER == 1300 + * MSVC++ 6.0 _MSC_VER == 1200 + * MSVC++ 5.0 _MSC_VER == 1100 + */ +#pragma warning(disable : 4127) /* FD_SET() emits warning, disable it */ +#pragma warning(disable : 4204) /* missing c99 support */ + +#ifndef _WINSOCK_DEPRECATED_NO_WARNINGS +#define _WINSOCK_DEPRECATED_NO_WARNINGS 1 +#endif + +#ifndef _CRT_SECURE_NO_WARNINGS +#define _CRT_SECURE_NO_WARNINGS +#endif + +#include <assert.h> +#include <limits.h> +#include <stddef.h> +#include <stdio.h> +#include <stdlib.h> +#include <time.h> + +#pragma comment(lib, "ws2.lib") /* Linking with WinCE winsock library */ + +#include <winsock2.h> +#include <ws2tcpip.h> +#include <windows.h> + +#define strdup _strdup + +#ifndef EINPROGRESS +#define EINPROGRESS WSAEINPROGRESS +#endif + +#ifndef EWOULDBLOCK +#define EWOULDBLOCK WSAEWOULDBLOCK +#endif + +#ifndef EAGAIN +#define EAGAIN EWOULDBLOCK +#endif + +#ifndef __func__ +#define STRX(x) #x +#define STR(x) STRX(x) +#define __func__ __FILE__ ":" STR(__LINE__) +#endif + +#define snprintf _snprintf +#define fileno _fileno +#define vsnprintf _vsnprintf +#define sleep(x) Sleep((x) *1000) +#define to64(x) _atoi64(x) +#define rmdir _rmdir + +#if defined(_MSC_VER) && _MSC_VER >= 1400 +#define fseeko(x, y, z) _fseeki64((x), (y), (z)) +#else +#define fseeko(x, y, z) fseek((x), (y), (z)) +#endif + +typedef int socklen_t; + +#if _MSC_VER >= 1700 +#include <stdint.h> +#else +typedef signed char int8_t; +typedef unsigned char uint8_t; +typedef int int32_t; +typedef unsigned int uint32_t; +typedef short int16_t; +typedef unsigned short uint16_t; +typedef __int64 int64_t; +typedef unsigned __int64 uint64_t; +#endif + +typedef SOCKET sock_t; +typedef uint32_t in_addr_t; + +#ifndef UINT16_MAX +#define UINT16_MAX 65535 +#endif + +#ifndef UINT32_MAX +#define UINT32_MAX 4294967295 +#endif + +#ifndef pid_t +#define pid_t HANDLE +#endif + +#define INT64_FMT "I64d" +#define INT64_X_FMT "I64x" +/* TODO(alashkin): check if this is correct */ +#define SIZE_T_FMT "u" + +#define DIRSEP '\\' +#define CS_DEFINE_DIRENT + +#ifndef va_copy +#ifdef __va_copy +#define va_copy __va_copy +#else +#define va_copy(x, y) (x) = (y) +#endif +#endif + +#ifndef MG_MAX_HTTP_REQUEST_SIZE +#define MG_MAX_HTTP_REQUEST_SIZE 8192 +#endif + +#ifndef MG_MAX_HTTP_SEND_MBUF +#define MG_MAX_HTTP_SEND_MBUF 4096 +#endif + +#ifndef MG_MAX_HTTP_HEADERS +#define MG_MAX_HTTP_HEADERS 40 +#endif + +#ifndef CS_ENABLE_STDIO +#define CS_ENABLE_STDIO 1 +#endif + +#define abort() DebugBreak(); + +#ifndef BUFSIZ +#define BUFSIZ 4096 +#endif +/* + * Explicitly disabling MG_ENABLE_THREADS for WinCE + * because they are enabled for _WIN32 by default + */ +#ifndef MG_ENABLE_THREADS +#define MG_ENABLE_THREADS 0 +#endif + +#ifndef MG_ENABLE_FILESYSTEM +#define MG_ENABLE_FILESYSTEM 1 +#endif + +#ifndef MG_NET_IF +#define MG_NET_IF MG_NET_IF_SOCKET +#endif + +typedef struct _stati64 { + uint32_t st_mtime; + uint32_t st_size; + uint32_t st_mode; +} cs_stat_t; + +/* + * WinCE 6.0 has a lot of useful definitions in ATL (not windows.h) headers + * use #ifdefs to avoid conflicts + */ + +#ifndef ENOENT +#define ENOENT ERROR_PATH_NOT_FOUND +#endif + +#ifndef EACCES +#define EACCES ERROR_ACCESS_DENIED +#endif + +#ifndef ENOMEM +#define ENOMEM ERROR_NOT_ENOUGH_MEMORY +#endif + +#ifndef _UINTPTR_T_DEFINED +typedef unsigned int *uintptr_t; +#endif + +#define _S_IFREG 2 +#define _S_IFDIR 4 + +#ifndef S_ISDIR +#define S_ISDIR(x) (((x) &_S_IFDIR) != 0) +#endif + +#ifndef S_ISREG +#define S_ISREG(x) (((x) &_S_IFREG) != 0) +#endif + +int open(const char *filename, int oflag, int pmode); +int _wstati64(const wchar_t *path, cs_stat_t *st); +const char *strerror(); + +#endif /* CS_PLATFORM == CS_P_WINCE */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_WINCE_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_nxp_lpc.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_PLATFORM_NXP_LPC_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_NXP_LPC_H_ + +#if CS_PLATFORM == CS_P_NXP_LPC + +#include <ctype.h> +#include <stdint.h> +#include <string.h> + +#define SIZE_T_FMT "u" +typedef struct stat cs_stat_t; +#define INT64_FMT "lld" +#define INT64_X_FMT "llx" +#define __cdecl + +#define MG_LWIP 1 + +#define MG_NET_IF MG_NET_IF_LWIP_LOW_LEVEL + +/* + * LPCXpress comes with 3 C library implementations: Newlib, NewlibNano and + *Redlib. + * See https://community.nxp.com/message/630860 for more details. + * + * Redlib is the default and lacks certain things, so we provide them. + */ +#ifdef __REDLIB_INTERFACE_VERSION__ + +/* Let LWIP define timeval for us. */ +#define LWIP_TIMEVAL_PRIVATE 1 + +#define va_copy(d, s) __builtin_va_copy(d, s) + +#define CS_ENABLE_TO64 1 +#define to64(x) cs_to64(x) + +#define CS_ENABLE_STRDUP 1 + +#else + +#include <sys/time.h> +#define LWIP_TIMEVAL_PRIVATE 0 +#define to64(x) strtoll(x, NULL, 10) + +#endif + +#endif /* CS_PLATFORM == CS_P_NXP_LPC */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_NXP_LPC_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_nxp_kinetis.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_PLATFORM_NXP_KINETIS_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_NXP_KINETIS_H_ + +#if CS_PLATFORM == CS_P_NXP_KINETIS + +#include <ctype.h> +#include <inttypes.h> +#include <string.h> +#include <sys/time.h> + +#define SIZE_T_FMT "u" +typedef struct stat cs_stat_t; +#define to64(x) strtoll(x, NULL, 10) +#define INT64_FMT "lld" +#define INT64_X_FMT "llx" +#define __cdecl + +#define MG_LWIP 1 + +#define MG_NET_IF MG_NET_IF_LWIP_LOW_LEVEL + +/* struct timeval is defined in sys/time.h. */ +#define LWIP_TIMEVAL_PRIVATE 0 + +#endif /* CS_PLATFORM == CS_P_NXP_KINETIS */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_NXP_KINETIS_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_pic32.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_PLATFORM_PIC32_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_PIC32_H_ + +#if CS_PLATFORM == CS_P_PIC32 + +#define MG_NET_IF MG_NET_IF_PIC32 + +#include <stdint.h> +#include <time.h> +#include <ctype.h> +#include <stdlib.h> + +#include <system_config.h> +#include <system_definitions.h> + +#include <sys/types.h> + +typedef TCP_SOCKET sock_t; +#define to64(x) strtoll(x, NULL, 10) + +#define SIZE_T_FMT "lu" +#define INT64_FMT "lld" + +#ifndef CS_ENABLE_STDIO +#define CS_ENABLE_STDIO 1 +#endif + +char *inet_ntoa(struct in_addr in); + +#endif /* CS_PLATFORM == CS_P_PIC32 */ + +#endif /* CS_COMMON_PLATFORMS_PLATFORM_PIC32_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/platform_stm32.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_PLATFORM_STM32_H_ +#define CS_COMMON_PLATFORMS_PLATFORM_STM32_H_ +#if CS_PLATFORM == CS_P_STM32 + +#include <sys/types.h> +#include <sys/stat.h> +#include <stdint.h> +#include <inttypes.h> +#include <stdio.h> +#include <ctype.h> +#include <errno.h> +#include <memory.h> +#include <fcntl.h> +#include <stm32_sdk_hal.h> + +#define to64(x) strtoll(x, NULL, 10) +#define INT64_FMT PRId64 +#define SIZE_T_FMT "u" +typedef struct stat cs_stat_t; +#define DIRSEP '/' + +#ifndef CS_ENABLE_STDIO +#define CS_ENABLE_STDIO 1 +#endif + +#ifndef MG_ENABLE_FILESYSTEM +#define MG_ENABLE_FILESYSTEM 1 +#endif + +#define CS_DEFINE_DIRENT + +#endif /* CS_PLATFORM == CS_P_STM32 */ +#endif /* CS_COMMON_PLATFORMS_PLATFORM_STM32_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/platforms/lwip/mg_lwip.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_PLATFORMS_LWIP_MG_LWIP_H_ +#define CS_COMMON_PLATFORMS_LWIP_MG_LWIP_H_ + +#ifndef MG_LWIP +#define MG_LWIP 0 +#endif + +#if MG_LWIP + +/* + * When compiling for nRF5x chips with arm-none-eabi-gcc, it has BYTE_ORDER + * already defined, so in order to avoid warnings in lwip, we have to undefine + * it. + * + * TODO: Check if in the future versions of nRF5 SDK that changes. + * Current version of nRF51 SDK: 0.8.0 + * nRF5 SDK: 0.9.0 + */ +#if CS_PLATFORM == CS_P_NRF51 || CS_PLATFORM == CS_P_NRF52 +#undef BYTE_ORDER +#endif + +#include <lwip/opt.h> +#include <lwip/err.h> +#include <lwip/ip_addr.h> +#include <lwip/inet.h> +#include <lwip/netdb.h> +#include <lwip/dns.h> + +#ifndef LWIP_PROVIDE_ERRNO +#include <errno.h> +#endif + +#if LWIP_SOCKET +#include <lwip/sockets.h> +#else +/* We really need the definitions from sockets.h. */ +#undef LWIP_SOCKET +#define LWIP_SOCKET 1 +#include <lwip/sockets.h> +#undef LWIP_SOCKET +#define LWIP_SOCKET 0 +#endif + +#define INVALID_SOCKET (-1) +#define SOMAXCONN 10 +typedef int sock_t; + +#if MG_NET_IF == MG_NET_IF_LWIP_LOW_LEVEL +struct mg_mgr; +struct mg_connection; +uint32_t mg_lwip_get_poll_delay_ms(struct mg_mgr *mgr); +void mg_lwip_set_keepalive_params(struct mg_connection *nc, int idle, + int interval, int count); +#endif + +/* For older version of LWIP */ +#ifndef ipX_2_ip +#define ipX_2_ip(x) (x) +#endif + +#endif /* MG_LWIP */ + +#endif /* CS_COMMON_PLATFORMS_LWIP_MG_LWIP_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/cs_md5.h" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_MD5_H_ +#define CS_COMMON_MD5_H_ + +/* Amalgamated: #include "common/platform.h" */ + +#ifndef CS_DISABLE_MD5 +#define CS_DISABLE_MD5 0 +#endif + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +typedef struct { + uint32_t buf[4]; + uint32_t bits[2]; + unsigned char in[64]; +} cs_md5_ctx; + +void cs_md5_init(cs_md5_ctx *c); +void cs_md5_update(cs_md5_ctx *c, const unsigned char *data, size_t len); +void cs_md5_final(unsigned char *md, cs_md5_ctx *c); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* CS_COMMON_MD5_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/cs_sha1.h" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_SHA1_H_ +#define CS_COMMON_SHA1_H_ + +#ifndef CS_DISABLE_SHA1 +#define CS_DISABLE_SHA1 0 +#endif + +#if !CS_DISABLE_SHA1 + +/* Amalgamated: #include "common/platform.h" */ + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +typedef struct { + uint32_t state[5]; + uint32_t count[2]; + unsigned char buffer[64]; +} cs_sha1_ctx; + +void cs_sha1_init(cs_sha1_ctx *); +void cs_sha1_update(cs_sha1_ctx *, const unsigned char *data, uint32_t len); +void cs_sha1_final(unsigned char digest[20], cs_sha1_ctx *); +void cs_hmac_sha1(const unsigned char *key, size_t key_len, + const unsigned char *text, size_t text_len, + unsigned char out[20]); +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* CS_DISABLE_SHA1 */ + +#endif /* CS_COMMON_SHA1_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/cs_time.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_CS_TIME_H_ +#define CS_COMMON_CS_TIME_H_ + +#include <time.h> + +/* Amalgamated: #include "common/platform.h" */ + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +/* Sub-second granularity time(). */ +double cs_time(void); + +/* + * Similar to (non-standard) timegm, converts broken-down time into the number + * of seconds since Unix Epoch. + */ +double cs_timegm(const struct tm *tm); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* CS_COMMON_CS_TIME_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/mg_str.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_MG_STR_H_ +#define CS_COMMON_MG_STR_H_ + +#include <stddef.h> + +/* Amalgamated: #include "common/platform.h" */ + +#ifdef __cplusplus +extern "C" { +#endif + +/* Describes chunk of memory */ +struct mg_str { + const char *p; /* Memory chunk pointer */ + size_t len; /* Memory chunk length */ +}; + +/* + * Helper functions for creating mg_str struct from plain C string. + * `NULL` is allowed and becomes `{NULL, 0}`. + */ +struct mg_str mg_mk_str(const char *s); +struct mg_str mg_mk_str_n(const char *s, size_t len); + +/* Macro for initializing mg_str. */ +#define MG_MK_STR(str_literal) \ + { str_literal, sizeof(str_literal) - 1 } +#define MG_NULL_STR \ + { NULL, 0 } + +/* + * Cross-platform version of `strcmp()` where where first string is + * specified by `struct mg_str`. + */ +int mg_vcmp(const struct mg_str *str2, const char *str1); + +/* + * Cross-platform version of `strncasecmp()` where first string is + * specified by `struct mg_str`. + */ +int mg_vcasecmp(const struct mg_str *str2, const char *str1); + +/* Creates a copy of s (heap-allocated). */ +struct mg_str mg_strdup(const struct mg_str s); + +/* + * Creates a copy of s (heap-allocated). + * Resulting string is NUL-terminated (but NUL is not included in len). + */ +struct mg_str mg_strdup_nul(const struct mg_str s); + +/* + * Locates character in a string. + */ +const char *mg_strchr(const struct mg_str s, int c); + +int mg_strcmp(const struct mg_str str1, const struct mg_str str2); +int mg_strncmp(const struct mg_str str1, const struct mg_str str2, size_t n); + +const char *mg_strstr(const struct mg_str haystack, const struct mg_str needle); + +#ifdef __cplusplus +} +#endif + +#endif /* CS_COMMON_MG_STR_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/mbuf.h" +#endif +/* + * Copyright (c) 2015 Cesanta Software Limited + * All rights reserved + */ + +/* + * === Memory Buffers + * + * Mbufs are mutable/growing memory buffers, like C++ strings. + * Mbuf can append data to the end of a buffer or insert data into arbitrary + * position in the middle of a buffer. The buffer grows automatically when + * needed. + */ + +#ifndef CS_COMMON_MBUF_H_ +#define CS_COMMON_MBUF_H_ + +#include <stdlib.h> +/* Amalgamated: #include "common/platform.h" */ + +#if defined(__cplusplus) +extern "C" { +#endif + +#ifndef MBUF_SIZE_MULTIPLIER +#define MBUF_SIZE_MULTIPLIER 1.5 +#endif + +/* Memory buffer descriptor */ +struct mbuf { + char *buf; /* Buffer pointer */ + size_t len; /* Data length. Data is located between offset 0 and len. */ + size_t size; /* Buffer size allocated by realloc(1). Must be >= len */ +}; + +/* + * Initialises an Mbuf. + * `initial_capacity` specifies the initial capacity of the mbuf. + */ +void mbuf_init(struct mbuf *, size_t initial_capacity); + +/* Frees the space allocated for the mbuffer and resets the mbuf structure. */ +void mbuf_free(struct mbuf *); + +/* + * Appends data to the Mbuf. + * + * Returns the number of bytes appended or 0 if out of memory. + */ +size_t mbuf_append(struct mbuf *, const void *data, size_t data_size); + +/* + * Inserts data at a specified offset in the Mbuf. + * + * Existing data will be shifted forwards and the buffer will + * be grown if necessary. + * Returns the number of bytes inserted. + */ +size_t mbuf_insert(struct mbuf *, size_t, const void *, size_t); + +/* Removes `data_size` bytes from the beginning of the buffer. */ +void mbuf_remove(struct mbuf *, size_t data_size); + +/* + * Resizes an Mbuf. + * + * If `new_size` is smaller than buffer's `len`, the + * resize is not performed. + */ +void mbuf_resize(struct mbuf *, size_t new_size); + +/* Shrinks an Mbuf by resizing its `size` to `len`. */ +void mbuf_trim(struct mbuf *); + +#if defined(__cplusplus) +} +#endif /* __cplusplus */ + +#endif /* CS_COMMON_MBUF_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/base64.h" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_BASE64_H_ +#define CS_COMMON_BASE64_H_ + +#ifndef DISABLE_BASE64 +#define DISABLE_BASE64 0 +#endif + +#if !DISABLE_BASE64 + +#include <stdio.h> + +#ifdef __cplusplus +extern "C" { +#endif + +typedef void (*cs_base64_putc_t)(char, void *); + +struct cs_base64_ctx { + /* cannot call it putc because it's a macro on some environments */ + cs_base64_putc_t b64_putc; + unsigned char chunk[3]; + int chunk_size; + void *user_data; +}; + +void cs_base64_init(struct cs_base64_ctx *ctx, cs_base64_putc_t putc, + void *user_data); +void cs_base64_update(struct cs_base64_ctx *ctx, const char *str, size_t len); +void cs_base64_finish(struct cs_base64_ctx *ctx); + +void cs_base64_encode(const unsigned char *src, int src_len, char *dst); +void cs_fprint_base64(FILE *f, const unsigned char *src, int src_len); +int cs_base64_decode(const unsigned char *s, int len, char *dst, int *dec_len); + +#ifdef __cplusplus +} +#endif + +#endif /* DISABLE_BASE64 */ + +#endif /* CS_COMMON_BASE64_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/str_util.h" +#endif +/* + * Copyright (c) 2015 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_COMMON_STR_UTIL_H_ +#define CS_COMMON_STR_UTIL_H_ + +#include <stdarg.h> +#include <stdlib.h> + +/* Amalgamated: #include "common/platform.h" */ +/* Amalgamated: #include "common/mg_str.h" */ + +#ifndef CS_ENABLE_STRDUP +#define CS_ENABLE_STRDUP 0 +#endif + +#ifndef CS_ENABLE_TO64 +#define CS_ENABLE_TO64 0 +#endif + +/* + * Expands to a string representation of its argument: e.g. + * `CS_STRINGIFY_LIT(5) expands to "5"` + */ +#define CS_STRINGIFY_LIT(x) #x + +/* + * Expands to a string representation of its argument, which is allowed + * to be a macro: e.g. + * + * #define FOO 123 + * CS_STRINGIFY_MACRO(FOO) + * + * expands to 123. + */ +#define CS_STRINGIFY_MACRO(x) CS_STRINGIFY_LIT(x) + +#ifdef __cplusplus +extern "C" { +#endif + +size_t c_strnlen(const char *s, size_t maxlen); +int c_snprintf(char *buf, size_t buf_size, const char *format, ...); +int c_vsnprintf(char *buf, size_t buf_size, const char *format, va_list ap); +/* + * Find the first occurrence of find in s, where the search is limited to the + * first slen characters of s. + */ +const char *c_strnstr(const char *s, const char *find, size_t slen); + +/* + * Stringify binary data. Output buffer size must be 2 * size_of_input + 1 + * because each byte of input takes 2 bytes in string representation + * plus 1 byte for the terminating \0 character. + */ +void cs_to_hex(char *to, const unsigned char *p, size_t len); + +/* + * Convert stringified binary data back to binary. + * Does the reverse of `cs_to_hex()`. + */ +void cs_from_hex(char *to, const char *p, size_t len); + +#if CS_ENABLE_STRDUP +char *strdup(const char *src); +#endif + +#if CS_ENABLE_TO64 +#include <stdint.h> +/* + * Simple string -> int64 conversion routine. + */ +int64_t cs_to64(const char *s); +#endif + +/* + * Cross-platform version of `strncasecmp()`. + */ +int mg_ncasecmp(const char *s1, const char *s2, size_t len); + +/* + * Cross-platform version of `strcasecmp()`. + */ +int mg_casecmp(const char *s1, const char *s2); + +/* + * Prints message to the buffer. If the buffer is large enough to hold the + * message, it returns buffer. If buffer is to small, it allocates a large + * enough buffer on heap and returns allocated buffer. + * This is a supposed use case: + * + * char buf[5], *p = buf; + * mg_avprintf(&p, sizeof(buf), "%s", "hi there"); + * use_p_somehow(p); + * if (p != buf) { + * free(p); + * } + * + * The purpose of this is to avoid malloc-ing if generated strings are small. + */ +int mg_asprintf(char **buf, size_t size, const char *fmt, ...); + +/* Same as mg_asprintf, but takes varargs list. */ +int mg_avprintf(char **buf, size_t size, const char *fmt, va_list ap); + +/* + * A helper function for traversing a comma separated list of values. + * It returns a list pointer shifted to the next value or NULL if the end + * of the list found. + * The value is stored in a val vector. If the value has a form "x=y", then + * eq_val vector is initialised to point to the "y" part, and val vector length + * is adjusted to point only to "x". + * If the list is just a comma separated list of entries, like "aa,bb,cc" then + * `eq_val` will contain zero-length string. + * + * The purpose of this function is to parse comma separated string without + * any copying/memory allocation. + */ +const char *mg_next_comma_list_entry(const char *list, struct mg_str *val, + struct mg_str *eq_val); +struct mg_str mg_next_comma_list_entry_n(struct mg_str list, struct mg_str *val, + struct mg_str *eq_val); + +/* + * Matches 0-terminated string (mg_match_prefix) or string with given length + * mg_match_prefix_n against a glob pattern. + * + * Match is case-insensitive. Returns number of bytes matched, or -1 if no + * match. + */ +int mg_match_prefix(const char *pattern, int pattern_len, const char *str); +int mg_match_prefix_n(const struct mg_str pattern, const struct mg_str str); + +#ifdef __cplusplus +} +#endif + +#endif /* CS_COMMON_STR_UTIL_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "common/queue.h" +#endif +/* clang-format off */ +/*- + * Copyright (c) 1991, 1993 + * The Regents of the University of California. All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * 4. Neither the name of the University nor the names of its contributors + * may be used to endorse or promote products derived from this software + * without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + * + * @(#)queue.h 8.5 (Berkeley) 8/20/94 + * $FreeBSD$ + */ + +#ifndef _SYS_QUEUE_H_ +#define _SYS_QUEUE_H_ + +/* + * This file defines four types of data structures: singly-linked lists, + * singly-linked tail queues, lists and tail queues. + * + * A singly-linked list is headed by a single forward pointer. The elements + * are singly linked for minimum space and pointer manipulation overhead at + * the expense of O(n) removal for arbitrary elements. New elements can be + * added to the list after an existing element or at the head of the