
Done entirely with `git grep` and `sed` + `git cl format`, no hand-editing. Bug: 386918226 Change-Id: I461de5e70f82be3a95a1db69cca9c77152846c4b Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/6201478 Commit-Queue: Adam Rice <ricea@chromium.org> Auto-Submit: Peter Kasting <pkasting@chromium.org> Code-Coverage: findit-for-me@appspot.gserviceaccount.com <findit-for-me@appspot.gserviceaccount.com> Reviewed-by: Adam Rice <ricea@chromium.org> Cr-Commit-Position: refs/heads/main@{#1412815}
310 lines
11 KiB
C++
310 lines
11 KiB
C++
// Copyright 2012 The Chromium Authors
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "net/websockets/websocket_frame.h"
|
|
|
|
#include <stddef.h>
|
|
#include <string.h>
|
|
|
|
#include <algorithm>
|
|
#include <ostream>
|
|
|
|
#include "base/check.h"
|
|
#include "base/check_op.h"
|
|
#include "base/containers/span.h"
|
|
#include "base/containers/span_writer.h"
|
|
#include "base/numerics/safe_conversions.h"
|
|
#include "base/rand_util.h"
|
|
#include "base/strings/string_util.h"
|
|
#include "build/build_config.h"
|
|
#include "net/base/net_errors.h"
|
|
#include "net/websockets/websocket_errors.h"
|
|
|
|
namespace net {
|
|
|
|
namespace {
|
|
|
|
// GCC (and Clang) can transparently use vector ops. Only try to do this on
|
|
// architectures where we know it works, otherwise gcc will attempt to emulate
|
|
// the vector ops, which is unlikely to be efficient.
|
|
#if defined(COMPILER_GCC) && \
|
|
(defined(ARCH_CPU_X86_FAMILY) || defined(ARCH_CPU_ARM_FAMILY))
|
|
|
|
using PackedMaskType = uint32_t __attribute__((vector_size(16)));
|
|
}
|
|
} // namespace net
|
|
|
|
// TODO(https://github.com/llvm/llvm-project/issues/119290): Until
|
|
// `std::has_unique_object_representations_v<>` works correctly for vector
|
|
// types, explicitly mark this as safe to convert to/from bytes.
|
|
namespace base {
|
|
template <>
|
|
inline constexpr bool kCanSafelyConvertToByteSpan<net::PackedMaskType> = true;
|
|
}
|
|
|
|
namespace net {
|
|
namespace {
|
|
#else
|
|
|
|
using PackedMaskType = size_t;
|
|
|
|
#endif // defined(COMPILER_GCC) &&
|
|
// (defined(ARCH_CPU_X86_FAMILY) || defined(ARCH_CPU_ARM_FAMILY))
|
|
|
|
constexpr size_t kWebSocketCloseCodeLength = 2;
|
|
|
|
constexpr uint8_t kFinalBit = 0x80;
|
|
constexpr uint8_t kReserved1Bit = 0x40;
|
|
constexpr uint8_t kReserved2Bit = 0x20;
|
|
constexpr uint8_t kReserved3Bit = 0x10;
|
|
constexpr uint8_t kOpCodeMask = 0xF;
|
|
constexpr uint8_t kMaskBit = 0x80;
|
|
constexpr uint64_t kMaxPayloadLengthWithoutExtendedLengthField = 125;
|
|
constexpr uint64_t kPayloadLengthWithTwoByteExtendedLengthField = 126;
|
|
constexpr uint64_t kPayloadLengthWithEightByteExtendedLengthField = 127;
|
|
|
|
inline void MaskWebSocketFramePayloadByBytes(
|
|
const WebSocketMaskingKey& masking_key,
|
|
size_t masking_key_offset,
|
|
const base::span<uint8_t> payload) {
|
|
uint8_t* data = payload.data();
|
|
const size_t size = payload.size();
|
|
for (size_t i = 0; i < size; ++i) {
|
|
// SAFETY: Performance sensitive. `data` is within `payload` bounds.