list. + * Elements being removed from the head of the list should use the explicit + * macro for this purpose for optimum efficiency. A singly-linked list may + * only be traversed in the forward direction. Singly-linked lists are ideal + * for applications with large datasets and few or no removals or for + * implementing a LIFO queue. + * + * A singly-linked tail queue is headed by a pair of pointers, one to the + * head of the list and the other to the tail of the list. The elements are + * singly linked for minimum space and pointer manipulation overhead at the + * expense of O(n) removal for arbitrary elements. New elements can be added + * to the list after an existing element, at the head of the list, or at the + * end of the list. Elements being removed from the head of the tail queue + * should use the explicit macro for this purpose for optimum efficiency. + * A singly-linked tail queue may only be traversed in the forward direction. + * Singly-linked tail queues are ideal for applications with large datasets + * and few or no removals or for implementing a FIFO queue. + * + * A list is headed by a single forward pointer (or an array of forward + * pointers for a hash table header). The elements are doubly linked + * so that an arbitrary element can be removed without a need to + * traverse the list. New elements can be added to the list before + * or after an existing element or at the head of the list. A list + * may be traversed in either direction. + * + * A tail queue is headed by a pair of pointers, one to the head of the + * list and the other to the tail of the list. The elements are doubly + * linked so that an arbitrary element can be removed without a need to + * traverse the list. New elements can be added to the list before or + * after an existing element, at the head of the list, or at the end of + * the list. A tail queue may be traversed in either direction. + * + * For details on the use of these macros, see the queue(3) manual page. + * + * + * SLIST LIST STAILQ TAILQ + * _HEAD + + + + + * _CLASS_HEAD + + + + + * _HEAD_INITIALIZER + + + + + * _ENTRY + + + + + * _CLASS_ENTRY + + + + + * _INIT + + + + + * _EMPTY + + + + + * _FIRST + + + + + * _NEXT + + + + + * _PREV - + - + + * _LAST - - + + + * _FOREACH + + + + + * _FOREACH_FROM + + + + + * _FOREACH_SAFE + + + + + * _FOREACH_FROM_SAFE + + + + + * _FOREACH_REVERSE - - - + + * _FOREACH_REVERSE_FROM - - - + + * _FOREACH_REVERSE_SAFE - - - + + * _FOREACH_REVERSE_FROM_SAFE - - - + + * _INSERT_HEAD + + + + + * _INSERT_BEFORE - + - + + * _INSERT_AFTER + + + + + * _INSERT_TAIL - - + + + * _CONCAT - - + + + * _REMOVE_AFTER + - + - + * _REMOVE_HEAD + - + - + * _REMOVE + + + + + * _SWAP + + + + + * + */ +#ifdef QUEUE_MACRO_DEBUG +/* Store the last 2 places the queue element or head was altered */ +struct qm_trace { + unsigned long lastline; + unsigned long prevline; + const char *lastfile; + const char *prevfile; +}; + +#define TRACEBUF struct qm_trace trace; +#define TRACEBUF_INITIALIZER { __LINE__, 0, __FILE__, NULL } , +#define TRASHIT(x) do {(x) = (void *)-1;} while (0) +#define QMD_SAVELINK(name, link) void **name = (void *)&(link) + +#define QMD_TRACE_HEAD(head) do { \ + (head)->trace.prevline = (head)->trace.lastline; \ + (head)->trace.prevfile = (head)->trace.lastfile; \ + (head)->trace.lastline = __LINE__; \ + (head)->trace.lastfile = __FILE__; \ +} while (0) + +#define QMD_TRACE_ELEM(elem) do { \ + (elem)->trace.prevline = (elem)->trace.lastline; \ + (elem)->trace.prevfile = (elem)->trace.lastfile; \ + (elem)->trace.lastline = __LINE__; \ + (elem)->trace.lastfile = __FILE__; \ +} while (0) + +#else +#define QMD_TRACE_ELEM(elem) +#define QMD_TRACE_HEAD(head) +#define QMD_SAVELINK(name, link) +#define TRACEBUF +#define TRACEBUF_INITIALIZER +#define TRASHIT(x) +#endif /* QUEUE_MACRO_DEBUG */ + +#ifdef __cplusplus +/* + * In C++ there can be structure lists and class lists: + */ +#define QUEUE_TYPEOF(type) type +#else +#define QUEUE_TYPEOF(type) struct type +#endif + +/* + * Singly-linked List declarations. + */ +#define SLIST_HEAD(name, type) \ +struct name { \ + struct type *slh_first; /* first element */ \ +} + +#define SLIST_CLASS_HEAD(name, type) \ +struct name { \ + class type *slh_first; /* first element */ \ +} + +#define SLIST_HEAD_INITIALIZER(head) \ + { NULL } + +#define SLIST_ENTRY(type) \ +struct { \ + struct type *sle_next; /* next element */ \ +} + +#define SLIST_CLASS_ENTRY(type) \ +struct { \ + class type *sle_next; /* next element */ \ +} + +/* + * Singly-linked List functions. + */ +#define SLIST_EMPTY(head) ((head)->slh_first == NULL) + +#define SLIST_FIRST(head) ((head)->slh_first) + +#define SLIST_FOREACH(var, head, field) \ + for ((var) = SLIST_FIRST((head)); \ + (var); \ + (var) = SLIST_NEXT((var), field)) + +#define SLIST_FOREACH_FROM(var, head, field) \ + for ((var) = ((var) ? (var) : SLIST_FIRST((head))); \ + (var); \ + (var) = SLIST_NEXT((var), field)) + +#define SLIST_FOREACH_SAFE(var, head, field, tvar) \ + for ((var) = SLIST_FIRST((head)); \ + (var) && ((tvar) = SLIST_NEXT((var), field), 1); \ + (var) = (tvar)) + +#define SLIST_FOREACH_FROM_SAFE(var, head, field, tvar) \ + for ((var) = ((var) ? (var) : SLIST_FIRST((head))); \ + (var) && ((tvar) = SLIST_NEXT((var), field), 1); \ + (var) = (tvar)) + +#define SLIST_FOREACH_PREVPTR(var, varp, head, field) \ + for ((varp) = &SLIST_FIRST((head)); \ + ((var) = *(varp)) != NULL; \ + (varp) = &SLIST_NEXT((var), field)) + +#define SLIST_INIT(head) do { \ + SLIST_FIRST((head)) = NULL; \ +} while (0) + +#define SLIST_INSERT_AFTER(slistelm, elm, field) do { \ + SLIST_NEXT((elm), field) = SLIST_NEXT((slistelm), field); \ + SLIST_NEXT((slistelm), field) = (elm); \ +} while (0) + +#define SLIST_INSERT_HEAD(head, elm, field) do { \ + SLIST_NEXT((elm), field) = SLIST_FIRST((head)); \ + SLIST_FIRST((head)) = (elm); \ +} while (0) + +#define SLIST_NEXT(elm, field) ((elm)->field.sle_next) + +#define SLIST_REMOVE(head, elm, type, field) do { \ + QMD_SAVELINK(oldnext, (elm)->field.sle_next); \ + if (SLIST_FIRST((head)) == (elm)) { \ + SLIST_REMOVE_HEAD((head), field); \ + } \ + else { \ + QUEUE_TYPEOF(type) *curelm = SLIST_FIRST(head); \ + while (SLIST_NEXT(curelm, field) != (elm)) \ + curelm = SLIST_NEXT(curelm, field); \ + SLIST_REMOVE_AFTER(curelm, field); \ + } \ + TRASHIT(*oldnext); \ +} while (0) + +#define SLIST_REMOVE_AFTER(elm, field) do { \ + SLIST_NEXT(elm, field) = \ + SLIST_NEXT(SLIST_NEXT(elm, field), field); \ +} while (0) + +#define SLIST_REMOVE_HEAD(head, field) do { \ + SLIST_FIRST((head)) = SLIST_NEXT(SLIST_FIRST((head)), field); \ +} while (0) + +#define SLIST_SWAP(head1, head2, type) do { \ + QUEUE_TYPEOF(type) *swap_first = SLIST_FIRST(head1); \ + SLIST_FIRST(head1) = SLIST_FIRST(head2); \ + SLIST_FIRST(head2) = swap_first; \ +} while (0) + +/* + * Singly-linked Tail queue declarations. + */ +#define STAILQ_HEAD(name, type) \ +struct name { \ + struct type *stqh_first;/* first element */ \ + struct type **stqh_last;/* addr of last next element */ \ +} + +#define STAILQ_CLASS_HEAD(name, type) \ +struct name { \ + class type *stqh_first; /* first element */ \ + class type **stqh_last; /* addr of last next element */ \ +} + +#define STAILQ_HEAD_INITIALIZER(head) \ + { NULL, &(head).stqh_first } + +#define STAILQ_ENTRY(type) \ +struct { \ + struct type *stqe_next; /* next element */ \ +} + +#define STAILQ_CLASS_ENTRY(type) \ +struct { \ + class type *stqe_next; /* next element */ \ +} + +/* + * Singly-linked Tail queue functions. + */ +#define STAILQ_CONCAT(head1, head2) do { \ + if (!STAILQ_EMPTY((head2))) { \ + *(head1)->stqh_last = (head2)->stqh_first; \ + (head1)->stqh_last = (head2)->stqh_last; \ + STAILQ_INIT((head2)); \ + } \ +} while (0) + +#define STAILQ_EMPTY(head) ((head)->stqh_first == NULL) + +#define STAILQ_FIRST(head) ((head)->stqh_first) + +#define STAILQ_FOREACH(var, head, field) \ + for((var) = STAILQ_FIRST((head)); \ + (var); \ + (var) = STAILQ_NEXT((var), field)) + +#define STAILQ_FOREACH_FROM(var, head, field) \ + for ((var) = ((var) ? (var) : STAILQ_FIRST((head))); \ + (var); \ + (var) = STAILQ_NEXT((var), field)) + +#define STAILQ_FOREACH_SAFE(var, head, field, tvar) \ + for ((var) = STAILQ_FIRST((head)); \ + (var) && ((tvar) = STAILQ_NEXT((var), field), 1); \ + (var) = (tvar)) + +#define STAILQ_FOREACH_FROM_SAFE(var, head, field, tvar) \ + for ((var) = ((var) ? (var) : STAILQ_FIRST((head))); \ + (var) && ((tvar) = STAILQ_NEXT((var), field), 1); \ + (var) = (tvar)) + +#define STAILQ_INIT(head) do { \ + STAILQ_FIRST((head)) = NULL; \ + (head)->stqh_last = &STAILQ_FIRST((head)); \ +} while (0) + +#define STAILQ_INSERT_AFTER(head, tqelm, elm, field) do { \ + if ((STAILQ_NEXT((elm), field) = STAILQ_NEXT((tqelm), field)) == NULL)\ + (head)->stqh_last = &STAILQ_NEXT((elm), field); \ + STAILQ_NEXT((tqelm), field) = (elm); \ +} while (0) + +#define STAILQ_INSERT_HEAD(head, elm, field) do { \ + if ((STAILQ_NEXT((elm), field) = STAILQ_FIRST((head))) == NULL) \ + (head)->stqh_last = &STAILQ_NEXT((elm), field); \ + STAILQ_FIRST((head)) = (elm); \ +} while (0) + +#define STAILQ_INSERT_TAIL(head, elm, field) do { \ + STAILQ_NEXT((elm), field) = NULL; \ + *(head)->stqh_last = (elm); \ + (head)->stqh_last = &STAILQ_NEXT((elm), field); \ +} while (0) + +#define STAILQ_LAST(head, type, field) \ + (STAILQ_EMPTY((head)) ? NULL : \ + __containerof((head)->stqh_last, \ + QUEUE_TYPEOF(type), field.stqe_next)) + +#define STAILQ_NEXT(elm, field) ((elm)->field.stqe_next) + +#define STAILQ_REMOVE(head, elm, type, field) do { \ + QMD_SAVELINK(oldnext, (elm)->field.stqe_next); \ + if (STAILQ_FIRST((head)) == (elm)) { \ + STAILQ_REMOVE_HEAD((head), field); \ + } \ + else { \ + QUEUE_TYPEOF(type) *curelm = STAILQ_FIRST(head); \ + while (STAILQ_NEXT(curelm, field) != (elm)) \ + curelm = STAILQ_NEXT(curelm, field); \ + STAILQ_REMOVE_AFTER(head, curelm, field); \ + } \ + TRASHIT(*oldnext); \ +} while (0) + +#define STAILQ_REMOVE_AFTER(head, elm, field) do { \ + if ((STAILQ_NEXT(elm, field) = \ + STAILQ_NEXT(STAILQ_NEXT(elm, field), field)) == NULL) \ + (head)->stqh_last = &STAILQ_NEXT((elm), field); \ +} while (0) + +#define STAILQ_REMOVE_HEAD(head, field) do { \ + if ((STAILQ_FIRST((head)) = \ + STAILQ_NEXT(STAILQ_FIRST((head)), field)) == NULL) \ + (head)->stqh_last = &STAILQ_FIRST((head)); \ +} while (0) + +#define STAILQ_SWAP(head1, head2, type) do { \ + QUEUE_TYPEOF(type) *swap_first = STAILQ_FIRST(head1); \ + QUEUE_TYPEOF(type) **swap_last = (head1)->stqh_last; \ + STAILQ_FIRST(head1) = STAILQ_FIRST(head2); \ + (head1)->stqh_last = (head2)->stqh_last; \ + STAILQ_FIRST(head2) = swap_first; \ + (head2)->stqh_last = swap_last; \ + if (STAILQ_EMPTY(head1)) \ + (head1)->stqh_last = &STAILQ_FIRST(head1); \ + if (STAILQ_EMPTY(head2)) \ + (head2)->stqh_last = &STAILQ_FIRST(head2); \ +} while (0) + + +/* + * List declarations. + */ +#define LIST_HEAD(name, type) \ +struct name { \ + struct type *lh_first; /* first element */ \ +} + +#define LIST_CLASS_HEAD(name, type) \ +struct name { \ + class type *lh_first; /* first element */ \ +} + +#define LIST_HEAD_INITIALIZER(head) \ + { NULL } + +#define LIST_ENTRY(type) \ +struct { \ + struct type *le_next; /* next element */ \ + struct type **le_prev; /* address of previous next element */ \ +} + +#define LIST_CLASS_ENTRY(type) \ +struct { \ + class type *le_next; /* next element */ \ + class type **le_prev; /* address of previous next element */ \ +} + +/* + * List functions. + */ + +#if (defined(_KERNEL) && defined(INVARIANTS)) +#define QMD_LIST_CHECK_HEAD(head, field) do { \ + if (LIST_FIRST((head)) != NULL && \ + LIST_FIRST((head))->field.le_prev != \ + &LIST_FIRST((head))) \ + panic("Bad list head %p first->prev != head", (head)); \ +} while (0) + +#define QMD_LIST_CHECK_NEXT(elm, field) do { \ + if (LIST_NEXT((elm), field) != NULL && \ + LIST_NEXT((elm), field)->field.le_prev != \ + &((elm)->field.le_next)) \ + panic("Bad link elm %p next->prev != elm", (elm)); \ +} while (0) + +#define QMD_LIST_CHECK_PREV(elm, field) do { \ + if (*(elm)->field.le_prev != (elm)) \ + panic("Bad link elm %p prev->next != elm", (elm)); \ +} while (0) +#else +#define QMD_LIST_CHECK_HEAD(head, field) +#define QMD_LIST_CHECK_NEXT(elm, field) +#define QMD_LIST_CHECK_PREV(elm, field) +#endif /* (_KERNEL && INVARIANTS) */ + +#define LIST_EMPTY(head) ((head)->lh_first == NULL) + +#define LIST_FIRST(head) ((head)->lh_first) + +#define LIST_FOREACH(var, head, field) \ + for ((var) = LIST_FIRST((head)); \ + (var); \ + (var) = LIST_NEXT((var), field)) + +#define LIST_FOREACH_FROM(var, head, field) \ + for ((var) = ((var) ? (var) : LIST_FIRST((head))); \ + (var); \ + (var) = LIST_NEXT((var), field)) + +#define LIST_FOREACH_SAFE(var, head, field, tvar) \ + for ((var) = LIST_FIRST((head)); \ + (var) && ((tvar) = LIST_NEXT((var), field), 1); \ + (var) = (tvar)) + +#define LIST_FOREACH_FROM_SAFE(var, head, field, tvar) \ + for ((var) = ((var) ? (var) : LIST_FIRST((head))); \ + (var) && ((tvar) = LIST_NEXT((var), field), 1); \ + (var) = (tvar)) + +#define LIST_INIT(head) do { \ + LIST_FIRST((head)) = NULL; \ +} while (0) + +#define LIST_INSERT_AFTER(listelm, elm, field) do { \ + QMD_LIST_CHECK_NEXT(listelm, field); \ + if ((LIST_NEXT((elm), field) = LIST_NEXT((listelm), field)) != NULL)\ + LIST_NEXT((listelm), field)->field.le_prev = \ + &LIST_NEXT((elm), field); \ + LIST_NEXT((listelm), field) = (elm); \ + (elm)->field.le_prev = &LIST_NEXT((listelm), field); \ +} while (0) + +#define LIST_INSERT_BEFORE(listelm, elm, field) do { \ + QMD_LIST_CHECK_PREV(listelm, field); \ + (elm)->field.le_prev = (listelm)->field.le_prev; \ + LIST_NEXT((elm), field) = (listelm); \ + *(listelm)->field.le_prev = (elm); \ + (listelm)->field.le_prev = &LIST_NEXT((elm), field); \ +} while (0) + +#define LIST_INSERT_HEAD(head, elm, field) do { \ + QMD_LIST_CHECK_HEAD((head), field); \ + if ((LIST_NEXT((elm), field) = LIST_FIRST((head))) != NULL) \ + LIST_FIRST((head))->field.le_prev = &LIST_NEXT((elm), field);\ + LIST_FIRST((head)) = (elm); \ + (elm)->field.le_prev = &LIST_FIRST((head)); \ +} while (0) + +#define LIST_NEXT(elm, field) ((elm)->field.le_next) + +#define LIST_PREV(elm, head, type, field) \ + ((elm)->field.le_prev == &LIST_FIRST((head)) ? NULL : \ + __containerof((elm)->field.le_prev, \ + QUEUE_TYPEOF(type), field.le_next)) + +#define LIST_REMOVE(elm, field) do { \ + QMD_SAVELINK(oldnext, (elm)->field.le_next); \ + QMD_SAVELINK(oldprev, (elm)->field.le_prev); \ + QMD_LIST_CHECK_NEXT(elm, field); \ + QMD_LIST_CHECK_PREV(elm, field); \ + if (LIST_NEXT((elm), field) != NULL) \ + LIST_NEXT((elm), field)->field.le_prev = \ + (elm)->field.le_prev; \ + *(elm)->field.le_prev = LIST_NEXT((elm), field); \ + TRASHIT(*oldnext); \ + TRASHIT(*oldprev); \ +} while (0) + +#define LIST_SWAP(head1, head2, type, field) do { \ + QUEUE_TYPEOF(type) *swap_tmp = LIST_FIRST(head1); \ + LIST_FIRST((head1)) = LIST_FIRST((head2)); \ + LIST_FIRST((head2)) = swap_tmp; \ + if ((swap_tmp = LIST_FIRST((head1))) != NULL) \ + swap_tmp->field.le_prev = &LIST_FIRST((head1)); \ + if ((swap_tmp = LIST_FIRST((head2))) != NULL) \ + swap_tmp->field.le_prev = &LIST_FIRST((head2)); \ +} while (0) + +/* + * Tail queue declarations. + */ +#define TAILQ_HEAD(name, type) \ +struct name { \ + struct type *tqh_first; /* first element */ \ + struct type **tqh_last; /* addr of last next element */ \ + TRACEBUF \ +} + +#define TAILQ_CLASS_HEAD(name, type) \ +struct name { \ + class type *tqh_first; /* first element */ \ + class type **tqh_last; /* addr of last next element */ \ + TRACEBUF \ +} + +#define TAILQ_HEAD_INITIALIZER(head) \ + { NULL, &(head).tqh_first, TRACEBUF_INITIALIZER } + +#define TAILQ_ENTRY(type) \ +struct { \ + struct type *tqe_next; /* next element */ \ + struct type **tqe_prev; /* address of previous next element */ \ + TRACEBUF \ +} + +#define TAILQ_CLASS_ENTRY(type) \ +struct { \ + class type *tqe_next; /* next element */ \ + class type **tqe_prev; /* address of previous next element */ \ + TRACEBUF \ +} + +/* + * Tail queue functions. + */ +#if (defined(_KERNEL) && defined(INVARIANTS)) +#define QMD_TAILQ_CHECK_HEAD(head, field) do { \ + if (!TAILQ_EMPTY(head) && \ + TAILQ_FIRST((head))->field.tqe_prev != \ + &TAILQ_FIRST((head))) \ + panic("Bad tailq head %p first->prev != head", (head)); \ +} while (0) + +#define QMD_TAILQ_CHECK_TAIL(head, field) do { \ + if (*(head)->tqh_last != NULL) \ + panic("Bad tailq NEXT(%p->tqh_last) != NULL", (head)); \ +} while (0) + +#define QMD_TAILQ_CHECK_NEXT(elm, field) do { \ + if (TAILQ_NEXT((elm), field) != NULL && \ + TAILQ_NEXT((elm), field)->field.tqe_prev != \ + &((elm)->field.tqe_next)) \ + panic("Bad link elm %p next->prev != elm", (elm)); \ +} while (0) + +#define QMD_TAILQ_CHECK_PREV(elm, field) do { \ + if (*(elm)->field.tqe_prev != (elm)) \ + panic("Bad link elm %p prev->next != elm", (elm)); \ +} while (0) +#else +#define QMD_TAILQ_CHECK_HEAD(head, field) +#define QMD_TAILQ_CHECK_TAIL(head, headname) +#define QMD_TAILQ_CHECK_NEXT(elm, field) +#define QMD_TAILQ_CHECK_PREV(elm, field) +#endif /* (_KERNEL && INVARIANTS) */ + +#define TAILQ_CONCAT(head1, head2, field) do { \ + if (!TAILQ_EMPTY(head2)) { \ + *(head1)->tqh_last = (head2)->tqh_first; \ + (head2)->tqh_first->field.tqe_prev = (head1)->tqh_last; \ + (head1)->tqh_last = (head2)->tqh_last; \ + TAILQ_INIT((head2)); \ + QMD_TRACE_HEAD(head1); \ + QMD_TRACE_HEAD(head2); \ + } \ +} while (0) + +#define TAILQ_EMPTY(head) ((head)->tqh_first == NULL) + +#define TAILQ_FIRST(head) ((head)->tqh_first) + +#define TAILQ_FOREACH(var, head, field) \ + for ((var) = TAILQ_FIRST((head)); \ + (var); \ + (var) = TAILQ_NEXT((var), field)) + +#define TAILQ_FOREACH_FROM(var, head, field) \ + for ((var) = ((var) ? (var) : TAILQ_FIRST((head))); \ + (var); \ + (var) = TAILQ_NEXT((var), field)) + +#define TAILQ_FOREACH_SAFE(var, head, field, tvar) \ + for ((var) = TAILQ_FIRST((head)); \ + (var) && ((tvar) = TAILQ_NEXT((var), field), 1); \ + (var) = (tvar)) + +#define TAILQ_FOREACH_FROM_SAFE(var, head, field, tvar) \ + for ((var) = ((var) ? (var) : TAILQ_FIRST((head))); \ + (var) && ((tvar) = TAILQ_NEXT((var), field), 1); \ + (var) = (tvar)) + +#define TAILQ_FOREACH_REVERSE(var, head, headname, field) \ + for ((var) = TAILQ_LAST((head), headname); \ + (var); \ + (var) = TAILQ_PREV((var), headname, field)) + +#define TAILQ_FOREACH_REVERSE_FROM(var, head, headname, field) \ + for ((var) = ((var) ? (var) : TAILQ_LAST((head), headname)); \ + (var); \ + (var) = TAILQ_PREV((var), headname, field)) + +#define TAILQ_FOREACH_REVERSE_SAFE(var, head, headname, field, tvar) \ + for ((var) = TAILQ_LAST((head), headname); \ + (var) && ((tvar) = TAILQ_PREV((var), headname, field), 1); \ + (var) = (tvar)) + +#define TAILQ_FOREACH_REVERSE_FROM_SAFE(var, head, headname, field, tvar) \ + for ((var) = ((var) ? (var) : TAILQ_LAST((head), headname)); \ + (var) && ((tvar) = TAILQ_PREV((var), headname, field), 1); \ + (var) = (tvar)) + +#define TAILQ_INIT(head) do { \ + TAILQ_FIRST((head)) = NULL; \ + (head)->tqh_last = &TAILQ_FIRST((head)); \ + QMD_TRACE_HEAD(head); \ +} while (0) + +#define TAILQ_INSERT_AFTER(head, listelm, elm, field) do { \ + QMD_TAILQ_CHECK_NEXT(listelm, field); \ + if ((TAILQ_NEXT((elm), field) = TAILQ_NEXT((listelm), field)) != NULL)\ + TAILQ_NEXT((elm), field)->field.tqe_prev = \ + &TAILQ_NEXT((elm), field); \ + else { \ + (head)->tqh_last = &TAILQ_NEXT((elm), field); \ + QMD_TRACE_HEAD(head); \ + } \ + TAILQ_NEXT((listelm), field) = (elm); \ + (elm)->field.tqe_prev = &TAILQ_NEXT((listelm), field); \ + QMD_TRACE_ELEM(&(elm)->field); \ + QMD_TRACE_ELEM(&(listelm)->field); \ +} while (0) + +#define TAILQ_INSERT_BEFORE(listelm, elm, field) do { \ + QMD_TAILQ_CHECK_PREV(listelm, field); \ + (elm)->field.tqe_prev = (listelm)->field.tqe_prev; \ + TAILQ_NEXT((elm), field) = (listelm); \ + *(listelm)->field.tqe_prev = (elm); \ + (listelm)->field.tqe_prev = &TAILQ_NEXT((elm), field); \ + QMD_TRACE_ELEM(&(elm)->field); \ + QMD_TRACE_ELEM(&(listelm)->field); \ +} while (0) + +#define TAILQ_INSERT_HEAD(head, elm, field) do { \ + QMD_TAILQ_CHECK_HEAD(head, field); \ + if ((TAILQ_NEXT((elm), field) = TAILQ_FIRST((head))) != NULL) \ + TAILQ_FIRST((head))->field.tqe_prev = \ + &TAILQ_NEXT((elm), field); \ + else \ + (head)->tqh_last = &TAILQ_NEXT((elm), field); \ + TAILQ_FIRST((head)) = (elm); \ + (elm)->field.tqe_prev = &TAILQ_FIRST((head)); \ + QMD_TRACE_HEAD(head); \ + QMD_TRACE_ELEM(&(elm)->field); \ +} while (0) + +#define TAILQ_INSERT_TAIL(head, elm, field) do { \ + QMD_TAILQ_CHECK_TAIL(head, field); \ + TAILQ_NEXT((elm), field) = NULL; \ + (elm)->field.tqe_prev = (head)->tqh_last; \ + *(head)->tqh_last = (elm); \ + (head)->tqh_last = &TAILQ_NEXT((elm), field); \ + QMD_TRACE_HEAD(head); \ + QMD_TRACE_ELEM(&(elm)->field); \ +} while (0) + +#define TAILQ_LAST(head, headname) \ + (*(((struct headname *)((head)->tqh_last))->tqh_last)) + +#define TAILQ_NEXT(elm, field) ((elm)->field.tqe_next) + +#define TAILQ_PREV(elm, headname, field) \ + (*(((struct headname *)((elm)->field.tqe_prev))->tqh_last)) + +#define TAILQ_REMOVE(head, elm, field) do { \ + QMD_SAVELINK(oldnext, (elm)->field.tqe_next); \ + QMD_SAVELINK(oldprev, (elm)->field.tqe_prev); \ + QMD_TAILQ_CHECK_NEXT(elm, field); \ + QMD_TAILQ_CHECK_PREV(elm, field); \ + if ((TAILQ_NEXT((elm), field)) != NULL) \ + TAILQ_NEXT((elm), field)->field.tqe_prev = \ + (elm)->field.tqe_prev; \ + else { \ + (head)->tqh_last = (elm)->field.tqe_prev; \ + QMD_TRACE_HEAD(head); \ + } \ + *(elm)->field.tqe_prev = TAILQ_NEXT((elm), field); \ + TRASHIT(*oldnext); \ + TRASHIT(*oldprev); \ + QMD_TRACE_ELEM(&(elm)->field); \ +} while (0) + +#define TAILQ_SWAP(head1, head2, type, field) do { \ + QUEUE_TYPEOF(type) *swap_first = (head1)->tqh_first; \ + QUEUE_TYPEOF(type) **swap_last = (head1)->tqh_last; \ + (head1)->tqh_first = (head2)->tqh_first; \ + (head1)->tqh_last = (head2)->tqh_last; \ + (head2)->tqh_first = swap_first; \ + (head2)->tqh_last = swap_last; \ + if ((swap_first = (head1)->tqh_first) != NULL) \ + swap_first->field.tqe_prev = &(head1)->tqh_first; \ + else \ + (head1)->tqh_last = &(head1)->tqh_first; \ + if ((swap_first = (head2)->tqh_first) != NULL) \ + swap_first->field.tqe_prev = &(head2)->tqh_first; \ + else \ + (head2)->tqh_last = &(head2)->tqh_first; \ +} while (0) + +#endif /* !