|
|
UNSAFE_BUFFERS(data[i]) ^=
|
|
masking_key.key[masking_key_offset++ %
|
|
WebSocketFrameHeader::kMaskingKeyLength];
|
|
}
|
|
}
|
|
|
|
} // namespace
|
|
|
|
std::unique_ptr<WebSocketFrameHeader> WebSocketFrameHeader::Clone() const {
|
|
auto ret = std::make_unique<WebSocketFrameHeader>(opcode);
|
|
ret->CopyFrom(*this);
|
|
return ret;
|
|
}
|
|
|
|
void WebSocketFrameHeader::CopyFrom(const WebSocketFrameHeader& source) {
|
|
final = source.final;
|
|
reserved1 = source.reserved1;
|
|
reserved2 = source.reserved2;
|
|
reserved3 = source.reserved3;
|
|
opcode = source.opcode;
|
|
masked = source.masked;
|
|
masking_key = source.masking_key;
|
|
payload_length = source.payload_length;
|
|
}
|
|
|
|
WebSocketFrame::WebSocketFrame(WebSocketFrameHeader::OpCode opcode)
|
|
: header(opcode) {}
|
|
|
|
WebSocketFrame::~WebSocketFrame() = default;
|
|
|
|
WebSocketFrameChunk::WebSocketFrameChunk() = default;
|
|
|
|
WebSocketFrameChunk::~WebSocketFrameChunk() = default;
|
|
|
|
size_t GetWebSocketFrameHeaderSize(const WebSocketFrameHeader& header) {
|
|
size_t extended_length_size = 0u;
|
|
if (header.payload_length > kMaxPayloadLengthWithoutExtendedLengthField &&
|
|
header.payload_length <= UINT16_MAX) {
|
|
extended_length_size = 2u;
|
|
} else if (header.payload_length > UINT16_MAX) {
|
|
extended_length_size = 8u;
|
|
}
|
|
|
|
return (WebSocketFrameHeader::kBaseHeaderSize + extended_length_size +
|
|
(header.masked ? WebSocketFrameHeader::kMaskingKeyLength : 0u));
|
|
}
|
|
|
|
int WriteWebSocketFrameHeader(const WebSocketFrameHeader& header,
|
|
const WebSocketMaskingKey* masking_key,
|
|
base::span<uint8_t> buffer) {
|
|
DCHECK((header.opcode & kOpCodeMask) == header.opcode)
|
|
<< "header.opcode must fit to kOpCodeMask.";
|
|
DCHECK(header.payload_length <= static_cast<uint64_t>(INT64_MAX))
|
|
<< "WebSocket specification doesn't allow a frame longer than "
|
|
<< "INT64_MAX (0x7FFFFFFFFFFFFFFF) bytes.";
|
|
|
|
// WebSocket frame format is as follows:
|
|
// - Common header (2 bytes)
|
|
// - Optional extended payload length
|
|
// (2 or 8 bytes, present if actual payload length is more than 125 bytes)
|
|
// - Optional masking key (4 bytes, present if MASK bit is on)
|
|
// - Actual payload (XOR masked with masking key if MASK bit is on)
|
|
//
|
|
// This function constructs frame header (the first three in the list
|
|
// above).
|
|
|
|
size_t header_size = GetWebSocketFrameHeaderSize(header);
|
|
if (header_size > buffer.size()) {
|
|
return ERR_INVALID_ARGUMENT;
|
|
}
|
|
|
|
base::SpanWriter writer(buffer);
|
|
|
|
uint8_t first_byte = 0u;
|
|
first_byte |= header.final ? kFinalBit : 0u;
|
|
first_byte |= header.reserved1 ? kReserved1Bit : 0u;
|
|
first_byte |= header.reserved2 ? kReserved2Bit : 0u;
|
|
first_byte |= header.reserved3 ? kReserved3Bit : 0u;
|
|
first_byte |= header.opcode & kOpCodeMask;
|
|
writer.WriteU8BigEndian(first_byte);
|
|
|
|
int extended_length_size = 0;
|
|
uint8_t second_byte = 0u;
|
|
second_byte |= header.masked ? kMaskBit : 0u;
|
|
if (header.payload_length <= kMaxPayloadLengthWithoutExtendedLengthField) {
|
|
second_byte |= header.payload_length;
|
|
} else if (header.payload_length <= UINT16_MAX) {
|
|
second_byte |= kPayloadLengthWithTwoByteExtendedLengthField;
|
|
extended_length_size = 2;
|
|
} else {
|
|
second_byte |= kPayloadLengthWithEightByteExtendedLengthField;
|
|
extended_length_size = 8;
|
|
}
|
|
writer.WriteU8BigEndian(second_byte);
|
|
|
|
// Writes "extended payload length" field.
|
|
if (extended_length_size == 2) {
|
|
writer.WriteU16BigEndian(static_cast<uint16_t>(header.payload_length));
|
|
} else if (extended_length_size == 8) {
|
|
writer.WriteU64BigEndian(header.payload_length);
|
|
}
|
|
|
|
// Writes "masking key" field, if needed.
|
|
if (header.masked) {
|
|
DCHECK(masking_key);
|
|
writer.Write(masking_key->key);
|
|
} else {
|
|
DCHECK(!masking_key);
|
|
}
|
|
|
|
// Verify we wrote the expected number of bytes.
|
|
DCHECK_EQ(header_size, writer.num_written());
|
|
return header_size;
|
|
}
|
|
|
|
WebSocketMaskingKey GenerateWebSocketMaskingKey() {
|
|
// Masking keys should be generated from a cryptographically secure random
|
|
// number generator, which means web application authors should not be able
|
|
// to guess the next value of masking key.
|
|
WebSocketMaskingKey masking_key;
|
|
base::RandBytes(masking_key.key);
|
|
return masking_key;
|
|
}
|
|
|
|
void MaskWebSocketFramePayload(const WebSocketMaskingKey& masking_key,
|
|
uint64_t frame_offset,
|
|
base::span<uint8_t> data) {
|
|
static constexpr size_t kMaskingKeyLength =
|
|
WebSocketFrameHeader::kMaskingKeyLength;
|
|
|
|
// Most of the masking is done in chunks of sizeof(PackedMaskType), except for
|
|
// the beginning and the end of the buffer which may be unaligned.
|
|
// PackedMaskType must be a multiple of kMaskingKeyLength in size.
|
|
PackedMaskType packed_mask_key;
|
|
static constexpr size_t kPackedMaskKeySize = sizeof(packed_mask_key);
|
|
static_assert((kPackedMaskKeySize >= kMaskingKeyLength &&
|
|
kPackedMaskKeySize % kMaskingKeyLength == 0),
|
|
"PackedMaskType size is not a multiple of mask length");
|
|
// If the buffer is too small for the vectorised version to be useful, revert
|
|
// to the byte-at-a-time implementation early.
|
|
if (data.size() <= kPackedMaskKeySize * 2) {
|
|
MaskWebSocketFramePayloadByBytes(masking_key,
|
|
frame_offset % kMaskingKeyLength, data);
|
|
return;
|
|
}
|
|
const size_t data_modulus =
|
|
reinterpret_cast<size_t>(data.data()) % kPackedMaskKeySize;
|
|
auto [before_aligned, remaining] = data.split_at(
|
|
data_modulus == 0 ? 0 : (kPackedMaskKeySize - data_modulus));
|
|
auto [aligned, after_aligned] = remaining.split_at(
|
|
remaining.size() - remaining.size() % kPackedMaskKeySize);
|
|
MaskWebSocketFramePayloadByBytes(
|
|
masking_key, frame_offset % kMaskingKeyLength, before_aligned);
|
|
|
|
// Create a version of the mask which is rotated by the appropriate offset
|
|
// for our alignment. The "trick" here is that 0 XORed with the mask will
|
|
// give the value of the mask for the appropriate byte.