_SYS_QUEUE_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/features.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_MONGOOSE_SRC_FEATURES_H_ +#define CS_MONGOOSE_SRC_FEATURES_H_ + +#ifndef MG_DISABLE_HTTP_DIGEST_AUTH +#define MG_DISABLE_HTTP_DIGEST_AUTH 0 +#endif + +#ifndef MG_DISABLE_HTTP_KEEP_ALIVE +#define MG_DISABLE_HTTP_KEEP_ALIVE 0 +#endif + +#ifndef MG_DISABLE_PFS +#define MG_DISABLE_PFS 0 +#endif + +#ifndef MG_DISABLE_WS_RANDOM_MASK +#define MG_DISABLE_WS_RANDOM_MASK 0 +#endif + +#ifndef MG_ENABLE_ASYNC_RESOLVER +#define MG_ENABLE_ASYNC_RESOLVER 1 +#endif + +#ifndef MG_ENABLE_BROADCAST +#define MG_ENABLE_BROADCAST 0 +#endif + +#ifndef MG_ENABLE_COAP +#define MG_ENABLE_COAP 0 +#endif + +#ifndef MG_ENABLE_DEBUG +#define MG_ENABLE_DEBUG 0 +#endif + +#ifndef MG_ENABLE_DIRECTORY_LISTING +#define MG_ENABLE_DIRECTORY_LISTING 0 +#endif + +#ifndef MG_ENABLE_DNS +#define MG_ENABLE_DNS 1 +#endif + +#ifndef MG_ENABLE_DNS_SERVER +#define MG_ENABLE_DNS_SERVER 0 +#endif + +#ifndef MG_ENABLE_FAKE_DAVLOCK +#define MG_ENABLE_FAKE_DAVLOCK 0 +#endif + +#ifndef MG_ENABLE_FILESYSTEM +#define MG_ENABLE_FILESYSTEM 0 +#endif + +#ifndef MG_ENABLE_GETADDRINFO +#define MG_ENABLE_GETADDRINFO 0 +#endif + +#ifndef MG_ENABLE_HEXDUMP +#define MG_ENABLE_HEXDUMP CS_ENABLE_STDIO +#endif + +#ifndef MG_ENABLE_HTTP +#define MG_ENABLE_HTTP 1 +#endif + +#ifndef MG_ENABLE_HTTP_CGI +#define MG_ENABLE_HTTP_CGI 0 +#endif + +#ifndef MG_ENABLE_HTTP_SSI +#define MG_ENABLE_HTTP_SSI MG_ENABLE_FILESYSTEM +#endif + +#ifndef MG_ENABLE_HTTP_SSI_EXEC +#define MG_ENABLE_HTTP_SSI_EXEC 0 +#endif + +#ifndef MG_ENABLE_HTTP_STREAMING_MULTIPART +#define MG_ENABLE_HTTP_STREAMING_MULTIPART 0 +#endif + +#ifndef MG_ENABLE_HTTP_WEBDAV +#define MG_ENABLE_HTTP_WEBDAV 0 +#endif + +#ifndef MG_ENABLE_HTTP_WEBSOCKET +#define MG_ENABLE_HTTP_WEBSOCKET MG_ENABLE_HTTP +#endif + +#ifndef MG_ENABLE_IPV6 +#define MG_ENABLE_IPV6 0 +#endif + +#ifndef MG_ENABLE_MQTT +#define MG_ENABLE_MQTT 1 +#endif + +#ifndef MG_ENABLE_SOCKS +#define MG_ENABLE_SOCKS 0 +#endif + +#ifndef MG_ENABLE_MQTT_BROKER +#define MG_ENABLE_MQTT_BROKER 0 +#endif + +#ifndef MG_ENABLE_SSL +#define MG_ENABLE_SSL 0 +#endif + +#ifndef MG_ENABLE_SYNC_RESOLVER +#define MG_ENABLE_SYNC_RESOLVER 0 +#endif + +#ifndef MG_ENABLE_STDIO +#define MG_ENABLE_STDIO CS_ENABLE_STDIO +#endif + +#ifndef MG_NET_IF +#define MG_NET_IF MG_NET_IF_SOCKET +#endif + +#ifndef MG_SSL_IF +#define MG_SSL_IF MG_SSL_IF_OPENSSL +#endif + +#ifndef MG_ENABLE_THREADS /* ifdef-ok */ +#ifdef _WIN32 +#define MG_ENABLE_THREADS 1 +#else +#define MG_ENABLE_THREADS 0 +#endif +#endif + +#if MG_ENABLE_DEBUG && !defined(CS_ENABLE_DEBUG) +#define CS_ENABLE_DEBUG 1 +#endif + +/* MQTT broker requires MQTT */ +#if MG_ENABLE_MQTT_BROKER && !MG_ENABLE_MQTT +#undef MG_ENABLE_MQTT +#define MG_ENABLE_MQTT 1 +#endif + +#ifndef MG_ENABLE_HTTP_URL_REWRITES +#define MG_ENABLE_HTTP_URL_REWRITES \ + (CS_PLATFORM == CS_P_WINDOWS || CS_PLATFORM == CS_P_UNIX) +#endif + +#ifndef MG_ENABLE_TUN +#define MG_ENABLE_TUN MG_ENABLE_HTTP_WEBSOCKET +#endif + +#ifndef MG_ENABLE_SNTP +#define MG_ENABLE_SNTP 0 +#endif + +#ifndef MG_ENABLE_EXTRA_ERRORS_DESC +#define MG_ENABLE_EXTRA_ERRORS_DESC 0 +#endif + +#ifndef MG_ENABLE_CALLBACK_USERDATA +#define MG_ENABLE_CALLBACK_USERDATA 0 +#endif + +#if MG_ENABLE_CALLBACK_USERDATA +#define MG_UD_ARG(ud) , ud +#define MG_CB(cb, ud) cb, ud +#else +#define MG_UD_ARG(ud) +#define MG_CB(cb, ud) cb +#endif + +#endif /* CS_MONGOOSE_SRC_FEATURES_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/net_if.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_MONGOOSE_SRC_NET_IF_H_ +#define CS_MONGOOSE_SRC_NET_IF_H_ + +/* Amalgamated: #include "common/platform.h" */ + +/* + * Internal async networking core interface. + * Consists of calls made by the core, which should not block, + * and callbacks back into the core ("..._cb"). + * Callbacks may (will) cause methods to be invoked from within, + * but methods are not allowed to invoke callbacks inline. + * + * Implementation must ensure that only one callback is invoked at any time. + */ + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +#define MG_MAIN_IFACE 0 + +struct mg_mgr; +struct mg_connection; +union socket_address; + +struct mg_iface_vtable; + +struct mg_iface { + struct mg_mgr *mgr; + void *data; /* Implementation-specific data */ + const struct mg_iface_vtable *vtable; +}; + +struct mg_iface_vtable { + void (*init)(struct mg_iface *iface); + void (*free)(struct mg_iface *iface); + void (*add_conn)(struct mg_connection *nc); + void (*remove_conn)(struct mg_connection *nc); + time_t (*poll)(struct mg_iface *iface, int timeout_ms); + + /* Set up a listening TCP socket on a given address. rv = 0 -> ok. */ + int (*listen_tcp)(struct mg_connection *nc, union socket_address *sa); + /* Request that a "listening" UDP socket be created. */ + int (*listen_udp)(struct mg_connection *nc, union socket_address *sa); + + /* Request that a TCP connection is made to the specified address. */ + void (*connect_tcp)(struct mg_connection *nc, const union socket_address *sa); + /* Open a UDP socket. Doesn't actually connect anything. */ + void (*connect_udp)(struct mg_connection *nc); + + /* Send functions for TCP and UDP. Sent data is copied before return. */ + void (*tcp_send)(struct mg_connection *nc, const void *buf, size_t len); + void (*udp_send)(struct mg_connection *nc, const void *buf, size_t len); + + void (*recved)(struct mg_connection *nc, size_t len); + + /* Perform interface-related connection initialization. Return 1 on ok. */ + int (*create_conn)(struct mg_connection *nc); + /* Perform interface-related cleanup on connection before destruction. */ + void (*destroy_conn)(struct mg_connection *nc); + + /* Associate a socket to a connection. */ + void (*sock_set)(struct mg_connection *nc, sock_t sock); + + /* Put connection's address into *sa, local (remote = 0) or remote. */ + void (*get_conn_addr)(struct mg_connection *nc, int remote, + union socket_address *sa); +}; + +extern const struct mg_iface_vtable *mg_ifaces[]; +extern int mg_num_ifaces; + +/* Creates a new interface instance. */ +struct mg_iface *mg_if_create_iface(const struct mg_iface_vtable *vtable, + struct mg_mgr *mgr); + +/* + * Find an interface with a given implementation. The search is started from + * interface `from`, exclusive. Returns NULL if none is found. + */ +struct mg_iface *mg_find_iface(struct mg_mgr *mgr, + const struct mg_iface_vtable *vtable, + struct mg_iface *from); +/* + * Deliver a new TCP connection. Returns NULL in case on error (unable to + * create connection, in which case interface state should be discarded. + * This is phase 1 of the two-phase process - MG_EV_ACCEPT will be delivered + * when mg_if_accept_tcp_cb is invoked. + */ +struct mg_connection *mg_if_accept_new_conn(struct mg_connection *lc); +void mg_if_accept_tcp_cb(struct mg_connection *nc, union socket_address *sa, + size_t sa_len); + +/* Callback invoked by connect methods. err = 0 -> ok, != 0 -> error. */ +void mg_if_connect_cb(struct mg_connection *nc, int err); +/* Callback that reports that data has been put on the wire. */ +void mg_if_sent_cb(struct mg_connection *nc, int num_sent); +/* + * Receive callback. + * if `own` is true, buf must be heap-allocated and ownership is transferred + * to the core. + * Core will acknowledge consumption by calling iface::recved. + */ +void mg_if_recv_tcp_cb(struct mg_connection *nc, void *buf, int len, int own); +/* + * Receive callback. + * buf must be heap-allocated and ownership is transferred to the core. + * Core will acknowledge consumption by calling iface::recved. + */ +void mg_if_recv_udp_cb(struct mg_connection *nc, void *buf, int len, + union socket_address *sa, size_t sa_len); + +/* void mg_if_close_conn(struct mg_connection *nc); */ + +/* Deliver a POLL event to the connection. */ +void mg_if_poll(struct mg_connection *nc, time_t now); + +/* Deliver a TIMER event to the connection. */ +void mg_if_timer(struct mg_connection *c, double now); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* CS_MONGOOSE_SRC_NET_IF_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/ssl_if.h" +#endif +/* + * Copyright (c) 2014-2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_MONGOOSE_SRC_SSL_IF_H_ +#define CS_MONGOOSE_SRC_SSL_IF_H_ + +#if MG_ENABLE_SSL + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +struct mg_ssl_if_ctx; +struct mg_connection; + +void mg_ssl_if_init(); + +enum mg_ssl_if_result { + MG_SSL_OK = 0, + MG_SSL_WANT_READ = -1, + MG_SSL_WANT_WRITE = -2, + MG_SSL_ERROR = -3, +}; + +struct mg_ssl_if_conn_params { + const char *cert; + const char *key; + const char *ca_cert; + const char *server_name; + const char *cipher_suites; + const char *psk_identity; + const char *psk_key; +}; + +enum mg_ssl_if_result mg_ssl_if_conn_init( + struct mg_connection *nc, const struct mg_ssl_if_conn_params *params, + const char **err_msg); +enum mg_ssl_if_result mg_ssl_if_conn_accept(struct mg_connection *nc, + struct mg_connection *lc); +void mg_ssl_if_conn_close_notify(struct mg_connection *nc); +void mg_ssl_if_conn_free(struct mg_connection *nc); + +enum mg_ssl_if_result mg_ssl_if_handshake(struct mg_connection *nc); +int mg_ssl_if_read(struct mg_connection *nc, void *buf, size_t buf_size); +int mg_ssl_if_write(struct mg_connection *nc, const void *data, size_t len); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* MG_ENABLE_SSL */ + +#endif /* CS_MONGOOSE_SRC_SSL_IF_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/net.h" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + * This software is dual-licensed: you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 as + * published by the Free Software Foundation. For the terms of this + * license, see <http://www.gnu.org/licenses/>. + * + * You are free to use this software under the terms of the GNU General + * Public License, but WITHOUT ANY WARRANTY; without even the implied + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. + * See the GNU General Public License for more details. + * + * Alternatively, you can license this software under a commercial + * license, as set out in <https://www.cesanta.com/license>. + */ + +/* + * === Core API: TCP/UDP/SSL + * + * NOTE: Mongoose manager is single threaded. It does not protect + * its data structures by mutexes, therefore all functions that are dealing + * with a particular event manager should be called from the same thread, + * with exception of the `mg_broadcast()` function. It is fine to have different + * event managers handled by different threads. + */ + +#ifndef CS_MONGOOSE_SRC_NET_H_ +#define CS_MONGOOSE_SRC_NET_H_ + +/* Amalgamated: #include "mongoose/src/common.h" */ +/* Amalgamated: #include "mongoose/src/net_if.h" */ +/* Amalgamated: #include "common/mbuf.h" */ + +#ifndef MG_VPRINTF_BUFFER_SIZE +#define MG_VPRINTF_BUFFER_SIZE 100 +#endif + +#ifdef MG_USE_READ_WRITE +#define MG_RECV_FUNC(s, b, l, f) read(s, b, l) +#define MG_SEND_FUNC(s, b, l, f) write(s, b, l) +#else +#define MG_RECV_FUNC(s, b, l, f) recv(s, b, l, f) +#define MG_SEND_FUNC(s, b, l, f) send(s, b, l, f) +#endif + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +union socket_address { + struct sockaddr sa; + struct sockaddr_in sin; +#if MG_ENABLE_IPV6 + struct sockaddr_in6 sin6; +#else + struct sockaddr sin6; +#endif +}; + +struct mg_connection; + +/* + * Callback function (event handler) prototype. Must be defined by the user. + * Mongoose calls the event handler, passing the events defined below. + */ +typedef void (*mg_event_handler_t)(struct mg_connection *nc, int ev, + void *ev_data MG_UD_ARG(void *user_data)); + +/* Events. Meaning of event parameter (evp) is given in the comment. */ +#define MG_EV_POLL 0 /* Sent to each connection on each mg_mgr_poll() call */ +#define MG_EV_ACCEPT 1 /* New connection accepted. union socket_address * */ +#define MG_EV_CONNECT 2 /* connect() succeeded or failed. int * */ +#define MG_EV_RECV 3 /* Data has been received. int *num_bytes */ +#define MG_EV_SEND 4 /* Data has been written to a socket. int *num_bytes */ +#define MG_EV_CLOSE 5 /* Connection is closed. NULL */ +#define MG_EV_TIMER 6 /* now >= conn->ev_timer_time. double * */ + +/* + * Mongoose event manager. + */ +struct mg_mgr { + struct mg_connection *active_connections; +#if MG_ENABLE_HEXDUMP + const char *hexdump_file; /* Debug hexdump file path */ +#endif +#if MG_ENABLE_BROADCAST + sock_t ctl[2]; /* Socketpair for mg_broadcast() */ +#endif + void *user_data; /* User data */ + int num_ifaces; + struct mg_iface **ifaces; /* network interfaces */ + const char *nameserver; /* DNS server to use */ +}; + +/* + * Mongoose connection. + */ +struct mg_connection { + struct mg_connection *next, *prev; /* mg_mgr::active_connections linkage */ + struct mg_connection *listener; /* Set only for accept()-ed connections */ + struct mg_mgr *mgr; /* Pointer to containing manager */ + + sock_t sock; /* Socket to the remote peer */ + int err; + union socket_address sa; /* Remote peer address */ + size_t recv_mbuf_limit; /* Max size of recv buffer */ + struct mbuf recv_mbuf; /* Received data */ + struct mbuf send_mbuf; /* Data scheduled for sending */ + time_t last_io_time; /* Timestamp of the last socket IO */ + double ev_timer_time; /* Timestamp of the future MG_EV_TIMER */ +#if MG_ENABLE_SSL + void *ssl_if_data; /* SSL library data. */ +#endif + mg_event_handler_t proto_handler; /* Protocol-specific event handler */ + void *proto_data; /* Protocol-specific data */ + void (*proto_data_destructor)(void *proto_data); + mg_event_handler_t handler; /* Event handler function */ + void *user_data; /* User-specific data */ + union { + void *v; + /* + * the C standard is fussy about fitting function pointers into + * void pointers, since some archs might have fat pointers for functions. + */ + mg_event_handler_t f; + } priv_1; + void *priv_2; + void *mgr_data; /* Implementation-specific event manager's data. */ + struct mg_iface *iface; + unsigned long flags; +/* Flags set by Mongoose */ +#define MG_F_LISTENING (1 << 0) /* This connection is listening */ +#define MG_F_UDP (1 << 1) /* This connection is UDP */ +#define MG_F_RESOLVING (1 << 2) /* Waiting for async resolver */ +#define MG_F_CONNECTING (1 << 3) /* connect() call in progress */ +#define MG_F_SSL (1 << 4) /* SSL is enabled on the connection */ +#define MG_F_SSL_HANDSHAKE_DONE (1 << 5) /* SSL hanshake has completed */ +#define MG_F_WANT_READ (1 << 6) /* SSL specific */ +#define MG_F_WANT_WRITE (1 << 7) /* SSL specific */ +#define MG_F_IS_WEBSOCKET (1 << 8) /* Websocket specific */ + +/* Flags that are settable by user */ +#define MG_F_SEND_AND_CLOSE (1 << 10) /* Push remaining data and close */ +#define MG_F_CLOSE_IMMEDIATELY (1 << 11) /* Disconnect */ +#define MG_F_WEBSOCKET_NO_DEFRAG (1 << 12) /* Websocket specific */ +#define MG_F_DELETE_CHUNK (1 << 13) /* HTTP specific */ +#define MG_F_ENABLE_BROADCAST (1 << 14) /* Allow broadcast address usage */ +#define MG_F_TUN_DO_NOT_RECONNECT (1 << 15) /* Don't reconnect tunnel */ + +#define MG_F_USER_1 (1 << 20) /* Flags left for application */ +#define MG_F_USER_2 (1 << 21) +#define MG_F_USER_3 (1 << 22) +#define MG_F_USER_4 (1 << 23) +#define MG_F_USER_5 (1 << 24) +#define MG_F_USER_6 (1 << 25) +}; + +/* + * Initialise Mongoose manager. Side effect: ignores SIGPIPE signal. + * `mgr->user_data` field will be initialised with a `user_data` parameter. + * That is an arbitrary pointer, where the user code can associate some data + * with the particular Mongoose manager. For example, a C++ wrapper class + * could be written in which case `user_data` can hold a pointer to the + * class instance. + */ +void mg_mgr_init(struct mg_mgr *mgr, void *user_data); + +/* + * Optional parameters to `mg_mgr_init_opt()`. + * + * If `main_iface` is not NULL, it will be used as the main interface in the + * default interface set. The pointer will be free'd by `mg_mgr_free`. + * Otherwise, the main interface will be autodetected based on the current + * platform. + * + * If `num_ifaces` is 0 and `ifaces` is NULL, the default interface set will be + * used. + * This is an advanced option, as it requires you to construct a full interface + * set, including special networking interfaces required by some optional + * features such as TCP tunneling. Memory backing `ifaces` and each of the + * `num_ifaces` pointers it contains will be reclaimed by `mg_mgr_free`. + */ +struct mg_mgr_init_opts { + const struct mg_iface_vtable *main_iface; + int num_ifaces; + const struct mg_iface_vtable **ifaces; + const char *nameserver; +}; + +/* + * Like `mg_mgr_init` but with more options. + * + * Notably, this allows you to create a manger and choose + * dynamically which networking interface implementation to use. + */ +void mg_mgr_init_opt(struct mg_mgr *mgr, void *user_data, + struct mg_mgr_init_opts opts); + +/* + * De-initialises Mongoose manager. + * + * Closes and deallocates all active connections. + */ +void mg_mgr_free(struct mg_mgr *); + +/* + * This function performs the actual IO and must be called in a loop + * (an event loop). It returns the current timestamp. + * `milli` is the maximum number of milliseconds to sleep. + * `mg_mgr_poll()` checks all connections for IO readiness. If at least one + * of the connections is IO-ready, `mg_mgr_poll()` triggers the respective + * event handlers and returns. + */ +time_t mg_mgr_poll(struct mg_mgr *, int milli); + +#if MG_ENABLE_BROADCAST +/* + * Passes a message of a given length to all connections. + * + * Must be called from a thread that does NOT call `mg_mgr_poll()`. + * Note that `mg_broadcast()` is the only function + * that can be, and must be, called from a different (non-IO) thread. + * + * `func` callback function will be called by the IO thread for each + * connection. When called, the event will be `MG_EV_POLL`, and a message will + * be passed as the `ev_data` pointer. Maximum message size is capped + * by `MG_CTL_MSG_MESSAGE_SIZE` which is set to 8192 bytes. + */ +void mg_broadcast(struct mg_mgr *mgr, mg_event_handler_t cb, void *data, + size_t len); +#endif + +/* + * Iterates over all active connections. + * + * Returns the next connection from the list + * of active connections or `NULL` if there are no more connections. Below + * is the iteration idiom: + * + * ```c + * for (c = mg_next(srv, NULL); c != NULL; c = mg_next(srv, c)) { + * // Do something with connection `c` + * } + * ``` + */ +struct mg_connection *mg_next(struct mg_mgr *mgr, struct mg_connection *c); + +/* + * Optional parameters to `mg_add_sock_opt()`. + * + * `flags` is an initial `struct mg_connection::flags` bitmask to set, + * see `MG_F_*` flags definitions. + */ +struct mg_add_sock_opts { + void *user_data; /* Initial value for connection's user_data */ + unsigned int flags; /* Initial connection flags */ + const char **error_string; /* Placeholder for the error string */ + struct mg_iface *iface; /* Interface instance */ +}; + +/* + * Creates a connection, associates it with the given socket and event handler + * and adds it to the manager. + * + * For more options see the `mg_add_sock_opt` variant. + */ +struct mg_connection *mg_add_sock(struct mg_mgr *mgr, sock_t sock, + MG_CB(mg_event_handler_t handler, + void *user_data)); + +/* + * Creates a connection, associates it with the given socket and event handler + * and adds to the manager. + * + * See the `mg_add_sock_opts` structure for a description of the options. + */ +struct mg_connection *mg_add_sock_opt(struct mg_mgr *mgr, sock_t sock, + MG_CB(mg_event_handler_t handler, + void *user_data), + struct mg_add_sock_opts opts); + +/* + * Optional parameters to `mg_bind_opt()`. + * + * `flags` is an initial `struct mg_connection::flags` bitmask to set, + * see `MG_F_*` flags definitions. + */ +struct mg_bind_opts { + void *user_data; /* Initial value for connection's user_data */ + unsigned int flags; /* Extra connection flags */ + const char **error_string; /* Placeholder for the error string */ + struct mg_iface *iface; /* Interface instance */ +#if MG_ENABLE_SSL + /* + * SSL settings. + * + * Server certificate to present to clients or client certificate to + * present to tunnel dispatcher (for tunneled connections). + */ + const char *ssl_cert; + /* Private key corresponding to the certificate. If ssl_cert is set but + * ssl_key is not, ssl_cert is used. */ + const char *ssl_key; + /* CA bundle used to verify client certificates or tunnel dispatchers. */ + const char *ssl_ca_cert; + /* Colon-delimited list of acceptable cipher suites. + * Names depend on the library used, for example: + * + * ECDH-ECDSA-AES128-GCM-SHA256:DHE-RSA-AES128-SHA256 (OpenSSL) + * TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256 + * (mbedTLS) + * + * For OpenSSL the list can be obtained by running "openssl ciphers". + * For mbedTLS, names can be found in library/ssl_ciphersuites.c + * If NULL, a reasonable default is used. + */ + const char *ssl_cipher_suites; +#endif +}; + +/* + * Creates a listening connection. + * + * See `mg_bind_opt` for full documentation. + */ +struct mg_connection *mg_bind(struct mg_mgr *mgr, const char *address, + MG_CB(mg_event_handler_t handler, + void *user_data)); +/* + * Creates a listening connection. + * + * The `address` parameter specifies which address to bind to. It's format is + * the same as for the `mg_connect()` call, where `HOST` part is optional. + * `address` can be just a port number, e.g. `:8000`. To bind to a specific + * interface, an IP address can be specified, e.g. `1.2.3.4:8000`. By default, + * a TCP connection is created. To create UDP connection, prepend `udp://` + * prefix, e.g. `udp://:8000`. To summarize, `address` parameter has following + * format: `[PROTO://][IP_ADDRESS]:PORT`, where `PROTO` could be `tcp` or + * `udp`. + * + * See the `mg_bind_opts` structure for a description of the optional + * parameters. + * + * Returns a new listening connection or `NULL` on error. + * NOTE: The connection remains owned by the manager, do not free(). + */ +struct mg_connection *mg_bind_opt(struct mg_mgr *mgr, const char *address, + MG_CB(mg_event_handler_t handler, + void *user_data), + struct mg_bind_opts opts); + +/* Optional parameters to `mg_connect_opt()` */ +struct mg_connect_opts { + void *user_data; /* Initial value for connection's user_data */ + unsigned int flags; /* Extra connection flags */ + const char **error_string; /* Placeholder for the error string */ + struct mg_iface *iface; /* Interface instance */ + const char *nameserver; /* DNS server to use, NULL for default */ +#if MG_ENABLE_SSL + /* + * SSL settings. + * Client certificate to present to the server. + */ + const char *ssl_cert; + /* + * Private key corresponding to the certificate. + * If ssl_cert is set but ssl_key is not, ssl_cert is used. + */ + const char *ssl_key; + /* + * Verify server certificate using this CA bundle. If set to "*", then SSL + * is enabled but no cert verification is performed. + */ + const char *ssl_ca_cert; + /* Colon-delimited list of acceptable cipher suites. + * Names depend on the library used, for example: + * + * ECDH-ECDSA-AES128-GCM-SHA256:DHE-RSA-AES128-SHA256 (OpenSSL) + * TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256 + * (mbedTLS) + * + * For OpenSSL the list can be obtained by running "openssl ciphers". + * For mbedTLS, names can be found in library/ssl_ciphersuites.c + * If NULL, a reasonable default is used. + */ + const char *ssl_cipher_suites; + /* + * Server name verification. If ssl_ca_cert is set and the certificate has + * passed verification, its subject will be verified against this string. + * By default (if ssl_server_name is NULL) hostname part of the address will + * be used. Wildcard matching is supported. A special value of "*" disables + * name verification. + */ + const char *ssl_server_name; + /* + * PSK identity and key. Identity is a NUL-terminated string and key is a hex + * string. Key must be either 16 or 32 bytes (32 or 64 hex digits) for AES-128 + * or AES-256 respectively. + * Note: Default list of cipher suites does not include PSK suites, if you + * want to use PSK you will need to set ssl_cipher_suites as well. + */ + const char *ssl_psk_identity; + const char *ssl_psk_key; +#endif +}; + +/* + * Connects to a remote host. + * + * See `mg_connect_opt()` for full documentation. + */ +struct mg_connection *mg_connect(struct mg_mgr *mgr, const char *address, + MG_CB(mg_event_handler_t handler, + void *user_data)); + +/* + * Connects to a remote host. + * + * The `address` format is `[PROTO://]HOST:PORT`. `PROTO` could be `tcp` or + * `udp`. `HOST` could be an IP address, + * IPv6 address (if Mongoose is compiled with `-DMG_ENABLE_IPV6`) or a host + * name. If `HOST` is a name, Mongoose will resolve it asynchronously. Examples + * of valid addresses: `google.com:80`, `udp://1.2.3.4:53`, `10.0.0.1:443`, + * `[::1]:80` + * + * See the `mg_connect_opts` structure for a description of the optional + * parameters. + * + * Returns a new outbound connection or `NULL` on error. + * + * NOTE: The connection remains owned by the manager, do not free(). + * + * NOTE: To enable IPv6 addresses `-DMG_ENABLE_IPV6` should be specified + * in the compilation flags. + * + * NOTE: The new connection will receive `MG_EV_CONNECT` as its first event + * which will report the connect success status. + * If the asynchronous resolution fails or the `connect()` syscall fails for + * whatever reason (e.g. with `ECONNREFUSED` or `ENETUNREACH`), then + * `MG_EV_CONNECT` event will report failure. Code example below: + * + * ```c + * static void ev_handler(struct mg_connection *nc, int ev, void *ev_data) { + * int connect_status; + * + * switch (ev) { + * case MG_EV_CONNECT: + * connect_status = * (int *) ev_data; + * if (connect_status == 0) { + * // Success + * } else { + * // Error + * printf("connect() error: %s\n", strerror(connect_status)); + * } + * break; + * ... + * } + * } + * + * ... + * mg_connect(mgr, "my_site.com:80", ev_handler); + * ``` + */ +struct mg_connection *mg_connect_opt(struct mg_mgr *mgr, const char *address, + MG_CB(mg_event_handler_t handler, + void *user_data), + struct mg_connect_opts opts); + +#if MG_ENABLE_SSL && MG_NET_IF != MG_NET_IF_SIMPLELINK +/* + * Note: This function is deprecated. Please, use SSL options in + * mg_connect_opt. + * + * Enables SSL for a given connection. + * `cert` is a server certificate file name for a listening connection + * or a client certificate file name for an outgoing connection. + * The certificate files must be in PEM format. The server certificate file + * must contain a certificate, concatenated with a private key, optionally + * concatenated with DH parameters. + * `ca_cert` is a CA certificate or NULL if peer verification is not + * required. + * Return: NULL on success or error message on error. + */ +const char *mg_set_ssl(struct mg_connection *nc, const char *cert, + const char *ca_cert); +#endif + +/* + * Sends data to the connection. + * + * Note that sending functions do not actually push data to the socket. + * They just append data to the output buffer. MG_EV_SEND will be delivered when + * the data has actually been pushed out. + */ +void mg_send(struct mg_connection *, const void *buf, int len); + +/* Enables format string warnings for mg_printf */ +#if defined(__GNUC__) +__attribute__((format(printf, 2, 3))) +#endif +/* don't separate from mg_printf declaration */ + +/* + * Sends `printf`-style formatted data to the connection. + * + * See `mg_send` for more details on send semantics. + */ +int mg_printf(struct mg_connection *, const char *fmt, ...); + +/* Same as `mg_printf()`, but takes `va_list ap` as an argument. */ +int mg_vprintf(struct mg_connection *, const char *fmt, va_list ap); + +/* + * Creates a socket pair. + * `sock_type` can be either `SOCK_STREAM` or `SOCK_DGRAM`. + * Returns 0 on failure and 1 on success. + */ +int mg_socketpair(sock_t[2], int sock_type); + +#if MG_ENABLE_SYNC_RESOLVER +/* + * Convert domain name into IP address. + * + * This is a utility function. If compilation flags have + * `-DMG_ENABLE_GETADDRINFO`, then `getaddrinfo()` call is used for name + * resolution. Otherwise, `gethostbyname()` is used. + * + * CAUTION: this function can block. + * Return 1 on success, 0 on failure. + */ +int mg_resolve(const char *domain_name, char *ip_addr_buf, size_t buf_len); +#endif + +/* + * Verify given IP address against the ACL. + * + * `remote_ip` - an IPv4 address to check, in host byte order + * `acl` - a comma separated list of IP subnets: `x.x.x.x/x` or `x.x.x.x`. + * Each subnet is + * prepended by either a - or a + sign. A plus sign means allow, where a + * minus sign means deny. If a subnet mask is omitted, such as `-1.2.3.4`, + * it means that only that single IP address is denied. + * Subnet masks may vary from 0 to 32, inclusive. The default setting + * is to allow all access. On each request the full list is traversed, + * and the last match wins. Example: + * + * `-0.0.0.0/0,+192.168/16` - deny all accesses, only allow 192.168/16 subnet + * + * To learn more about subnet masks, see this + * link:https://en.wikipedia.org/wiki/Subnetwork[Wikipedia page on Subnetwork]. + * + * Returns -1 if ACL is malformed, 0 if address is disallowed, 1 if allowed. + */ +int mg_check_ip_acl(const char *acl, uint32_t remote_ip); + +/* + * Schedules an MG_EV_TIMER event to be delivered at `timestamp` time. + * `timestamp` is UNIX time (the number of seconds since Epoch). It is + * `double` instead of `time_t` to allow for sub-second precision. + * Returns the old timer value. + * + * Example: set the connect timeout to 1.5 seconds: + * + * ``` + * c = mg_connect(&mgr, "cesanta.com", ev_handler); + * mg_set_timer(c, mg_time() + 1.5); + * ... + * + * void ev_handler(struct mg_connection *c, int ev, void *ev_data) { + * switch (ev) { + * case MG_EV_CONNECT: + * mg_set_timer(c, 0); // Clear connect timer + * break; + * case MG_EV_TIMER: + * log("Connect timeout"); + * c->flags |= MG_F_CLOSE_IMMEDIATELY; + * break; + * ``` + */ +double mg_set_timer(struct mg_connection *c, double timestamp); + +/* + * A sub-second precision version of time(). + */ +double mg_time(void); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* CS_MONGOOSE_SRC_NET_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/uri.h" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +/* + * === URI + */ + +#ifndef CS_MONGOOSE_SRC_URI_H_ +#define CS_MONGOOSE_SRC_URI_H_ + +/* Amalgamated: #include "mongoose/src/net.h" */ + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +/* + * Parses an URI and fills string chunks with locations of the respective + * uri components within the input uri string. NULL pointers will be + * ignored. + * + * General syntax: + * + * [scheme://[user_info@]]host[:port][/path][?query][#fragment] + * + * Example: + * + * foo.com:80 + * tcp://foo.com:1234 + * http://foo.com:80/bar?baz=1 + * https://user:pw@foo.com:443/blah + * + * `path` will include the leading slash. `query` won't include the leading `?`. + * `host` can contain embedded colons if surrounded by square brackets in order + * to support IPv6 literal addresses. + * + * + * Returns 0 on success, -1 on error. + */ +int mg_parse_uri(const struct mg_str uri, struct mg_str *scheme, + struct mg_str *user_info, struct mg_str *host, + unsigned int *port, struct mg_str *path, struct mg_str *query, + struct mg_str *fragment); + +/* + * Assemble URI from parts. Any of the inputs can be NULL or zero-length mg_str. + * + * If normalize_path is true, path is normalized by resolving relative refs. + * + * Result is a heap-allocated string (uri->p must be free()d after use). + * + * Returns 0 on success, -1 on error. + */ +int mg_assemble_uri(const struct mg_str *scheme, const struct mg_str *user_info, + const struct mg_str *host, unsigned int port, + const struct mg_str *path, const struct mg_str *query, + const struct mg_str *fragment, int normalize_path, + struct mg_str *uri); + +int mg_normalize_uri_path(const struct mg_str *in, struct mg_str *out); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ +#endif /* CS_MONGOOSE_SRC_URI_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/util.h" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +/* + * === Utility API + */ + +#ifndef CS_MONGOOSE_SRC_UTIL_H_ +#define CS_MONGOOSE_SRC_UTIL_H_ + +#include <stdio.h> + +/* Amalgamated: #include "mongoose/src/common.h" */ +/* Amalgamated: #include "mongoose/src/net_if.h" */ + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +#ifndef MG_MAX_PATH +#ifdef PATH_MAX +#define MG_MAX_PATH PATH_MAX +#else +#define MG_MAX_PATH 256 +#endif +#endif + +/* + * Fetches substring from input string `s`, `end` into `v`. + * Skips initial delimiter characters. Records first non-delimiter character + * at the beginning of substring `v`. Then scans the rest of the string + * until a delimiter character or end-of-string is found. + * `delimiters` is a 0-terminated string containing delimiter characters. + * Either one of `delimiters` or `end_string` terminates the search. + * Returns an `s` pointer, advanced forward where parsing has stopped. + */ +const char *mg_skip(const char *s, const char *end_string, + const char *delimiters, struct mg_str *v); + +/* + * Decodes base64-encoded string `s`, `len` into the destination `dst`. + * The destination has to have enough space to hold the decoded buffer. + * Decoding stops either when all strings have been decoded or invalid an + * character appeared. + * Destination is '\0'-terminated. + * Returns the number of decoded characters. On success, that should be equal + * to `len`. On error (invalid character) the return value is smaller then + * `len`. + */ +int mg_base64_decode(const unsigned char *s, int len, char *dst); + +/* + * Base64-encode chunk of memory `src`, `src_len` into the destination `dst`. + * Destination has to have enough space to hold encoded buffer. + * Destination is '\0'-terminated. + */ +void mg_base64_encode(const unsigned char *src, int src_len, char *dst); + +#if MG_ENABLE_FILESYSTEM +/* + * Performs a 64-bit `stat()` call against a given file. + * + * `path` should be UTF8 encoded. + * + * Return value is the same as for `stat()` syscall. + */ +int mg_stat(const char *path, cs_stat_t *st); + +/* + * Opens the given file and returns a file stream. + * + * `path` and `mode` should be UTF8 encoded. + * + * Return value is the same as for the `fopen()` call. + */ +FILE *mg_fopen(const char *path, const char *mode); + +/* + * Opens the given file and returns a file stream. + * + * `path` should be UTF8 encoded. + * + * Return value is the same as for the `open()` syscall. + */ +int mg_open(const char *path, int flag, int mode); + +/* + * Reads data from the given file stream. + * + * Return value is a number of bytes readen. + */ +size_t mg_fread(void *ptr, size_t size, size_t count, FILE *f); + +/* + * Writes data to the given file stream. + * + * Return value is a number of bytes wtitten. + */ +size_t mg_fwrite(const void *ptr, size_t size, size_t count, FILE *f); + +#endif /* MG_ENABLE_FILESYSTEM */ + +#if MG_ENABLE_THREADS +/* + * Starts a new detached thread. + * Arguments and semantics are the same as pthead's `pthread_create()`. + * `thread_func` is a thread function, `thread_func_param` is a parameter + * that is passed to the thread function. + */ +void *mg_start_thread(void *(*thread_func)(void *), void *thread_func_param); +#endif + +void mg_set_close_on_exec(sock_t); + +#define MG_SOCK_STRINGIFY_IP 1 +#define MG_SOCK_STRINGIFY_PORT 2 +#define MG_SOCK_STRINGIFY_REMOTE 4 +/* + * Converts a connection's local or remote address into string. + * + * The `flags` parameter is a bit mask that controls the behaviour, + * see `MG_SOCK_STRINGIFY_*` definitions. + * + * - MG_SOCK_STRINGIFY_IP - print IP address + * - MG_SOCK_STRINGIFY_PORT - print port number + * - MG_SOCK_STRINGIFY_REMOTE - print remote peer's IP/port, not local address + * + * If both port number and IP address are printed, they are separated by `:`. + * If compiled with `-DMG_ENABLE_IPV6`, IPv6 addresses are supported. + * Return length of the stringified address. + */ +int mg_conn_addr_to_str(struct mg_connection *c, char *buf, size_t len, + int flags); +#if MG_NET_IF == MG_NET_IF_SOCKET +/* Legacy interface. */ +void mg_sock_to_str(sock_t sock, char *buf, size_t len, int flags); +#endif + +/* + * Convert the socket's address into string. + * + * `flags` is MG_SOCK_STRINGIFY_IP and/or MG_SOCK_STRINGIFY_PORT. + */ +int mg_sock_addr_to_str(const union socket_address *sa, char *buf, size_t len, + int flags); + +#if MG_ENABLE_HEXDUMP +/* + * Generates a human-readable hexdump of memory chunk. + * + * Takes a memory buffer `buf` of length `len` and creates a hex dump of that + * buffer in `dst`. The generated output is a-la hexdump(1). + * Returns the length of generated string, excluding terminating `\0`. If + * returned length is bigger than `dst_len`, the overflow bytes are discarded. + */ +int mg_hexdump(const void *buf, int len, char *dst, int dst_len); + +/* Same as mg_hexdump, but with output going to file instead of a buffer. */ +void mg_hexdumpf(FILE *fp, const void *buf, int len); + +/* + * Generates human-readable hexdump of the data sent or received by the + * connection. `path` is a file name where hexdump should be written. + * `num_bytes` is a number of bytes sent/received. `ev` is one of the `MG_*` + * events sent to an event handler. This function is supposed to be called from + * the event handler. + */ +void mg_hexdump_connection(struct mg_connection *nc, const char *path, + const void *buf, int num_bytes, int ev); +#endif + +/* + * Returns true if target platform is big endian. + */ +int mg_is_big_endian(void); + +/* + * Use with cs_base64_init/update/finish in order to write out base64 in chunks. + */ +void mg_mbuf_append_base64_putc(char ch, void *user_data); + +/* + * Encode `len` bytes starting at `data` as base64 and append them to an mbuf. + */ +void mg_mbuf_append_base64(struct mbuf *mbuf, const void *data, size_t len); + +/* + * Generate a Basic Auth header and appends it to buf. + * If pass is NULL, then user is expected to contain the credentials pair + * already encoded as `user:pass`. + */ +void mg_basic_auth_header(const struct mg_str user, const struct mg_str pass, + struct mbuf *buf); + +/* + * URL-escape the specified string. + * All non-printable characters are escaped, plus `._-$,;~()/`. + * Input need not be NUL-terminated, but the returned string is. + * Returned string is heap-allocated and must be free()'d. + */ +struct mg_str mg_url_encode(const struct mg_str src); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ +#endif /* CS_MONGOOSE_SRC_UTIL_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/http.h" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +/* + * === Common API reference + */ + +#ifndef CS_MONGOOSE_SRC_HTTP_H_ +#define CS_MONGOOSE_SRC_HTTP_H_ + +#if MG_ENABLE_HTTP + +/* Amalgamated: #include "mongoose/src/net.h" */ +/* Amalgamated: #include "common/mg_str.h" */ + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +#ifndef MG_MAX_HTTP_HEADERS +#define MG_MAX_HTTP_HEADERS 20 +#endif + +#ifndef MG_MAX_HTTP_REQUEST_SIZE +#define MG_MAX_HTTP_REQUEST_SIZE 1024 +#endif + +#ifndef MG_MAX_HTTP_SEND_MBUF +#define MG_MAX_HTTP_SEND_MBUF 1024 +#endif + +#ifndef MG_CGI_ENVIRONMENT_SIZE +#define MG_CGI_ENVIRONMENT_SIZE 8192 +#endif + +/* HTTP message */ +struct http_message { + struct mg_str message; /* Whole message: request line + headers + body */ + struct mg_str body; /* Message body. 0-length for requests with no body */ + + /* HTTP Request line (or HTTP response line) */ + struct mg_str method; /* "GET" */ + struct mg_str uri; /* "/my_file.html" */ + struct mg_str proto; /* "HTTP/1.1" -- for both request and response */ + + /* For responses, code and response status message are set */ + int resp_code; + struct mg_str resp_status_msg; + + /* + * Query-string part of the URI. For example, for HTTP request + * GET /foo/bar?param1=val1¶m2=val2 + * | uri | query_string | + * + * Note that question mark character doesn't belong neither to the uri, + * nor to the query_string + */ + struct mg_str query_string; + + /* Headers */ + struct mg_str header_names[MG_MAX_HTTP_HEADERS]; + struct mg_str header_values[MG_MAX_HTTP_HEADERS]; +}; + +#if MG_ENABLE_HTTP_WEBSOCKET +/* WebSocket message */ +struct websocket_message { + unsigned char *data; + size_t size; + unsigned char flags; +}; +#endif + +/* HTTP multipart part */ +struct mg_http_multipart_part { + const char *file_name; + const char *var_name; + struct mg_str data; + int status; /* <0 on error */ + void *user_data; +}; + +/* SSI call context */ +struct mg_ssi_call_ctx { + struct http_message *req; /* The request being processed. */ + struct mg_str file; /* Filesystem path of the file being processed. */ + struct mg_str arg; /* The argument passed to the tag: <!