|
|
std::array<uint8_t, kMaskingKeyLength> realigned_mask = {};
|
|
MaskWebSocketFramePayloadByBytes(
|
|
masking_key, (frame_offset + before_aligned.size()) % kMaskingKeyLength,
|
|
base::as_writable_byte_span(realigned_mask));
|
|
|
|
base::span<uint8_t> packed_span = base::byte_span_from_ref(packed_mask_key);
|
|
while (!packed_span.empty()) {
|
|
packed_span.copy_prefix_from(realigned_mask);
|
|
packed_span = packed_span.subspan(realigned_mask.size());
|
|
}
|
|
|
|
// The main loop.
|
|
while (!aligned.empty()) {
|
|
// This is not quite standard-compliant C++. However, the standard-compliant
|
|
// equivalent (using memcpy()) compiles to slower code using g++. In
|
|
// practice, this will work for the compilers and architectures currently
|
|
// supported by Chromium, and the tests are extremely unlikely to pass if a
|
|
// future compiler/architecture breaks it.
|
|
*reinterpret_cast<PackedMaskType*>(aligned.data()) ^= packed_mask_key;
|
|
aligned = aligned.subspan(kPackedMaskKeySize);
|
|
}
|
|
|
|
MaskWebSocketFramePayloadByBytes(
|
|
masking_key,
|
|
(frame_offset + (data.size() - after_aligned.size())) % kMaskingKeyLength,
|
|
after_aligned);
|
|
}
|
|
|
|
ParseCloseFrameResult ParseCloseFrame(base::span<const char> payload) {
|
|
const uint64_t size = static_cast<uint64_t>(payload.size());
|
|
|
|
// Payload size is 0 -> No status received
|
|
if (size == 0U) {
|
|
return ParseCloseFrameResult(kWebSocketErrorNoStatusReceived,
|
|
std::string_view());
|
|
}
|
|
|
|
// Payload size is 1 -> Protocol error (invalid size)
|
|
if (size == 1U) {
|
|
return ParseCloseFrameResult(
|
|
kWebSocketErrorProtocolError, std::string_view(),
|
|
"Received a broken close frame with an invalid size of 1 byte.");
|
|
}
|
|
|
|
// Get the status code from the first 2 bytes
|
|
const uint16_t unchecked_code =
|
|
base::U16FromBigEndian(base::as_byte_span(payload).first<2>());
|
|
|
|
// Invalid or reserved status codes
|
|
if (unchecked_code == kWebSocketErrorNoStatusReceived ||
|
|
unchecked_code == kWebSocketErrorAbnormalClosure ||
|
|
unchecked_code == kWebSocketErrorTlsHandshake) {
|
|
return ParseCloseFrameResult(kWebSocketErrorProtocolError,
|
|
std::string_view(),
|
|
"Received a broken close frame containing a "
|
|
"reserved status code.");
|
|
}
|
|
|
|
// If size is exactly 2, return the code without a reason
|
|
if (size == 2U) {
|
|
return ParseCloseFrameResult(unchecked_code, std::string_view());
|
|
}
|
|
|
|
const base::span<const char> reason_span =
|
|
payload.subspan(kWebSocketCloseCodeLength);
|
|
const auto reason = base::as_string_view(reason_span);
|
|
|
|
if (base::IsStringUTF8AllowingNoncharacters(reason)) {
|
|
return ParseCloseFrameResult(unchecked_code, reason);
|
|
}
|
|
|
|
return ParseCloseFrameResult(
|
|
kWebSocketErrorProtocolError,
|
|
std::string_view("Invalid UTF-8 in Close frame"),
|
|
"Received a broken close frame containing invalid UTF-8.");
|
|
}
|
|
|
|
} // namespace net
|