-- call arg -->. */ +}; + +/* HTTP and websocket events. void *ev_data is described in a comment. */ +#define MG_EV_HTTP_REQUEST 100 /* struct http_message * */ +#define MG_EV_HTTP_REPLY 101 /* struct http_message * */ +#define MG_EV_HTTP_CHUNK 102 /* struct http_message * */ +#define MG_EV_SSI_CALL 105 /* char * */ +#define MG_EV_SSI_CALL_CTX 106 /* struct mg_ssi_call_ctx * */ + +#if MG_ENABLE_HTTP_WEBSOCKET +#define MG_EV_WEBSOCKET_HANDSHAKE_REQUEST 111 /* struct http_message * */ +#define MG_EV_WEBSOCKET_HANDSHAKE_DONE 112 /* NULL */ +#define MG_EV_WEBSOCKET_FRAME 113 /* struct websocket_message * */ +#define MG_EV_WEBSOCKET_CONTROL_FRAME 114 /* struct websocket_message * */ +#endif + +#if MG_ENABLE_HTTP_STREAMING_MULTIPART +#define MG_EV_HTTP_MULTIPART_REQUEST 121 /* struct http_message */ +#define MG_EV_HTTP_PART_BEGIN 122 /* struct mg_http_multipart_part */ +#define MG_EV_HTTP_PART_DATA 123 /* struct mg_http_multipart_part */ +#define MG_EV_HTTP_PART_END 124 /* struct mg_http_multipart_part */ +/* struct mg_http_multipart_part */ +#define MG_EV_HTTP_MULTIPART_REQUEST_END 125 +#endif + +/* + * Attaches a built-in HTTP event handler to the given connection. + * The user-defined event handler will receive following extra events: + * + * - MG_EV_HTTP_REQUEST: HTTP request has arrived. Parsed HTTP request + * is passed as + * `struct http_message` through the handler's `void *ev_data` pointer. + * - MG_EV_HTTP_REPLY: The HTTP reply has arrived. The parsed HTTP reply is + * passed as `struct http_message` through the handler's `void *ev_data` + * pointer. + * - MG_EV_HTTP_CHUNK: The HTTP chunked-encoding chunk has arrived. + * The parsed HTTP reply is passed as `struct http_message` through the + * handler's `void *ev_data` pointer. `http_message::body` would contain + * incomplete, reassembled HTTP body. + * It will grow with every new chunk that arrives, and it can + * potentially consume a lot of memory. An event handler may process + * the body as chunks are coming, and signal Mongoose to delete processed + * body by setting `MG_F_DELETE_CHUNK` in `mg_connection::flags`. When + * the last zero chunk is received, + * Mongoose sends `MG_EV_HTTP_REPLY` event with + * full reassembled body (if handler did not signal to delete chunks) or + * with empty body (if handler did signal to delete chunks). + * - MG_EV_WEBSOCKET_HANDSHAKE_REQUEST: server has received the WebSocket + * handshake request. `ev_data` contains parsed HTTP request. + * - MG_EV_WEBSOCKET_HANDSHAKE_DONE: server has completed the WebSocket + * handshake. `ev_data` is `NULL`. + * - MG_EV_WEBSOCKET_FRAME: new WebSocket frame has arrived. `ev_data` is + * `struct websocket_message *` + * + * When compiled with MG_ENABLE_HTTP_STREAMING_MULTIPART, Mongoose parses + * multipart requests and splits them into separate events: + * - MG_EV_HTTP_MULTIPART_REQUEST: Start of the request. + * This event is sent before body is parsed. After this, the user + * should expect a sequence of PART_BEGIN/DATA/END requests. + * This is also the last time when headers and other request fields are + * accessible. + * - MG_EV_HTTP_PART_BEGIN: Start of a part of a multipart message. + * Argument: mg_http_multipart_part with var_name and file_name set + * (if present). No data is passed in this message. + * - MG_EV_HTTP_PART_DATA: new portion of data from the multipart message. + * Argument: mg_http_multipart_part. var_name and file_name are preserved, + * data is available in mg_http_multipart_part.data. + * - MG_EV_HTTP_PART_END: End of the current part. var_name, file_name are + * the same, no data in the message. If status is 0, then the part is + * properly terminated with a boundary, status < 0 means that connection + * was terminated. + * - MG_EV_HTTP_MULTIPART_REQUEST_END: End of the multipart request. + * Argument: mg_http_multipart_part, var_name and file_name are NULL, + * status = 0 means request was properly closed, < 0 means connection + * was terminated (note: in this case both PART_END and REQUEST_END are + * delivered). + */ +void mg_set_protocol_http_websocket(struct mg_connection *nc); + +#if MG_ENABLE_HTTP_WEBSOCKET +/* + * Send websocket handshake to the server. + * + * `nc` must be a valid connection, connected to a server. `uri` is an URI + * to fetch, extra_headers` is extra HTTP headers to send or `NULL`. + * + * This function is intended to be used by websocket client. + * + * Note that the Host header is mandatory in HTTP/1.1 and must be + * included in `extra_headers`. `mg_send_websocket_handshake2` offers + * a better API for that. + * + * Deprecated in favour of `mg_send_websocket_handshake2` + */ +void mg_send_websocket_handshake(struct mg_connection *nc, const char *uri, + const char *extra_headers); + +/* + * Send websocket handshake to the server. + * + * `nc` must be a valid connection, connected to a server. `uri` is an URI + * to fetch, `host` goes into the `Host` header, `protocol` goes into the + * `Sec-WebSocket-Proto` header (NULL to omit), extra_headers` is extra HTTP + * headers to send or `NULL`. + * + * This function is intended to be used by websocket client. + */ +void mg_send_websocket_handshake2(struct mg_connection *nc, const char *path, + const char *host, const char *protocol, + const char *extra_headers); + +/* Like mg_send_websocket_handshake2 but also passes basic auth header */ +void mg_send_websocket_handshake3(struct mg_connection *nc, const char *path, + const char *host, const char *protocol, + const char *extra_headers, const char *user, + const char *pass); + +/* Same as mg_send_websocket_handshake3 but with strings not necessarily + * NUL-temrinated */ +void mg_send_websocket_handshake3v(struct mg_connection *nc, + const struct mg_str path, + const struct mg_str host, + const struct mg_str protocol, + const struct mg_str extra_headers, + const struct mg_str user, + const struct mg_str pass); + +/* + * Helper function that creates an outbound WebSocket connection. + * + * `url` is a URL to connect to. It must be properly URL-encoded, e.g. have + * no spaces, etc. By default, `mg_connect_ws()` sends Connection and + * Host headers. `extra_headers` is an extra HTTP header to send, e.g. + * `"User-Agent: my-app\r\n"`. + * If `protocol` is not NULL, then a `Sec-WebSocket-Protocol` header is sent. + * + * Examples: + * + * ```c + * nc1 = mg_connect_ws(mgr, ev_handler_1, "ws://echo.websocket.org", NULL, + * NULL); + * nc2 = mg_connect_ws(mgr, ev_handler_1, "wss://echo.websocket.org", NULL, + * NULL); + * nc3 = mg_connect_ws(mgr, ev_handler_1, "ws://api.cesanta.com", + * "clubby.cesanta.com", NULL); + * ``` + */ +struct mg_connection *mg_connect_ws(struct mg_mgr *mgr, + MG_CB(mg_event_handler_t event_handler, + void *user_data), + const char *url, const char *protocol, + const char *extra_headers); + +/* + * Helper function that creates an outbound WebSocket connection + * + * Mostly identical to `mg_connect_ws`, but allows to provide extra parameters + * (for example, SSL parameters) + */ +struct mg_connection *mg_connect_ws_opt( + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), + struct mg_connect_opts opts, const char *url, const char *protocol, + const char *extra_headers); + +/* + * Send WebSocket frame to the remote end. + * + * `op_and_flags` specifies the frame's type. It's one of: + * + * - WEBSOCKET_OP_CONTINUE + * - WEBSOCKET_OP_TEXT + * - WEBSOCKET_OP_BINARY + * - WEBSOCKET_OP_CLOSE + * - WEBSOCKET_OP_PING + * - WEBSOCKET_OP_PONG + * + * Orred with one of the flags: + * + * - WEBSOCKET_DONT_FIN: Don't set the FIN flag on the frame to be sent. + * + * `data` and `data_len` contain frame data. + */ +void mg_send_websocket_frame(struct mg_connection *nc, int op_and_flags, + const void *data, size_t data_len); + +/* + * Sends multiple websocket frames. + * + * Like `mg_send_websocket_frame()`, but composes a frame from multiple + *buffers. + */ +void mg_send_websocket_framev(struct mg_connection *nc, int op_and_flags, + const struct mg_str *strings, int num_strings); + +/* + * Sends WebSocket frame to the remote end. + * + * Like `mg_send_websocket_frame()`, but allows to create formatted messages + * with `printf()`-like semantics. + */ +void mg_printf_websocket_frame(struct mg_connection *nc, int op_and_flags, + const char *fmt, ...); + +/* Websocket opcodes, from http://tools.ietf.org/html/rfc6455 */ +#define WEBSOCKET_OP_CONTINUE 0 +#define WEBSOCKET_OP_TEXT 1 +#define WEBSOCKET_OP_BINARY 2 +#define WEBSOCKET_OP_CLOSE 8 +#define WEBSOCKET_OP_PING 9 +#define WEBSOCKET_OP_PONG 10 + +/* + * If set causes the FIN flag to not be set on outbound + * frames. This enables sending multiple fragments of a single + * logical message. + * + * The WebSocket protocol mandates that if the FIN flag of a data + * frame is not set, the next frame must be a WEBSOCKET_OP_CONTINUE. + * The last frame must have the FIN bit set. + * + * Note that mongoose will automatically defragment incoming messages, + * so this flag is used only on outbound messages. + */ +#define WEBSOCKET_DONT_FIN 0x100 + +#endif /* MG_ENABLE_HTTP_WEBSOCKET */ + +/* + * Decodes a URL-encoded string. + * + * Source string is specified by (`src`, `src_len`), and destination is + * (`dst`, `dst_len`). If `is_form_url_encoded` is non-zero, then + * `+` character is decoded as a blank space character. This function + * guarantees to NUL-terminate the destination. If destination is too small, + * then the source string is partially decoded and `-1` is returned. + *Otherwise, + * a length of the decoded string is returned, not counting final NUL. + */ +int mg_url_decode(const char *src, int src_len, char *dst, int dst_len, + int is_form_url_encoded); + +extern void mg_hash_md5_v(size_t num_msgs, const uint8_t *msgs[], + const size_t *msg_lens, uint8_t *digest); +extern void mg_hash_sha1_v(size_t num_msgs, const uint8_t *msgs[], + const size_t *msg_lens, uint8_t *digest); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* MG_ENABLE_HTTP */ + +#endif /* CS_MONGOOSE_SRC_HTTP_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/http_server.h" +#endif +/* + * === Server API reference + */ + +#ifndef CS_MONGOOSE_SRC_HTTP_SERVER_H_ +#define CS_MONGOOSE_SRC_HTTP_SERVER_H_ + +#if MG_ENABLE_HTTP + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +/* + * Parses a HTTP message. + * + * `is_req` should be set to 1 if parsing a request, 0 if reply. + * + * Returns the number of bytes parsed. If HTTP message is + * incomplete `0` is returned. On parse error, a negative number is returned. + */ +int mg_parse_http(const char *s, int n, struct http_message *hm, int is_req); + +/* + * Searches and returns the header `name` in parsed HTTP message `hm`. + * If header is not found, NULL is returned. Example: + * + * struct mg_str *host_hdr = mg_get_http_header(hm, "Host"); + */ +struct mg_str *mg_get_http_header(struct http_message *hm, const char *name); + +/* + * Parses the HTTP header `hdr`. Finds variable `var_name` and stores its value + * in the buffer `buf`, `buf_size`. Returns 0 if variable not found, non-zero + * otherwise. + * + * This function is supposed to parse cookies, authentication headers, etc. + * Example (error handling omitted): + * + * char user[20]; + * struct mg_str *hdr = mg_get_http_header(hm, "Authorization"); + * mg_http_parse_header(hdr, "username", user, sizeof(user)); + * + * Returns the length of the variable's value. If buffer is not large enough, + * or variable not found, 0 is returned. + */ +int mg_http_parse_header(struct mg_str *hdr, const char *var_name, char *buf, + size_t buf_size); + +/* + * Gets and parses the Authorization: Basic header + * Returns -1 if no Authorization header is found, or if + * mg_parse_http_basic_auth + * fails parsing the resulting header. + */ +int mg_get_http_basic_auth(struct http_message *hm, char *user, size_t user_len, + char *pass, size_t pass_len); + +/* + * Parses the Authorization: Basic header + * Returns -1 iif the authorization type is not "Basic" or any other error such + * as incorrectly encoded base64 user password pair. + */ +int mg_parse_http_basic_auth(struct mg_str *hdr, char *user, size_t user_len, + char *pass, size_t pass_len); + +/* + * Parses the buffer `buf`, `buf_len` that contains multipart form data chunks. + * Stores the chunk name in a `var_name`, `var_name_len` buffer. + * If a chunk is an uploaded file, then `file_name`, `file_name_len` is + * filled with an uploaded file name. `chunk`, `chunk_len` + * points to the chunk data. + * + * Return: number of bytes to skip to the next chunk or 0 if there are + * no more chunks. + * + * Usage example: + * + * ```c + * static void ev_handler(struct mg_connection *nc, int ev, void *ev_data) { + * switch(ev) { + * case MG_EV_HTTP_REQUEST: { + * struct http_message *hm = (struct http_message *) ev_data; + * char var_name[100], file_name[100]; + * const char *chunk; + * size_t chunk_len, n1, n2; + * + * n1 = n2 = 0; + * while ((n2 = mg_parse_multipart(hm->body.p + n1, + * hm->body.len - n1, + * var_name, sizeof(var_name), + * file_name, sizeof(file_name), + * &chunk, &chunk_len)) > 0) { + * printf("var: %s, file_name: %s, size: %d, chunk: [%.*s]\n", + * var_name, file_name, (int) chunk_len, + * (int) chunk_len, chunk); + * n1 += n2; + * } + * } + * break; + * ``` + */ +size_t mg_parse_multipart(const char *buf, size_t buf_len, char *var_name, + size_t var_name_len, char *file_name, + size_t file_name_len, const char **chunk, + size_t *chunk_len); + +/* + * Fetches a HTTP form variable. + * + * Fetches a variable `name` from a `buf` into a buffer specified by `dst`, + * `dst_len`. The destination is always zero-terminated. Returns the length of + * a fetched variable. If not found, 0 is returned. `buf` must be valid + * url-encoded buffer. If destination is too small or an error occured, + * negative number is returned. + */ +int mg_get_http_var(const struct mg_str *buf, const char *name, char *dst, + size_t dst_len); + +#if MG_ENABLE_FILESYSTEM +/* + * This structure defines how `mg_serve_http()` works. + * Best practice is to set only required settings, and leave the rest as NULL. + */ +struct mg_serve_http_opts { + /* Path to web root directory */ + const char *document_root; + + /* List of index files. Default is "" */ + const char *index_files; + + /* + * Leave as NULL to disable authentication. + * To enable directory protection with authentication, set this to ".htpasswd" + * Then, creating ".htpasswd" file in any directory automatically protects + * it with digest authentication. + * Use `mongoose` web server binary, or `htdigest` Apache utility to + * create/manipulate passwords file. + * Make sure `auth_domain` is set to a valid domain name. + */ + const char *per_directory_auth_file; + + /* Authorization domain (domain name of this web server) */ + const char *auth_domain; + + /* + * Leave as NULL to disable authentication. + * Normally, only selected directories in the document root are protected. + * If absolutely every access to the web server needs to be authenticated, + * regardless of the URI, set this option to the path to the passwords file. + * Format of that file is the same as ".htpasswd" file. Make sure that file + * is located outside document root to prevent people fetching it. + */ + const char *global_auth_file; + + /* Set to "no" to disable directory listing. Enabled by default. */ + const char *enable_directory_listing; + + /* + * SSI files pattern. If not set, "**.shtml$|**.shtm$" is used. + * + * All files that match ssi_pattern are treated as SSI. + * + * Server Side Includes (SSI) is a simple interpreted server-side scripting + * language which is most commonly used to include the contents of a file + * into a web page. It can be useful when it is desirable to include a common + * piece of code throughout a website, for example, headers and footers. + * + * In order for a webpage to recognize an SSI-enabled HTML file, the + * filename should end with a special extension, by default the extension + * should be either .shtml or .shtm + * + * Unknown SSI directives are silently ignored by Mongoose. Currently, + * the following SSI directives are supported: + * <!--#include FILE_TO_INCLUDE --> + * <!--#exec "COMMAND_TO_EXECUTE" --> + * <!--#call COMMAND --> + * + * Note that <!--#include ...> directive supports three path + *specifications: + * + * <!--#include virtual="path" --> Path is relative to web server root + * <!--#include abspath="path" --> Path is absolute or relative to the + * web server working dir + * <!--#include file="path" -->, Path is relative to current document + * <!--#include "path" --> + * + * The include directive may be used to include the contents of a file or + * the result of running a CGI script. + * + * The exec directive is used to execute + * a command on a server, and show command's output. Example: + * + * <!--#exec "ls -l" --> + * + * The call directive is a way to invoke a C handler from the HTML page. + * On each occurence of <!--#call COMMAND OPTIONAL_PARAMS> directive, + * Mongoose calls a registered event handler with MG_EV_SSI_CALL event, + * and event parameter will point to the COMMAND OPTIONAL_PARAMS string. + * An event handler can output any text, for example by calling + * `mg_printf()`. This is a flexible way of generating a web page on + * server side by calling a C event handler. Example: + * + * <!--#call foo --> ... <!--#call bar --> + * + * In the event handler: + * case MG_EV_SSI_CALL: { + * const char *param = (const char *) ev_data; + * if (strcmp(param, "foo") == 0) { + * mg_printf(c, "hello from foo"); + * } else if (strcmp(param, "bar") == 0) { + * mg_printf(c, "hello from bar"); + * } + * break; + * } + */ + const char *ssi_pattern; + + /* IP ACL. By default, NULL, meaning all IPs are allowed to connect */ + const char *ip_acl; + +#if MG_ENABLE_HTTP_URL_REWRITES + /* URL rewrites. + * + * Comma-separated list of `uri_pattern=url_file_or_directory_path` rewrites. + * When HTTP request is received, Mongoose constructs a file name from the + * requested URI by combining `document_root` and the URI. However, if the + * rewrite option is used and `uri_pattern` matches requested URI, then + * `document_root` is ignored. Instead, `url_file_or_directory_path` is used, + * which should be a full path name or a path relative to the web server's + * current working directory. It can also be an URI (http:// or https://) + * in which case mongoose will behave as a reverse proxy for that destination. + * + * Note that `uri_pattern`, as all Mongoose patterns, is a prefix pattern. + * + * If uri_pattern starts with `@` symbol, then Mongoose compares it with the + * HOST header of the request. If they are equal, Mongoose sets document root + * to `file_or_directory_path`, implementing virtual hosts support. + * Example: `@foo.com=/document/root/for/foo.com` + * + * If `uri_pattern` starts with `%` symbol, then Mongoose compares it with + * the listening port. If they match, then Mongoose issues a 301 redirect. + * For example, to redirect all HTTP requests to the + * HTTPS port, do `%80=https://my.site.com`. Note that the request URI is + * automatically appended to the redirect location. + */ + const char *url_rewrites; +#endif + + /* DAV document root. If NULL, DAV requests are going to fail. */ + const char *dav_document_root; + + /* + * DAV passwords file. If NULL, DAV requests are going to fail. + * If passwords file is set to "-", then DAV auth is disabled. + */ + const char *dav_auth_file; + + /* Glob pattern for the files to hide. */ + const char *hidden_file_pattern; + + /* Set to non-NULL to enable CGI, e.g. **.cgi$|**.php$" */ + const char *cgi_file_pattern; + + /* If not NULL, ignore CGI script hashbang and use this interpreter */ + const char *cgi_interpreter; + + /* + * Comma-separated list of Content-Type overrides for path suffixes, e.g. + * ".txt=text/plain; charset=utf-8,.c=text/plain" + */ + const char *custom_mime_types; + + /* + * Extra HTTP headers to add to each server response. + * Example: to enable CORS, set this to "Access-Control-Allow-Origin: *". + */ + const char *extra_headers; +}; + +/* + * Serves given HTTP request according to the `options`. + * + * Example code snippet: + * + * ```c + * static void ev_handler(struct mg_connection *nc, int ev, void *ev_data) { + * struct http_message *hm = (struct http_message *) ev_data; + * struct mg_serve_http_opts opts = { .document_root = "/var/www" }; // C99 + * + * switch (ev) { + * case MG_EV_HTTP_REQUEST: + * mg_serve_http(nc, hm, opts); + * break; + * default: + * break; + * } + * } + * ``` + */ +void mg_serve_http(struct mg_connection *nc, struct http_message *hm, + struct mg_serve_http_opts opts); + +/* + * Serves a specific file with a given MIME type and optional extra headers. + * + * Example code snippet: + * + * ```c + * static void ev_handler(struct mg_connection *nc, int ev, void *ev_data) { + * switch (ev) { + * case MG_EV_HTTP_REQUEST: { + * struct http_message *hm = (struct http_message *) ev_data; + * mg_http_serve_file(nc, hm, "file.txt", + * mg_mk_str("text/plain"), mg_mk_str("")); + * break; + * } + * ... + * } + * } + * ``` + */ +void mg_http_serve_file(struct mg_connection *nc, struct http_message *hm, + const char *path, const struct mg_str mime_type, + const struct mg_str extra_headers); + +#if MG_ENABLE_HTTP_STREAMING_MULTIPART + +/* Callback prototype for `mg_file_upload_handler()`. */ +typedef struct mg_str (*mg_fu_fname_fn)(struct mg_connection *nc, + struct mg_str fname); + +/* + * File upload handler. + * This handler can be used to implement file uploads with minimum code. + * This handler will process MG_EV_HTTP_PART_* events and store file data into + * a local file. + * `local_name_fn` will be invoked with whatever name was provided by the client + * and will expect the name of the local file to open. A return value of NULL + * will abort file upload (client will get a "403 Forbidden" response). If + * non-null, the returned string must be heap-allocated and will be freed by + * the caller. + * Exception: it is ok to return the same string verbatim. + * + * Example: + * + * ```c + * struct mg_str upload_fname(struct mg_connection *nc, struct mg_str fname) { + * // Just return the same filename. Do not actually do this except in test! + * // fname is user-controlled and needs to be sanitized. + * return fname; + * } + * void ev_handler(struct mg_connection *nc, int ev, void *ev_data) { + * switch (ev) { + * ... + * case MG_EV_HTTP_PART_BEGIN: + * case MG_EV_HTTP_PART_DATA: + * case MG_EV_HTTP_PART_END: + * mg_file_upload_handler(nc, ev, ev_data, upload_fname); + * break; + * } + * } + * ``` + */ +void mg_file_upload_handler(struct mg_connection *nc, int ev, void *ev_data, + mg_fu_fname_fn local_name_fn + MG_UD_ARG(void *user_data)); +#endif /* MG_ENABLE_HTTP_STREAMING_MULTIPART */ +#endif /* MG_ENABLE_FILESYSTEM */ + +/* + * Registers a callback for a specified http endpoint + * Note: if callback is registered it is called instead of the + * callback provided in mg_bind + * + * Example code snippet: + * + * ```c + * static void handle_hello1(struct mg_connection *nc, int ev, void *ev_data) { + * (void) ev; (void) ev_data; + * mg_printf(nc, "HTTP/1.0 200 OK\r\n\r\n[I am Hello1]"); + * nc->flags |= MG_F_SEND_AND_CLOSE; + * } + * + * static void handle_hello2(struct mg_connection *nc, int ev, void *ev_data) { + * (void) ev; (void) ev_data; + * mg_printf(nc, "HTTP/1.0 200 OK\r\n\r\n[I am Hello2]"); + * nc->flags |= MG_F_SEND_AND_CLOSE; + * } + * + * void init() { + * nc = mg_bind(&mgr, local_addr, cb1); + * mg_register_http_endpoint(nc, "/hello1", handle_hello1); + * mg_register_http_endpoint(nc, "/hello1/hello2", handle_hello2); + * } + * ``` + */ +void mg_register_http_endpoint(struct mg_connection *nc, const char *uri_path, + MG_CB(mg_event_handler_t handler, + void *user_data)); + +struct mg_http_endpoint_opts { + void *user_data; + /* Authorization domain (realm) */ + const char *auth_domain; + const char *auth_file; +}; + +void mg_register_http_endpoint_opt(struct mg_connection *nc, + const char *uri_path, + mg_event_handler_t handler, + struct mg_http_endpoint_opts opts); + +/* + * Authenticates a HTTP request against an opened password file. + * Returns 1 if authenticated, 0 otherwise. + */ +int mg_http_check_digest_auth(struct http_message *hm, const char *auth_domain, + FILE *fp); + +/* + * Authenticates given response params against an opened password file. + * Returns 1 if authenticated, 0 otherwise. + * + * It's used by mg_http_check_digest_auth(). + */ +int mg_check_digest_auth(struct mg_str method, struct mg_str uri, + struct mg_str username, struct mg_str cnonce, + struct mg_str response, struct mg_str qop, + struct mg_str nc, struct mg_str nonce, + struct mg_str auth_domain, FILE *fp); + +/* + * Sends buffer `buf` of size `len` to the client using chunked HTTP encoding. + * This function sends the buffer size as hex number + newline first, then + * the buffer itself, then the newline. For example, + * `mg_send_http_chunk(nc, "foo", 3)` will append the `3\r\nfoo\r\n` string + * to the `nc->send_mbuf` output IO buffer. + * + * NOTE: The HTTP header "Transfer-Encoding: chunked" should be sent prior to + * using this function. + * + * NOTE: do not forget to send an empty chunk at the end of the response, + * to tell the client that everything was sent. Example: + * + * ``` + * mg_printf_http_chunk(nc, "%s", "my response!"); + * mg_send_http_chunk(nc, "", 0); // Tell the client we're finished + * ``` + */ +void mg_send_http_chunk(struct mg_connection *nc, const char *buf, size_t len); + +/* + * Sends a printf-formatted HTTP chunk. + * Functionality is similar to `mg_send_http_chunk()`. + */ +void mg_printf_http_chunk(struct mg_connection *nc, const char *fmt, ...); + +/* + * Sends the response status line. + * If `extra_headers` is not NULL, then `extra_headers` are also sent + * after the response line. `extra_headers` must NOT end end with new line. + * Example: + * + * mg_send_response_line(nc, 200, "Access-Control-Allow-Origin: *"); + * + * Will result in: + * + * HTTP/1.1 200 OK\r\n + * Access-Control-Allow-Origin: *\r\n + */ +void mg_send_response_line(struct mg_connection *nc, int status_code, + const char *extra_headers); + +/* + * Sends an error response. If reason is NULL, the message will be inferred + * from the error code (if supported). + */ +void mg_http_send_error(struct mg_connection *nc, int code, const char *reason); + +/* + * Sends a redirect response. + * `status_code` should be either 301 or 302 and `location` point to the + * new location. + * If `extra_headers` is not empty, then `extra_headers` are also sent + * after the response line. `extra_headers` must NOT end end with new line. + * + * Example: + * + * mg_http_send_redirect(nc, 302, mg_mk_str("/login"), mg_mk_str(NULL)); + */ +void mg_http_send_redirect(struct mg_connection *nc, int status_code, + const struct mg_str location, + const struct mg_str extra_headers); + +/* + * Sends the response line and headers. + * This function sends the response line with the `status_code`, and + * automatically + * sends one header: either "Content-Length" or "Transfer-Encoding". + * If `content_length` is negative, then "Transfer-Encoding: chunked" header + * is sent, otherwise, "Content-Length" header is sent. + * + * NOTE: If `Transfer-Encoding` is `chunked`, then message body must be sent + * using `mg_send_http_chunk()` or `mg_printf_http_chunk()` functions. + * Otherwise, `mg_send()` or `mg_printf()` must be used. + * Extra headers could be set through `extra_headers`. Note `extra_headers` + * must NOT be terminated by a new line. + */ +void mg_send_head(struct mg_connection *n, int status_code, + int64_t content_length, const char *extra_headers); + +/* + * Sends a printf-formatted HTTP chunk, escaping HTML tags. + */ +void mg_printf_html_escape(struct mg_connection *nc, const char *fmt, ...); + +#if MG_ENABLE_HTTP_URL_REWRITES +/* + * Proxies a given request to a given upstream http server. The path prefix + * in `mount` will be stripped of the path requested to the upstream server, + * e.g. if mount is /api and upstream is http://localhost:8001/foo + * then an incoming request to /api/bar will cause a request to + * http://localhost:8001/foo/bar + * + * EXPERIMENTAL API. Please use http_serve_http + url_rewrites if a static + * mapping is good enough. + */ +void mg_http_reverse_proxy(struct mg_connection *nc, + const struct http_message *hm, struct mg_str mount, + struct mg_str upstream); +#endif + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* MG_ENABLE_HTTP */ + +#endif /* CS_MONGOOSE_SRC_HTTP_SERVER_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/http_client.h" +#endif +/* + * === Client API reference + */ + +#ifndef CS_MONGOOSE_SRC_HTTP_CLIENT_H_ +#define CS_MONGOOSE_SRC_HTTP_CLIENT_H_ + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +/* + * Helper function that creates an outbound HTTP connection. + * + * `url` is the URL to fetch. It must be properly URL-encoded, e.g. have + * no spaces, etc. By default, `mg_connect_http()` sends the Connection and + * Host headers. `extra_headers` is an extra HTTP header to send, e.g. + * `"User-Agent: my-app\r\n"`. + * If `post_data` is NULL, then a GET request is created. Otherwise, a POST + * request is created with the specified POST data. Note that if the data being + * posted is a form submission, the `Content-Type` header should be set + * accordingly (see example below). + * + * Examples: + * + * ```c + * nc1 = mg_connect_http(mgr, ev_handler_1, "http://www.google.com", NULL, + * NULL); + * nc2 = mg_connect_http(mgr, ev_handler_1, "https://github.com", NULL, NULL); + * nc3 = mg_connect_http( + * mgr, ev_handler_1, "my_server:8000/form_submit/", + * "Content-Type: application/x-www-form-urlencoded\r\n", + * "var_1=value_1&var_2=value_2"); + * ``` + */ +struct mg_connection *mg_connect_http( + struct mg_mgr *mgr, + MG_CB(mg_event_handler_t event_handler, void *user_data), const char *url, + const char *extra_headers, const char *post_data); + +/* + * Helper function that creates an outbound HTTP connection. + * + * Mostly identical to mg_connect_http, but allows you to provide extra + *parameters + * (for example, SSL parameters) + */ +struct mg_connection *mg_connect_http_opt( + struct mg_mgr *mgr, MG_CB(mg_event_handler_t ev_handler, void *user_data), + struct mg_connect_opts opts, const char *url, const char *extra_headers, + const char *post_data); + +/* Creates digest authentication header for a client request. */ +int mg_http_create_digest_auth_header(char *buf, size_t buf_len, + const char *method, const char *uri, + const char *auth_domain, const char *user, + const char *passwd); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ +#endif /* CS_MONGOOSE_SRC_HTTP_CLIENT_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/mqtt.h" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + * This software is dual-licensed: you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 as + * published by the Free Software Foundation. For the terms of this + * license, see <http://www.gnu.org/licenses/>. + * + * You are free to use this software under the terms of the GNU General + * Public License, but WITHOUT ANY WARRANTY; without even the implied + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. + * See the GNU General Public License for more details. + * + * Alternatively, you can license this software under a commercial + * license, as set out in <https://www.cesanta.com/license>. + */ + +/* + * === MQTT API reference + */ + +#ifndef CS_MONGOOSE_SRC_MQTT_H_ +#define CS_MONGOOSE_SRC_MQTT_H_ + +/* Amalgamated: #include "mongoose/src/net.h" */ + +struct mg_mqtt_message { + int cmd; + int qos; + int len; /* message length in the IO buffer */ + struct mg_str topic; + struct mg_str payload; + + uint8_t connack_ret_code; /* connack */ + uint16_t message_id; /* puback */ + + /* connect */ + uint8_t protocol_version; + uint8_t connect_flags; + uint16_t keep_alive_timer; + struct mg_str protocol_name; + struct mg_str client_id; + struct mg_str will_topic; + struct mg_str will_message; + struct mg_str user_name; + struct mg_str password; +}; + +struct mg_mqtt_topic_expression { + const char *topic; + uint8_t qos; +}; + +struct mg_send_mqtt_handshake_opts { + unsigned char flags; /* connection flags */ + uint16_t keep_alive; + const char *will_topic; + const char *will_message; + const char *user_name; + const char *password; +}; + +/* mg_mqtt_proto_data should be in header to allow external access to it */ +struct mg_mqtt_proto_data { + uint16_t keep_alive; + double last_control_time; +}; + +/* Message types */ +#define MG_MQTT_CMD_CONNECT 1 +#define MG_MQTT_CMD_CONNACK 2 +#define MG_MQTT_CMD_PUBLISH 3 +#define MG_MQTT_CMD_PUBACK 4 +#define MG_MQTT_CMD_PUBREC 5 +#define MG_MQTT_CMD_PUBREL 6 +#define MG_MQTT_CMD_PUBCOMP 7 +#define MG_MQTT_CMD_SUBSCRIBE 8 +#define MG_MQTT_CMD_SUBACK 9 +#define MG_MQTT_CMD_UNSUBSCRIBE 10 +#define MG_MQTT_CMD_UNSUBACK 11 +#define MG_MQTT_CMD_PINGREQ 12 +#define MG_MQTT_CMD_PINGRESP 13 +#define MG_MQTT_CMD_DISCONNECT 14 + +/* MQTT event types */ +#define MG_MQTT_EVENT_BASE 200 +#define MG_EV_MQTT_CONNECT (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_CONNECT) +#define MG_EV_MQTT_CONNACK (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_CONNACK) +#define MG_EV_MQTT_PUBLISH (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PUBLISH) +#define MG_EV_MQTT_PUBACK (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PUBACK) +#define MG_EV_MQTT_PUBREC (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PUBREC) +#define MG_EV_MQTT_PUBREL (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PUBREL) +#define MG_EV_MQTT_PUBCOMP (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PUBCOMP) +#define MG_EV_MQTT_SUBSCRIBE (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_SUBSCRIBE) +#define MG_EV_MQTT_SUBACK (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_SUBACK) +#define MG_EV_MQTT_UNSUBSCRIBE (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_UNSUBSCRIBE) +#define MG_EV_MQTT_UNSUBACK (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_UNSUBACK) +#define MG_EV_MQTT_PINGREQ (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PINGREQ) +#define MG_EV_MQTT_PINGRESP (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_PINGRESP) +#define MG_EV_MQTT_DISCONNECT (MG_MQTT_EVENT_BASE + MG_MQTT_CMD_DISCONNECT) + +/* Message flags */ +#define MG_MQTT_RETAIN 0x1 +#define MG_MQTT_DUP 0x4 +#define MG_MQTT_QOS(qos) ((qos) << 1) +#define MG_MQTT_GET_QOS(flags) (((flags) &0x6) >> 1) +#define MG_MQTT_SET_QOS(flags, qos) (flags) = ((flags) & ~0x6) | ((qos) << 1) + +/* Connection flags */ +#define MG_MQTT_CLEAN_SESSION 0x02 +#define MG_MQTT_HAS_WILL 0x04 +#define MG_MQTT_WILL_RETAIN 0x20 +#define MG_MQTT_HAS_PASSWORD 0x40 +#define MG_MQTT_HAS_USER_NAME 0x80 +#define MG_MQTT_GET_WILL_QOS(flags) (((flags) &0x18) >> 3) +#define MG_MQTT_SET_WILL_QOS(flags, qos) \ + (flags) = ((flags) & ~0x18) | ((qos) << 3) + +/* CONNACK return codes */ +#define MG_EV_MQTT_CONNACK_ACCEPTED 0 +#define MG_EV_MQTT_CONNACK_UNACCEPTABLE_VERSION 1 +#define MG_EV_MQTT_CONNACK_IDENTIFIER_REJECTED 2 +#define MG_EV_MQTT_CONNACK_SERVER_UNAVAILABLE 3 +#define MG_EV_MQTT_CONNACK_BAD_AUTH 4 +#define MG_EV_MQTT_CONNACK_NOT_AUTHORIZED 5 + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +/* + * Attaches a built-in MQTT event handler to the given connection. + * + * The user-defined event handler will receive following extra events: + * + * - MG_EV_MQTT_CONNACK + * - MG_EV_MQTT_PUBLISH + * - MG_EV_MQTT_PUBACK + * - MG_EV_MQTT_PUBREC + * - MG_EV_MQTT_PUBREL + * - MG_EV_MQTT_PUBCOMP + * - MG_EV_MQTT_SUBACK + */ +void mg_set_protocol_mqtt(struct mg_connection *nc); + +/* Sends an MQTT handshake. */ +void mg_send_mqtt_handshake(struct mg_connection *nc, const char *client_id); + +/* Sends an MQTT handshake with optional parameters. */ +void mg_send_mqtt_handshake_opt(struct mg_connection *nc, const char *client_id, + struct mg_send_mqtt_handshake_opts); + +/* Publishes a message to a given topic. */ +void mg_mqtt_publish(struct mg_connection *nc, const char *topic, + uint16_t message_id, int flags, const void *data, + size_t len); + +/* Subscribes to a bunch of topics. */ +void mg_mqtt_subscribe(struct mg_connection *nc, + const struct mg_mqtt_topic_expression *topics, + size_t topics_len, uint16_t message_id); + +/* Unsubscribes from a bunch of topics. */ +void mg_mqtt_unsubscribe(struct mg_connection *nc, char **topics, + size_t topics_len, uint16_t message_id); + +/* Sends a DISCONNECT command. */ +void mg_mqtt_disconnect(struct mg_connection *nc); + +/* Sends a CONNACK command with a given `return_code`. */ +void mg_mqtt_connack(struct mg_connection *nc, uint8_t return_code); + +/* Sends a PUBACK command with a given `message_id`. */ +void mg_mqtt_puback(struct mg_connection *nc, uint16_t message_id); + +/* Sends a PUBREC command with a given `message_id`. */ +void mg_mqtt_pubrec(struct mg_connection *nc, uint16_t message_id); + +/* Sends a PUBREL command with a given `message_id`. */ +void mg_mqtt_pubrel(struct mg_connection *nc, uint16_t message_id); + +/* Sends a PUBCOMP command with a given `message_id`. */ +void mg_mqtt_pubcomp(struct mg_connection *nc, uint16_t message_id); + +/* + * Sends a SUBACK command with a given `message_id` + * and a sequence of granted QoSs. + */ +void mg_mqtt_suback(struct mg_connection *nc, uint8_t *qoss, size_t qoss_len, + uint16_t message_id); + +/* Sends a UNSUBACK command with a given `message_id`. */ +void mg_mqtt_unsuback(struct mg_connection *nc, uint16_t message_id); + +/* Sends a PINGREQ command. */ +void mg_mqtt_ping(struct mg_connection *nc); + +/* Sends a PINGRESP command. */ +void mg_mqtt_pong(struct mg_connection *nc); + +/* + * Extracts the next topic expression from a SUBSCRIBE command payload. + * + * The topic expression name will point to a string in the payload buffer. + * Returns the pos of the next topic expression or -1 when the list + * of topics is exhausted. + */ +int mg_mqtt_next_subscribe_topic(struct mg_mqtt_message *msg, + struct mg_str *topic, uint8_t *qos, int pos); + +/* + * Matches a topic against a topic expression + * + * Returns 1 if it matches; 0 otherwise. + */ +int mg_mqtt_match_topic_expression(struct mg_str exp, struct mg_str topic); + +/* + * Same as `mg_mqtt_match_topic_expression()`, but takes `exp` as a + * NULL-terminated string. + */ +int mg_mqtt_vmatch_topic_expression(const char *exp, struct mg_str topic); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* CS_MONGOOSE_SRC_MQTT_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/mqtt_server.h" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + * This software is dual-licensed: you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 as + * published by the Free Software Foundation. For the terms of this + * license, see <http://www.gnu.org/licenses/>. + * + * You are free to use this software under the terms of the GNU General + * Public License, but WITHOUT ANY WARRANTY; without even the implied + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. + * See the GNU General Public License for more details. + * + * Alternatively, you can license this software under a commercial + * license, as set out in <https://www.cesanta.com/license>. + */ + +/* + * === MQTT Server API reference + */ + +#ifndef CS_MONGOOSE_SRC_MQTT_BROKER_H_ +#define CS_MONGOOSE_SRC_MQTT_BROKER_H_ + +#if MG_ENABLE_MQTT_BROKER + +/* Amalgamated: #include "common/queue.h" */ +/* Amalgamated: #include "mongoose/src/mqtt.h" */ + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +#ifndef MG_MQTT_MAX_SESSION_SUBSCRIPTIONS +#define MG_MQTT_MAX_SESSION_SUBSCRIPTIONS 512 +#endif + +struct mg_mqtt_broker; + +/* MQTT session (Broker side). */ +struct mg_mqtt_session { + struct mg_mqtt_broker *brk; /* Broker */ + LIST_ENTRY(mg_mqtt_session) link; /* mg_mqtt_broker::sessions linkage */ + struct mg_connection *nc; /* Connection with the client */ + size_t num_subscriptions; /* Size of `subscriptions` array */ + void *user_data; /* User data */ + struct mg_mqtt_topic_expression *subscriptions; +}; + +/* MQTT broker. */ +struct mg_mqtt_broker { + LIST_HEAD(_mg_sesshead, mg_mqtt_session) sessions; /* Session list */ + void *user_data; /* User data */ +}; + +/* Initialises a MQTT broker. */ +void mg_mqtt_broker_init(struct mg_mqtt_broker *brk, void *user_data); + +/* + * Processes a MQTT broker message. + * + * The listening connection expects a pointer to an initialised + * `mg_mqtt_broker` structure in the `user_data` field. + * + * Basic usage: + * + * ```c + * mg_mqtt_broker_init(&brk, NULL); + * + * if ((nc = mg_bind(&mgr, address, mg_mqtt_broker)) == NULL) { + * // fail; + * } + * nc->user_data = &brk; + * ``` + * + * New incoming connections will receive a `mg_mqtt_session` structure + * in the connection `user_data`. The original `user_data` will be stored + * in the `user_data` field of the session structure. This allows the user + * handler to store user data before `mg_mqtt_broker` creates the session. + * + * Since only the MG_EV_ACCEPT message is processed by the listening socket, + * for most events the `user_data` will thus point to a `mg_mqtt_session`. + */ +void mg_mqtt_broker(struct mg_connection *brk, int ev, void *data); + +/* + * Iterates over all MQTT session connections. Example: + * + * ```c + * struct mg_mqtt_session *s; + * for (s = mg_mqtt_next(brk, NULL); s != NULL; s = mg_mqtt_next(brk, s)) { + * // Do something + * } + * ``` + */ +struct mg_mqtt_session *mg_mqtt_next(struct mg_mqtt_broker *brk, + struct mg_mqtt_session *s); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* MG_ENABLE_MQTT_BROKER */ +#endif /* CS_MONGOOSE_SRC_MQTT_BROKER_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/dns.h" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +/* + * === DNS API reference + */ + +#ifndef CS_MONGOOSE_SRC_DNS_H_ +#define CS_MONGOOSE_SRC_DNS_H_ + +/* Amalgamated: #include "mongoose/src/net.h" */ + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +#define MG_DNS_A_RECORD 0x01 /* Lookup IP address */ +#define MG_DNS_CNAME_RECORD 0x05 /* Lookup CNAME */ +#define MG_DNS_PTR_RECORD 0x0c /* Lookup PTR */ +#define MG_DNS_TXT_RECORD 0x10 /* Lookup TXT */ +#define MG_DNS_AAAA_RECORD 0x1c /* Lookup IPv6 address */ +#define MG_DNS_SRV_RECORD 0x21 /* Lookup SRV */ +#define MG_DNS_MX_RECORD 0x0f /* Lookup mail server for domain */ +#define MG_DNS_ANY_RECORD 0xff +#define MG_DNS_NSEC_RECORD 0x2f + +#define MG_MAX_DNS_QUESTIONS 32 +#define MG_MAX_DNS_ANSWERS 32 + +#define MG_DNS_MESSAGE 100 /* High-level DNS message event */ + +enum mg_dns_resource_record_kind { + MG_DNS_INVALID_RECORD = 0, + MG_DNS_QUESTION, + MG_DNS_ANSWER +}; + +/* DNS resource record. */ +struct mg_dns_resource_record { + struct mg_str name; /* buffer with compressed name */ + int rtype; + int rclass; + int ttl; + enum mg_dns_resource_record_kind kind; + struct mg_str rdata; /* protocol data (can be a compressed name) */ +}; + +/* DNS message (request and response). */ +struct mg_dns_message { + struct mg_str pkt; /* packet body */ + uint16_t flags; + uint16_t transaction_id; + int num_questions; + int num_answers; + struct mg_dns_resource_record questions[MG_MAX_DNS_QUESTIONS]; + struct mg_dns_resource_record answers[MG_MAX_DNS_ANSWERS]; +}; + +struct mg_dns_resource_record *mg_dns_next_record( + struct mg_dns_message *msg, int query, struct mg_dns_resource_record *prev); + +/* + * Parses the record data from a DNS resource record. + * + * - A: struct in_addr *ina + * - AAAA: struct in6_addr *ina + * - CNAME: char buffer + * + * Returns -1 on error. + * + * TODO(mkm): MX + */ +int mg_dns_parse_record_data(struct mg_dns_message *msg, + struct mg_dns_resource_record *rr, void *data, + size_t data_len); + +/* + * Sends a DNS query to the remote end. + */ +void mg_send_dns_query(struct mg_connection *nc, const char *name, + int query_type); + +/* + * Inserts a DNS header to an IO buffer. + * + * Returns the number of bytes inserted. + */ +int mg_dns_insert_header(struct mbuf *io, size_t pos, + struct mg_dns_message *msg); + +/* + * Appends already encoded questions from an existing message. + * + * This is useful when generating a DNS reply message which includes + * all question records. + * + * Returns the number of appended bytes. + */ +int mg_dns_copy_questions(struct mbuf *io, struct mg_dns_message *msg); + +/* + * Encodes and appends a DNS resource record to an IO buffer. + * + * The record metadata is taken from the `rr` parameter, while the name and data + * are taken from the parameters, encoded in the appropriate format depending on + * record type and stored in the IO buffer. The encoded values might contain + * offsets within the IO buffer. It's thus important that the IO buffer doesn't + * get trimmed while a sequence of records are encoded while preparing a DNS + * reply. + * + * This function doesn't update the `name` and `rdata` pointers in the `rr` + * struct because they might be invalidated as soon as the IO buffer grows + * again. + * + * Returns the number of bytes appended or -1 in case of error. + */ +int mg_dns_encode_record(struct mbuf *io, struct mg_dns_resource_record *rr, + const char *name, size_t nlen, const void *rdata, + size_t rlen); + +/* + * Encodes a DNS name. + */ +int mg_dns_encode_name(struct mbuf *io, const char *name, size_t len); + +/* Low-level: parses a DNS response. */ +int mg_parse_dns(const char *buf, int len, struct mg_dns_message *msg); + +/* + * Uncompresses a DNS compressed name. + * + * The containing DNS message is required because of the compressed encoding + * and reference suffixes present elsewhere in the packet. + * + * If the name is less than `dst_len` characters long, the remainder + * of `dst` is terminated with `\0` characters. Otherwise, `dst` is not + * terminated. + * + * If `dst_len` is 0 `dst` can be NULL. + * Returns the uncompressed name length. + */ +size_t mg_dns_uncompress_name(struct mg_dns_message *msg, struct mg_str *name, + char *dst, int dst_len); + +/* + * Attaches a built-in DNS event handler to the given listening connection. + * + * The DNS event handler parses the incoming UDP packets, treating them as DNS + * requests. If an incoming packet gets successfully parsed by the DNS event + * handler, a user event handler will receive an `MG_DNS_REQUEST` event, with + * `ev_data` pointing to the parsed `struct mg_dns_message`. + * + * See + * [captive_dns_server](https://github.com/cesanta/mongoose/tree/master/examples/captive_dns_server) + * example on how to handle DNS request and send DNS reply. + */ +void mg_set_protocol_dns(struct mg_connection *nc); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ +#endif /* CS_MONGOOSE_SRC_DNS_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/dns_server.h" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +/* + * === DNS server API reference + * + * Disabled by default; enable with `-DMG_ENABLE_DNS_SERVER`. + */ + +#ifndef CS_MONGOOSE_SRC_DNS_SERVER_H_ +#define CS_MONGOOSE_SRC_DNS_SERVER_H_ + +#if MG_ENABLE_DNS_SERVER + +/* Amalgamated: #include "mongoose/src/dns.h" */ + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +#define MG_DNS_SERVER_DEFAULT_TTL 3600 + +struct mg_dns_reply { + struct mg_dns_message *msg; + struct mbuf *io; + size_t start; +}; + +/* + * Creates a DNS reply. + * + * The reply will be based on an existing query message `msg`. + * The query body will be appended to the output buffer. + * "reply + recursion allowed" will be added to the message flags and the + * message's num_answers will be set to 0. + * + * Answer records can be appended with `mg_dns_send_reply` or by lower + * level function defined in the DNS API. + * + * In order to send a reply use `mg_dns_send_reply`. + * It's possible to use a connection's send buffer as reply buffer, + * and it will work for both UDP and TCP connections. + * + * Example: + * + * ```c + * reply = mg_dns_create_reply(&nc->send_mbuf, msg); + * for (i = 0; i < msg->num_questions; i++) { + * rr = &msg->questions[i]; + * if (rr->rtype == MG_DNS_A_RECORD) { + * mg_dns_reply_record(&reply, rr, 3600, &dummy_ip_addr, 4); + * } + * } + * mg_dns_send_reply(nc, &reply); + * ``` + */ +struct mg_dns_reply mg_dns_create_reply(struct mbuf *io, + struct mg_dns_message *msg); + +/* + * Appends a DNS reply record to the IO buffer and to the DNS message. + * + * The message's num_answers field will be incremented. It's the caller's duty + * to ensure num_answers is properly initialised. + * + * Returns -1 on error. + */ +int mg_dns_reply_record(struct mg_dns_reply *reply, + struct mg_dns_resource_record *question, + const char *name, int rtype, int ttl, const void *rdata, + size_t rdata_len); + +/* + * Sends a DNS reply through a connection. + * + * The DNS data is stored in an IO buffer pointed by reply structure in `r`. + * This function mutates the content of that buffer in order to ensure that + * the DNS header reflects the size and flags of the message, that might have + * been updated either with `mg_dns_reply_record` or by direct manipulation of + * `r->message`. + * + * Once sent, the IO buffer will be trimmed unless the reply IO buffer + * is the connection's send buffer and the connection is not in UDP mode. + */ +void mg_dns_send_reply(struct mg_connection *nc, struct mg_dns_reply *r); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* MG_ENABLE_DNS_SERVER */ +#endif /* CS_MONGOOSE_SRC_DNS_SERVER_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/resolv.h" +#endif +/* + * Copyright (c) 2014 Cesanta Software Limited + * All rights reserved + */ + +/* + * === API reference + */ + +#ifndef CS_MONGOOSE_SRC_RESOLV_H_ +#define CS_MONGOOSE_SRC_RESOLV_H_ + +/* Amalgamated: #include "mongoose/src/dns.h" */ + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +enum mg_resolve_err { + MG_RESOLVE_OK = 0, + MG_RESOLVE_NO_ANSWERS = 1, + MG_RESOLVE_EXCEEDED_RETRY_COUNT = 2, + MG_RESOLVE_TIMEOUT = 3 +}; + +typedef void (*mg_resolve_callback_t)(struct mg_dns_message *dns_message, + void *user_data, enum mg_resolve_err); + +/* Options for `mg_resolve_async_opt`. */ +struct mg_resolve_async_opts { + const char *nameserver; + int max_retries; /* defaults to 2 if zero */ + int timeout; /* in seconds; defaults to 5 if zero */ + int accept_literal; /* pseudo-resolve literal ipv4 and ipv6 addrs */ + int only_literal; /* only resolves literal addrs; sync cb invocation */ + struct mg_connection **dns_conn; /* return DNS connection */ +}; + +/* See `mg_resolve_async_opt()` */ +int mg_resolve_async(struct mg_mgr *mgr, const char *name, int query, + mg_resolve_callback_t cb, void *data); + +/* Set default DNS server */ +void mg_set_nameserver(struct mg_mgr *mgr, const char *nameserver); + +/* + * Resolved a DNS name asynchronously. + * + * Upon successful resolution, the user callback will be invoked + * with the full DNS response message and a pointer to the user's + * context `data`. + * + * In case of timeout while performing the resolution the callback + * will receive a NULL `msg`. + * + * The DNS answers can be extracted with `mg_next_record` and + * `mg_dns_parse_record_data`: + * + * [source,c] + * ---- + * struct in_addr ina; + * struct mg_dns_resource_record *rr = mg_next_record(msg, MG_DNS_A_RECORD, + * NULL); + * mg_dns_parse_record_data(msg, rr, &ina, sizeof(ina)); + * ---- + */ +int mg_resolve_async_opt(struct mg_mgr *mgr, const char *name, int query, + mg_resolve_callback_t cb, void *data, + struct mg_resolve_async_opts opts); + +/* + * Resolve a name from `/etc/hosts`. + * + * Returns 0 on success, -1 on failure. + */ +int mg_resolve_from_hosts_file(const char *host, union socket_address *usa); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ +#endif /* CS_MONGOOSE_SRC_RESOLV_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/coap.h" +#endif +/* + * Copyright (c) 2015 Cesanta Software Limited + * All rights reserved + * This software is dual-licensed: you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 as + * published by the Free Software Foundation. For the terms of this + * license, see <http://www.gnu.org/licenses/>. + * + * You are free to use this software under the terms of the GNU General + * Public License, but WITHOUT ANY WARRANTY; without even the implied + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. + * See the GNU General Public License for more details. + * + * Alternatively, you can license this software under a commercial + * license, as set out in <https://www.cesanta.com/license>. + */ + +/* + * === CoAP API reference + * + * CoAP message format: + * + * ``` + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- + * |Ver| T | TKL | Code | Message ID | Token (if any, TKL bytes) ... + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- + * | Options (if any) ... |1 1 1 1 1 1 1 1| Payload (if any) ... + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- + * ``` + */ + +#ifndef CS_MONGOOSE_SRC_COAP_H_ +#define CS_MONGOOSE_SRC_COAP_H_ + +#if MG_ENABLE_COAP + +#define MG_COAP_MSG_TYPE_FIELD 0x2 +#define MG_COAP_CODE_CLASS_FIELD 0x4 +#define MG_COAP_CODE_DETAIL_FIELD 0x8 +#define MG_COAP_MSG_ID_FIELD 0x10 +#define MG_COAP_TOKEN_FIELD 0x20 +#define MG_COAP_OPTIOMG_FIELD 0x40 +#define MG_COAP_PAYLOAD_FIELD 0x80 + +#define MG_COAP_ERROR 0x10000 +#define MG_COAP_FORMAT_ERROR (MG_COAP_ERROR | 0x20000) +#define MG_COAP_IGNORE (MG_COAP_ERROR | 0x40000) +#define MG_COAP_NOT_ENOUGH_DATA (MG_COAP_ERROR | 0x80000) +#define MG_COAP_NETWORK_ERROR (MG_COAP_ERROR | 0x100000) + +#define MG_COAP_MSG_CON 0 +#define MG_COAP_MSG_NOC 1 +#define MG_COAP_MSG_ACK 2 +#define MG_COAP_MSG_RST 3 +#define MG_COAP_MSG_MAX 3 + +#define MG_COAP_CODECLASS_REQUEST 0 +#define MG_COAP_CODECLASS_RESP_OK 2 +#define MG_COAP_CODECLASS_CLIENT_ERR 4 +#define MG_COAP_CODECLASS_SRV_ERR 5 + +#define MG_COAP_EVENT_BASE 300 +#define MG_EV_COAP_CON (MG_COAP_EVENT_BASE + MG_COAP_MSG_CON) +#define MG_EV_COAP_NOC (MG_COAP_EVENT_BASE + MG_COAP_MSG_NOC) +#define MG_EV_COAP_ACK (MG_COAP_EVENT_BASE + MG_COAP_MSG_ACK) +#define MG_EV_COAP_RST (MG_COAP_EVENT_BASE + MG_COAP_MSG_RST) + +/* + * CoAP options. + * Use mg_coap_add_option and mg_coap_free_options + * for creation and destruction. + */ +struct mg_coap_option { + struct mg_coap_option *next; + uint32_t number; + struct mg_str value; +}; + +/* CoAP message. See RFC 7252 for details. */ +struct mg_coap_message { + uint32_t flags; + uint8_t msg_type; + uint8_t code_class; + uint8_t code_detail; + uint16_t msg_id; + struct mg_str token; + struct mg_coap_option *options; + struct mg_str payload; + struct mg_coap_option *optiomg_tail; +}; + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +/* Sets CoAP protocol handler - triggers CoAP specific events. */ +int mg_set_protocol_coap(struct mg_connection *nc); + +/* + * Adds a new option to mg_coap_message structure. + * Returns pointer to the newly created option. + * Note: options must be freed by using mg_coap_free_options + */ +struct mg_coap_option *mg_coap_add_option(struct mg_coap_message *cm, + uint32_t number, char *value, + size_t len); + +/* + * Frees the memory allocated for options. + * If the cm parameter doesn't contain any option it does nothing. + */ +void mg_coap_free_options(struct mg_coap_message *cm); + +/* + * Composes a CoAP message from `mg_coap_message` + * and sends it into `nc` connection. + * Returns 0 on success. On error, it is a bitmask: + * + * - `#define MG_COAP_ERROR 0x10000` + * - `#define MG_COAP_FORMAT_ERROR (MG_COAP_ERROR | 0x20000)` + * - `#define MG_COAP_IGNORE (MG_COAP_ERROR | 0x40000)` + * - `#define MG_COAP_NOT_ENOUGH_DATA (MG_COAP_ERROR | 0x80000)` + * - `#define MG_COAP_NETWORK_ERROR (MG_COAP_ERROR | 0x100000)` + */ +uint32_t mg_coap_send_message(struct mg_connection *nc, + struct mg_coap_message *cm); + +/* + * Composes CoAP acknowledgement from `mg_coap_message` + * and sends it into `nc` connection. + * Return value: see `mg_coap_send_message()` + */ +uint32_t mg_coap_send_ack(struct mg_connection *nc, uint16_t msg_id); + +/* + * Parses CoAP message and fills mg_coap_message and returns cm->flags. + * This is a helper function. + * + * NOTE: usually CoAP works over UDP, so lack of data means format error. + * But, in theory, it is possible to use CoAP over TCP (according to RFC) + * + * The caller has to check results and treat COAP_NOT_ENOUGH_DATA according to + * underlying protocol: + * + * - in case of UDP COAP_NOT_ENOUGH_DATA means COAP_FORMAT_ERROR, + * - in case of TCP client can try to receive more data + * + * Return value: see `mg_coap_send_message()` + */ +uint32_t mg_coap_parse(struct mbuf *io, struct mg_coap_message *cm); + +/* + * Composes CoAP message from mg_coap_message structure. + * This is a helper function. + * Return value: see `mg_coap_send_message()` + */ +uint32_t mg_coap_compose(struct mg_coap_message *cm, struct mbuf *io); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* MG_ENABLE_COAP */ + +#endif /* CS_MONGOOSE_SRC_COAP_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/sntp.h" +#endif +/* + * Copyright (c) 2016 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_MONGOOSE_SRC_SNTP_H_ +#define CS_MONGOOSE_SRC_SNTP_H_ + +#if MG_ENABLE_SNTP + +#define MG_SNTP_EVENT_BASE 500 + +/* + * Received reply from time server. Event handler parameter contains + * pointer to mg_sntp_message structure + */ +#define MG_SNTP_REPLY (MG_SNTP_EVENT_BASE + 1) + +/* Received malformed SNTP packet */ +#define MG_SNTP_MALFORMED_REPLY (MG_SNTP_EVENT_BASE + 2) + +/* Failed to get time from server (timeout etc) */ +#define MG_SNTP_FAILED (MG_SNTP_EVENT_BASE + 3) + +struct mg_sntp_message { + /* if server sends this flags, user should not send requests to it */ + int kiss_of_death; + /* usual mg_time */ + double time; +}; + +/* Establishes connection to given sntp server */ +struct mg_connection *mg_sntp_connect(struct mg_mgr *mgr, + MG_CB(mg_event_handler_t event_handler, + void *user_data), + const char *sntp_server_name); + +/* Sends time request to given connection */ +void mg_sntp_send_request(struct mg_connection *c); + +/* + * Helper function + * Establishes connection to time server, tries to send request + * repeats sending SNTP_ATTEMPTS times every SNTP_TIMEOUT sec + * (if needed) + * See sntp_client example + */ +struct mg_connection *mg_sntp_get_time(struct mg_mgr *mgr, + mg_event_handler_t event_handler, + const char *sntp_server_name); + +#endif + +#endif /* CS_MONGOOSE_SRC_SNTP_H_ */ +#ifdef MG_MODULE_LINES +#line 1 "mongoose/src/socks.h" +#endif +/* + * Copyright (c) 2017 Cesanta Software Limited + * All rights reserved + */ + +#ifndef CS_MONGOOSE_SRC_SOCKS_H_ +#define CS_MONGOOSE_SRC_SOCKS_H_ + +#if MG_ENABLE_SOCKS + +#define MG_SOCKS_VERSION 5 + +#define MG_SOCKS_HANDSHAKE_DONE MG_F_USER_1 +#define MG_SOCKS_CONNECT_DONE MG_F_USER_2 + +/* SOCKS5 handshake methods */ +enum mg_socks_handshake_method { + MG_SOCKS_HANDSHAKE_NOAUTH = 0, /* Handshake method - no authentication */ + MG_SOCKS_HANDSHAKE_GSSAPI = 1, /* Handshake method - GSSAPI auth */ + MG_SOCKS_HANDSHAKE_USERPASS = 2, /* Handshake method - user/password auth */ + MG_SOCKS_HANDSHAKE_FAILURE = 0xff, /* Handshake method - failure */ +}; + +/* SOCKS5 commands */ +enum mg_socks_command { + MG_SOCKS_CMD_CONNECT = 1, /* Command: CONNECT */ + MG_SOCKS_CMD_BIND = 2, /* Command: BIND */ + MG_SOCKS_CMD_UDP_ASSOCIATE = 3, /* Command: UDP ASSOCIATE */ +}; + +/* SOCKS5 address types */ +enum mg_socks_address_type { + MG_SOCKS_ADDR_IPV4 = 1, /* Address type: IPv4 */ + MG_SOCKS_ADDR_DOMAIN = 3, /* Address type: Domain name */ + MG_SOCKS_ADDR_IPV6 = 4, /* Address type: IPv6 */ +}; + +/* SOCKS5 response codes */ +enum mg_socks_response { + MG_SOCKS_SUCCESS = 0, /* Response: success */ + MG_SOCKS_FAILURE = 1, /* Response: failure */ + MG_SOCKS_NOT_ALLOWED = 2, /* Response: connection not allowed */ + MG_SOCKS_NET_UNREACHABLE = 3, /* Response: network unreachable */ + MG_SOCKS_HOST_UNREACHABLE = 4, /* Response: network unreachable */ + MG_SOCKS_CONN_REFUSED = 5, /* Response: network unreachable */ + MG_SOCKS_TTL_EXPIRED = 6, /* Response: network unreachable */ + MG_SOCKS_CMD_NOT_SUPPORTED = 7, /* Response: network unreachable */ + MG_SOCKS_ADDR_NOT_SUPPORTED = 8, /* Response: network unreachable */ +}; + +#ifdef __cplusplus +extern "C" { +#endif /* __cplusplus */ + +/* Turn the connection into the SOCKS server */ +void mg_set_protocol_socks(struct mg_connection *c); + +/* Create socks tunnel for the client connection */ +struct mg_iface *mg_socks_mk_iface(struct mg_mgr *, const char *proxy_addr); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif +#endif diff --git a/mongoose/mongoose_interface.c b/mongoose/mongoose_interface.c index 53b9937..929a689 100644 --- a/mongoose/mongoose_interface.c +++ b/mongoose/mongoose_interface.c @@ -1,4 +1,7 @@ // +// Copyright (C) 2017 Weidmüller Interface GmbH & Co. KG +// Stefan Herbrechtsmeier <stefan.herbrechtsmeier@weidmueller.com> +// // (C) Copyright 2013 // Stefano Babic, DENX Software Engineering, sbabic@denx.de. // @@ -24,307 +27,196 @@ #define _XOPEN_SOURCE 600 // For PATH_MAX on linux -#include <sys/stat.h> +#include <stddef.h> #include <stdio.h> #include <stdlib.h> -#include <signal.h> -#include <string.h> -#include <errno.h> -#include <limits.h> -#include <stddef.h> -#include <stdarg.h> - #include <string.h> - -#include <ctype.h> -#include <sys/wait.h> #include <unistd.h> -#include <assert.h> -#include "mongoose.h" -#include "mongoose_interface.h" -#include "network_ipc.h" -#include "parselib.h" -#include "util.h" -#include "swupdate_settings.h" - -#ifdef USE_LUA -#include <lua.h> -#include <lauxlib.h> -#endif - -#define DIRSEP '/' -#define MAX_CONF_FILE_LINE_SIZE (8 * 1024) -#define BUF_LEN 8192 - -static char server_name[40]; // Set by init_server_name() -static struct mg_context *ctx; // Set by start_mongoose() - -#if !defined(CONFIG_FILE) -#define CONFIG_FILE "mongoose.conf" -#endif /* !CONFIG_FILE */ - -static void upload_handler(struct mg_connection *conn, - const char __attribute__ ((__unused__)) *path) { - mg_printf(conn, "%s", "HTTP/1.1 200 OK\r\n\r\n"); - mg_printf(conn, "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Transitional//EN\"\n" - "\"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd\">\n" - "<html xmlns=\"http://www.w3.org/1999/xhtml\">"); - mg_printf(conn, "<head><meta http-equiv=\"refresh\" content=\"0; url=./update.html\" />" - "</head></html>"); -} +#include <getopt.h> -static void die(const char *fmt, ...) { - va_list ap; - char msg[200]; +#include <network_ipc.h> +#include <mongoose_interface.h> +#include <parselib.h> +#include <progress_ipc.h> +#include <swupdate_settings.h> - va_start(ap, fmt); - vsnprintf(msg, sizeof(msg), fmt, ap); - va_end(ap); - - fprintf(stderr, "%s\n", msg); +#include "mongoose.h" - exit(EXIT_FAILURE); +#define MG_LISTING "no" +#define MG_PORT "8080" +#define MG_ROOT "." + +struct mongoose_options { + char *root; + char *listing; + char *port; +#if MG_ENABLE_SSL + char *ssl_cert; + char *ssl_key; +#endif +}; + +struct file_upload_state { + size_t len; + int fd; +}; + +static struct mg_serve_http_opts s_http_server_opts; + +#ifndef CONFIG_MONGOOSE_API_DEPRECATED +#define enum_string(x) [x] = #x +static const char *get_status_string(unsigned int status) { + const char * const str[] = { + enum_string(IDLE), + enum_string(START), + enum_string(RUN), + enum_string(SUCCESS), + enum_string(FAILURE), + enum_string(DOWNLOAD), + enum_string(DONE), + enum_string(SUBPROCESS) + }; + + if (status >= ARRAY_SIZE(str)) + return "UNKNOWN"; + + return str[status]; } -static void verify_document_root(const char *root) { - const char *p, *path; - char buf[PATH_MAX]; - struct stat st; +#define enum_source_string(x) [SOURCE_##x] = #x +static const char *get_source_string(unsigned int source) { + const char * const str[] = { + enum_source_string(UNKNOWN), + enum_source_string(WEBSERVER), + enum_source_string(SURICATTA), + enum_source_string(DOWNLOADER), + enum_source_string(LOCAL) + }; - path = root; - if ((p = strchr(root, ',')) != NULL && (size_t) (p - root) < sizeof(buf)) { - memcpy(buf, root, p - root); - buf[p - root] = '\0'; - path = buf; - } + if (source >= ARRAY_SIZE(str)) + return "UNKNOWN"; - if (stat(path, &st) != 0 || !S_ISDIR(st.st_mode)) { - die("Invalid root directory: [%s]: %s", root, strerror(errno)); - } + return str[source]; } +#endif -static void set_option(char **options, const char *name, const char *value) { - int i; +static void upload_handler(struct mg_connection *nc, int ev, void *p) { + struct mg_http_multipart_part *mp; + struct file_upload_state *fus; +#ifdef CONFIG_MONGOOSE_API_DEPRECATED + struct mg_str *filename, *data; + struct http_message *hm; + size_t length; + char buf[16]; + int fd; +#endif - if (!strcmp(name, "document_root") || !(strcmp(name, "r"))) { - verify_document_root(value); - } + switch (ev) { +#ifdef CONFIG_MONGOOSE_API_DEPRECATED + case MG_EV_HTTP_REQUEST: + hm = (struct http_message *) p; - for (i = 0; i < MAX_OPTIONS - 3; i++) { - if (options[i] == NULL) { - options[i] = sdup(name); - options[i + 1] = sdup(value); - options[i + 2] = NULL; - break; + filename = mg_get_http_header(hm, "X_FILENAME"); + if (filename == NULL) { + mg_http_send_error(nc, 403, NULL); + return; } - } - - if (i == MAX_OPTIONS - 3) { - die("%s", "Too many options specified"); - } -} - -static int mongoose_settings(void *elem, void *data) -{ - char **options = (char **)data; - const char **names = mg_get_valid_option_names(); - int i; - char tmp[128]; - for (i = 0; names[i] != NULL; i += 2) { - tmp[0] = '\0'; - GET_FIELD_STRING(LIBCFG_PARSER, elem, - names[i], tmp); - if (strlen(tmp)) { - set_option(options, names[i], tmp); - fprintf(stdout, "Setting %s --> %s\n", names[i], tmp); + data = mg_get_http_header(hm, "Content-length"); + if (data == NULL || data->len >= ARRAY_SIZE(buf)) { + mg_http_send_error(nc, 403, NULL); + return; } - } - - return 0; - -} - -static void process_command_line_arguments(const char *filename, int argc, char *argv[], char **options) { - size_t i, cmd_line_opts_start = 1; + memcpy(buf, data->p, data->len); + buf[data->len] = '\0'; + length = strtoul(data->p, NULL, 10); + if (length == 0) { + mg_http_send_error(nc, 403, NULL); + return; + } - options[0] = NULL; + fd = ipc_inst_start(); + ipc_send_data(fd, (char *) hm->body.p, hm->body.len); + ipc_end(fd); - if (filename) - read_module_settings(filename, "webserver", mongoose_settings, options); + mg_send_response_line(nc, 200, + "Content-Type: text/plain\r\n" + "Connection: close"); + mg_send(nc, "\r\n", 2); + mg_printf(nc, "Ok, %.*s - %d bytes.\r\n", (int) filename->len, filename->p, (int) length); + nc->flags |= MG_F_SEND_AND_CLOSE; - if (!argc) - return; + break; +#endif + case MG_EV_HTTP_PART_BEGIN: + mp = (struct mg_http_multipart_part *) p; - // Handle command line flags. - // They override config file and default settings. - for (i = cmd_line_opts_start; argv[i] != NULL && i < argc - 1; i += 2) { - if (argv[i][0] != '-' || argv[i + 1] == NULL) { - // show_usage_and_exit(); + fus = (struct file_upload_state *) calloc(1, sizeof(*fus)); + if (fus == NULL) { + mg_http_send_error(nc, 500, "Out of memory"); + break; } - set_option(options, &argv[i][1], argv[i + 1]); - } -} -static void init_server_name(void) { - snprintf(server_name, sizeof(server_name), "Mongoose web server v. %s", - mg_version()); -} + fus->fd = ipc_inst_start(); + if (fus->fd < 0) { + mg_http_send_error(nc, 500, "Failed to queue command"); + free(fus); + break; + } -static int log_message(const struct mg_connection *conn, const char *message) { - (void) conn; - printf("%s\n", message); - return 0; -} + mp->user_data = fus; -static int recovery_upload(struct mg_connection *conn) { - const char *content_type_header, *boundary_start; - char buf[BUF_LEN], path[PATH_MAX], fname[1024], boundary[100]; - int bl = 0, n, i, j, headers_len = 0, boundary_len = 0, len = 0, num_uploaded_files = 0; - int instfd; - int file_length; - int nbytes = 0; - int XHTTPRequest = 0; - - // Request looks like this: - // - // POST /upload HTTP/1.1 - // Host: 127.0.0.1:8080 - // Content-Length: 244894 - // Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryRVr - // - // ------WebKitFormBoundaryRVr - // Content-Disposition: form-data; name="file"; filename="accum.png" - // Content-Type: image/png - // - // <89>PNG - // <PNG DATA> - // ------WebKitFormBoundaryRVr - - fname[0] = '\0'; - // Extract boundary string from the Content-Type header - if ((content_type_header = mg_get_header(conn, "Content-Type")) == NULL || - (boundary_start = mg_strcasestr(content_type_header, - "boundary=")) == NULL || - (sscanf(boundary_start, "boundary=\"%99[^\"]\"", boundary) == 0 && - sscanf(boundary_start, "boundary=%99s", boundary) == 0) || - boundary[0] == '\0') { - - if ((content_type_header = mg_get_header(conn, "X_FILENAME")) == NULL) - return num_uploaded_files; - strncpy(fname, content_type_header, sizeof(fname)); - if ((content_type_header = mg_get_header(conn, "Content-length")) == NULL) - return num_uploaded_files; - file_length = strtoul(content_type_header, NULL, 10); - printf("X_FILENAME: %s length: %d\n", fname, file_length); - XHTTPRequest = 1; - } + break; - /* - * if it is not a HTTPRequest(), get boundary to retrieve - * position of the file and the filename - */ - if (!XHTTPRequest) { - boundary_len = strlen(boundary); - bl = boundary_len + 4; // \r\n--<boundary> - - // Pull in headers - assert(len >= 0 && len <= (int) sizeof(buf)); - while ((n = mg_read(conn, buf + len, sizeof(buf) - len)) > 0) { - len += n; - } - if ((headers_len = get_request_len(buf, len)) <= 0) { - //break; - return num_uploaded_files; - } + case MG_EV_HTTP_PART_DATA: + mp = (struct mg_http_multipart_part *) p; + fus = (struct file_upload_state *) mp->user_data; - // Fetch file name. - fname[0] = '\0'; - for (i = j = 0; i < headers_len; i++) { - if (buf[i] == '\r' && buf[i + 1] == '\n') { - buf[i] = buf[i + 1] = '\0'; - // TODO(lsm): don't expect filename to be the 3rd field, - // parse the header properly instead. - sscanf(&buf[j], "Content-Disposition: %*s %*s filename=\"%1023[^\"]", - fname); - j = i + 2; - } - } - } else { - while ((n = mg_read(conn, buf + len, sizeof(buf) - len)) > 0) { - len += n; - } - } + if (!fus) + break; - // Give up if the headers are not what we expect - if (fname[0] == '\0') { - //break; - return num_uploaded_files; - } + ipc_send_data(fus->fd, (char *) mp->data.p, mp->data.len); + fus->len += mp->data.len; + break; - instfd = ipc_inst_start(); - if (instfd < 0) { - return num_uploaded_files; - } + case MG_EV_HTTP_PART_END: + mp = (struct mg_http_multipart_part *) p; + fus = (struct file_upload_state *) mp->user_data; - // Move data to the beginning of the buffer - assert(len >= headers_len); - memmove(buf, &buf[headers_len], len - headers_len); - len -= headers_len; - - // Read POST data, write into file until boundary is found. - n = 0; - nbytes = len; - do { - len += n; - nbytes+=n; - if (!XHTTPRequest) { - for (i = 0; i < len - bl; i++) { - if (!memcmp(&buf[i], "\r\n--", 4) && - !memcmp(&buf[i + 4], boundary, boundary_len)) { - // Found boundary, that's the end of file data. - - ipc_send_data(instfd, buf, i); - num_uploaded_files++; - upload_handler(conn, path); - - memmove(buf, &buf[i + bl], len - (i + bl)); - len -= i + bl; - break; - } - } - } else { - if (nbytes >= file_length) { - ipc_send_data(instfd, buf, len); - num_uploaded_files++; - upload_handler(conn, path); - break; - } + if (!fus) + break; - } - if (len > bl) { - ipc_send_data(instfd, buf, len - bl); - memmove(buf, &buf[len - bl], bl); - len = bl; - } - } while ((n = mg_read(conn, buf + len, sizeof(buf) - len)) > 0); - ipc_end(instfd); + ipc_end(fus->fd); - return num_uploaded_files; + mg_send_response_line(nc, 200, + "Content-Type: text/plain\r\n" + "Connection: close"); + mg_send(nc, "\r\n", 2); + mg_printf(nc, "Ok, %s - %d bytes.\r\n", mp->file_name, (int) fus->len); + nc->flags |= MG_F_SEND_AND_CLOSE; + + mp->user_data = NULL; + free(fus); + break; + } } -static void recovery_status(struct mg_connection *conn) { +#ifdef CONFIG_MONGOOSE_API_DEPRECATED +static void recovery_status(struct mg_connection *nc, int ev, void *ev_data) { ipc_message ipc; int ret; char buf[4096]; + (void)ev; + (void)ev_data; + ret = ipc_get_status(&ipc); if (ret) { - mg_printf(conn, "%s", "HTTP/1.0 500 Internal Server Error\r\n\r\n"); + mg_http_send_error(nc, 500, NULL); return; } @@ -338,53 +230,56 @@ static void recovery_status(struct mg_connection *conn) { ipc.data.status.current, strlen(ipc.data.status.desc) ? ipc.data.status.desc : "", ipc.data.status.error, - ipc.data.status.last_result - ); + ipc.data.status.last_result); - mg_printf(conn, - "HTTP/1.1 200 OK\r\n" + mg_send_head(nc, 200, strlen(buf), "Cache: no-cache\r\n" - "Content-Type: text/plain\r\n" - "Content-Length: %u\r\n" - "\r\n", (unsigned int)strlen(buf)); - mg_write(conn, buf, strlen(buf)); + "Content-Type: text/plain"); + + mg_send(nc, buf, strlen(buf)); + + nc->flags |= MG_F_SEND_AND_CLOSE; } -static void reboot_target(struct mg_connection *conn) { - const struct mg_request_info * reqInfo = mg_get_request_info(conn); +static void reboot_target(struct mg_connection *nc, int ev, void *ev_data) { + struct http_message *hm = (struct http_message *) ev_data; int ret; - if(!strcmp(reqInfo->request_method,"POST")) { - mg_printf(conn, - "HTTP/1.1 200 OK\r\n" - "Content-Type: text/plain\r\n" - "\r\n" - "Device will reboot now."); - ret = system("reboot"); + (void)ev; + + if(mg_vcasecmp(&hm->method, "POST") == 0) { + ret = system("echo"); if (ret) { - mg_printf(conn, - "HTTP/1.1 200 OK\r\n" - "Content-Type: text/plain\r\n" - "\r\n" + mg_http_send_error(nc, 500, "Device cannot be reboot, internal fault."); + return; } + + mg_http_send_error(nc, 200, "Device will reboot now."); } else { - mg_printf(conn, - "HTTP/1.1 200 OK\r\n" + mg_send_response_line(nc, 200, "Content-Type: text/html\r\n" - "\r\n" - "<form method='POST' action=''><input type='submit' value='Reboot'></form>"); + "Connection: close"); + mg_send(nc, "\r\n", 2); + mg_printf(nc, + "<form method='POST' action=''>" + "<input type='submit' value='Reboot'>" + "</form>"); + nc->flags |= MG_F_SEND_AND_CLOSE; } } -static void post_update_cmd(struct mg_connection *conn) { +static void post_update_cmd(struct mg_connection *nc, int ev, void *ev_data) { ipc_message msg; + + (void)ev; + (void)ev_data; + int ret = ipc_postupdate(&msg); - mg_printf(conn, - "HTTP/1.1 200 OK\r\n" - "Content-Type: application/json\r\n" - "\r\n" + mg_send_response_line(nc, 200, "Content-Type: application/json"); + mg_send(nc, "\r\n", 2); + mg_printf(nc, "{\r\n" "\t\"code\": %d,\r\n" "\t\"error\": \"%s\",\r\n" @@ -393,70 +288,311 @@ static void post_update_cmd(struct mg_connection *conn) { (ret == 0) ? 200 : 501, (ret == 0) ? "" : "Internal server error", (ret == 0) ? "" : "Failed to queue command"); + + nc->flags |= MG_F_SEND_AND_CLOSE; } +#else +static void restart_handler(struct mg_connection *nc, int ev, void *ev_data) { + struct http_message *hm = (struct http_message *) ev_data; + ipc_message msg; + + (void)ev; -static int begin_request_handler(struct mg_connection *conn) { - if (!strcmp(mg_get_request_info(conn)->uri, "/handle_post_request")) { - recovery_upload(conn); - return 1; + if(mg_vcasecmp(&hm->method, "POST") != 0) { + mg_http_send_error(nc, 405, "Method Not Allowed"); + return; } - if (!strcmp(mg_get_request_info(conn)->uri, "/getstatus.json")) { - recovery_status(conn); - return 1; + + int ret = ipc_postupdate(&msg); + if (ret) { + mg_http_send_error(nc, 500, "Failed to queue command"); + return; } - if (!strcmp(mg_get_request_info(conn)->uri, "/rebootTarget")) { - reboot_target(conn); - return 1; + + mg_http_send_error(nc, 201, "Device will reboot now."); +} + +static void broadcast(struct mg_mgr *mgr, char *str) { + struct mg_connection *nc; + + for (nc = mg_next(mgr, NULL); nc != NULL; nc = mg_next(mgr, nc)) { + if (nc->flags & MG_F_IS_WEBSOCKET) { + mg_send_websocket_frame(nc, WEBSOCKET_OP_TEXT, str, strlen(str)); + } } - if (!strcmp(mg_get_request_info(conn)->uri, "/postUpdateCommand") - && !strcmp(mg_get_request_info(conn)->request_method,"POST")) { - post_update_cmd(conn); - return 1; +} + +static void broadcast_message(struct mg_mgr *mgr) { + ipc_message msg; + int ret; + char buf[4096]; + + if (mg_next(mgr, NULL) == NULL) + return; + + ret = ipc_get_status(&msg); + if (ret) { + return; + } + + if (strlen(msg.data.status.desc) == 0) + return; + + snprintf(buf, sizeof(buf), + "{\r\n" + "\t\"type\": \"message\",\r\n" + "\t\"level\": \"%d\",\r\n" + "\t\"text\": \"%s\"\r\n" + "}\r\n", + (msg.data.status.error) ? 3 : 6, /* RFC 5424 */ + msg.data.status.desc); + + broadcast(mgr, buf); +} + +static void broadcast_progress(struct mg_mgr *mgr) { + struct progress_msg msg; + static int status = IDLE; + static int source = SOURCE_UNKNOWN; + static int step = 0; + static int percent = 0; + static int fd = -1; + long flags; + char buf[4096]; + int ret; + + if (mg_next(mgr, NULL) == NULL) + return; + + if (fd < 0) { + fd = progress_ipc_connect(true); + flags = fcntl(fd, F_GETFL); + flags |= O_NONBLOCK; + fcntl(fd, F_SETFL, flags); + } + + ret = progress_ipc_receive(&fd, &msg); + if (ret != sizeof(msg)) + return; + + + if (msg.status != status || msg.status == FAILURE) { + status = msg.status; + snprintf(buf, sizeof(buf), + "{\r\n" + "\t\"type\": \"status\",\r\n" + "\t\"status\": \"%s\"\r\n" + "}\r\n", + get_status_string(msg.status)); + broadcast(mgr, buf); + } + + if (msg.source != source) { + source = msg.source; + snprintf(buf, sizeof(buf), + "{\r\n" + "\t\"type\": \"source\",\r\n" + "\t\"source\": \"%s\"\r\n" + "}\r\n", + get_source_string(msg.source)); + broadcast(mgr, buf); + } + + if (msg.infolen) { + snprintf(buf, sizeof(buf), + "{\r\n" + "\t\"type\": \"info\",\r\n" + "\t\"source\": \"%s\"\r\n" + "}\r\n", + msg.info); + broadcast(mgr, buf); + } + + if ((msg.cur_step != step || msg.cur_percent != percent) && + msg.cur_step) { + snprintf(buf, sizeof(buf), + "{\r\n" + "\t\"type\": \"step\",\r\n" + "\t\"number\": \"%d\",\r\n" + "\t\"step\": \"%d\",\r\n" + "\t\"name\": \"%s\",\r\n" + "\t\"percent\": \"%d\"\r\n" + "}\r\n", + msg.nsteps, + msg.cur_step, + msg.cur_step ? msg.cur_image: "", + msg.cur_percent); + step = msg.cur_step; + percent = msg.cur_percent; + broadcast(mgr, buf); } - return 0; } +#endif -static void start_mongoose_server(char **options) { - struct mg_callbacks callbacks; - int i; +static void ev_handler(struct mg_connection *nc, int ev, void *ev_data) { + if (ev == MG_EV_HTTP_REQUEST) { + mg_serve_http(nc, ev_data, s_http_server_opts); + } - init_server_name(); +} - /* Start Mongoose */ - memset(&callbacks, 0, sizeof(callbacks)); - callbacks.log_message = &log_message; +static int mongoose_settings(void *elem, void __attribute__ ((__unused__)) *data) +{ + struct mongoose_options *opts = (struct mongoose_options *)data; + char tmp[128]; - callbacks.begin_request = begin_request_handler; - callbacks.upload = upload_handler; + GET_FIELD_STRING(LIBCFG_PARSER, elem, "document_root", tmp); + if (strlen(tmp)) { + opts->root = strdup(tmp); + } - ctx = mg_start(&callbacks, NULL, (const char **) options); - for (i = 0; options[i] != NULL; i++) { - free(options[i]); + GET_FIELD_STRING(LIBCFG_PARSER, elem, "enable_directory_listing", tmp); + if (strlen(tmp)) { + opts->listing = strdup(tmp); } - if (ctx == NULL) { - die("%s", "Failed to start Mongoose."); + GET_FIELD_STRING(LIBCFG_PARSER, elem, "listening_ports", tmp); + if (strlen(tmp)) { + opts->port = strdup(tmp); } - printf("%s with pid %d started on port(s) %s with web root [%s]\n", - server_name, getpid(), mg_get_option(ctx, "listening_ports"), - mg_get_option(ctx, "document_root")); + GET_FIELD_STRING(LIBCFG_PARSER, elem, "ssl_certificate", tmp); + if (strlen(tmp)) { + opts->ssl_cert = strdup(tmp); + } + + GET_FIELD_STRING(LIBCFG_PARSER, elem, "ssl_certificate_key", tmp); + if (strlen(tmp)) { + opts->ssl_key = strdup(tmp); + } + return 0; +} + + +static struct option long_options[] = { + {"listing", no_argument, NULL, 'l'}, + {"port", required_argument, NULL, 'p'}, + {"ssl", no_argument, NULL, 's'}, + {"ssl-cert", required_argument, NULL, 'C'}, + {"ssl-key", required_argument, NULL, 'K'}, + {"document-root", required_argument, NULL, 'r'}, + {NULL, 0, NULL, 0} +}; + +void mongoose_print_help(void) +{ + fprintf( + stdout, + "\tmongoose arguments:\n" + "\t -l, --listing <port> : enable directory listing (default: %s)\n" + "\t -p, --port <port> : server port number (default: %s)\n" + "\t -s, --ssl : enable ssl support\n" + "\t -C, --ssl-cert <cert> : ssl certificate to present to clients\n" + "\t -K, --ssl-key <key> : key corresponding to the ssl certificate\n" + "\t -r, --document-root <path> : path to document root directory (default: %s)\n", + MG_LISTING, MG_PORT, MG_ROOT); } int start_mongoose(const char *cfgfname, int argc, char *argv[]) { + struct mongoose_options opts; + struct mg_mgr mgr; + struct mg_connection *nc; + struct mg_bind_opts bind_opts; + const char *s_http_port = NULL; + const char *err_str; +#if MG_ENABLE_SSL + bool ssl = false; +#endif + int choice = 0; + + memset(&opts, 0, sizeof(opts)); + if (cfgfname) { + read_module_settings(cfgfname, "webserver", mongoose_settings, &opts); + } + + optind = 1; + while ((choice = getopt_long(argc, argv, "lp:sC:K:r:", + long_options, NULL)) != -1) { + switch (choice) { + case 'l': + free(opts.listing); + opts.listing = strdup(optarg); + break; + case 'p': + free(opts.port); + opts.port = strdup(optarg); + break; +#if MG_ENABLE_SSL + case 's': + ssl = true; + break; + case 'C': + free(opts.ssl_cert); + opts.ssl_cert = strdup(optarg); + break; + case 'K': + free(opts.ssl_key); + opts.ssl_key = strdup(optarg); + break; +#endif + case 'r': + free(opts.root); + opts.root = strdup(optarg); + break; + case '?': + default: + return -EINVAL; + } + } - char *options[MAX_OPTIONS]; + s_http_server_opts.document_root = + opts.root ? opts.root : MG_ROOT; + s_http_server_opts.enable_directory_listing = + opts.listing ? opts.listing : MG_LISTING; + s_http_port = opts.port ? opts.port : MG_PORT; + + memset(&bind_opts, 0, sizeof(bind_opts)); + bind_opts.error_string = &err_str; +#if MG_ENABLE_SSL + if (ssl) { + bind_opts.ssl_cert = opts.ssl_cert; + bind_opts.ssl_key = opts.ssl_key; + } +#endif - /* Update config based on command line arguments */ - process_command_line_arguments(cfgfname, argc, argv, options); + mg_mgr_init(&mgr, NULL); - start_mongoose_server(options); + nc = mg_bind_opt(&mgr, s_http_port, ev_handler, bind_opts); + if (nc == NULL) { + fprintf(stderr, "Failed to start Mongoose: %s\n", *bind_opts.error_string); + exit(EXIT_FAILURE); + } - while (1) { - sleep(1000); +#ifdef CONFIG_MONGOOSE_API_DEPRECATED + mg_register_http_endpoint(nc, "/handle_post_request", MG_CB(upload_handler, NULL)); + mg_register_http_endpoint(nc, "/getstatus.json", MG_CB(recovery_status, NULL)); + mg_register_http_endpoint(nc, "/rebootTarget", MG_CB(reboot_target, NULL)); + mg_register_http_endpoint(nc, "/postUpdateCommand", MG_CB(post_update_cmd, NULL)); +#else + mg_register_http_endpoint(nc, "/restart", restart_handler); +#endif + mg_register_http_endpoint(nc, "/upload", MG_CB(upload_handler, NULL)); + mg_set_protocol_http_websocket(nc); + + printf("Mongoose web server version %s with pid %d started on port(s) %s with web root [%s]\n", + MG_VERSION, getpid(), s_http_port, + s_http_server_opts.document_root); + + for (;;) { + mg_mgr_poll(&mgr, 100); +#ifndef CONFIG_MONGOOSE_API_DEPRECATED + broadcast_message(&mgr); + broadcast_progress(&mgr); +#endif } + mg_mgr_free(&mgr); return 0; }