mirror of
https://libwebsockets.org/repo/libwebsockets
synced 2024-11-24 01:39:33 +00:00
8e4336838a
Fix minimal-mqtt-client and minimal-mqtt-client-multi from crashes by allowing indicating username and password are not on heap.
376 lines
9.7 KiB
C
376 lines
9.7 KiB
C
/*
|
|
* libwebsockets - small server side websockets and web server implementation
|
|
*
|
|
* Copyright (C) 2010 - 2020 Andy Green <andy@warmcat.com>
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
* of this software and associated documentation files (the "Software"), to
|
|
* deal in the Software without restriction, including without limitation the
|
|
* rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
|
* sell copies of the Software, and to permit persons to whom the Software is
|
|
* furnished to do so, subject to the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be included in
|
|
* all copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
|
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
|
* IN THE SOFTWARE.
|
|
*/
|
|
|
|
/*
|
|
* You can leave buf NULL, if so it will be allocated on the heap once the
|
|
* actual length is known. nf should be 0, it will be set at allocation time.
|
|
*
|
|
* Or you can ensure no allocation and use an external buffer by setting buf
|
|
* and lim. But buf must be in the ep context somehow, since it may have to
|
|
* survive returns to the event loop unchanged. Set nf to 0 in this case.
|
|
*
|
|
* Or you can set buf to an externally allocated buffer, in which case you may
|
|
* set nf so it will be freed when the string is "freed".
|
|
*/
|
|
|
|
#include "private-lib-core.h"
|
|
/* #include "lws-mqtt.h" */
|
|
/* 3.1.3.1-5: MUST allow... that contain only the characters... */
|
|
|
|
static const uint8_t *code = (const uint8_t *)
|
|
"0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";
|
|
|
|
static int
|
|
lws_mqtt_generate_id(struct lws* wsi, lws_mqtt_str_t **ms, const char *client_id)
|
|
{
|
|
struct lws_context *context = wsi->a.context;
|
|
uint16_t ran[24]; /* 16-bit so wrap bias from %62 diluted by ~1000 */
|
|
size_t n, len;
|
|
uint8_t *buf;
|
|
|
|
if (client_id)
|
|
len = strlen(client_id);
|
|
else
|
|
len = LWS_MQTT_RANDOM_CIDLEN;
|
|
|
|
*ms = lws_mqtt_str_create((uint16_t)(len + 1));
|
|
if (!*ms)
|
|
return 1;
|
|
|
|
buf = lws_mqtt_str_next(*ms, NULL);
|
|
|
|
if (client_id) {
|
|
lws_strnncpy((char *)buf, client_id, len, len + 1);
|
|
lwsl_notice("%s: User space provided a client ID '%s'\n",
|
|
__func__, (const char *)buf);
|
|
} else {
|
|
lwsl_notice("%s: generating random client id\n", __func__);
|
|
n = len * sizeof(ran[0]);
|
|
if (lws_get_random(context, ran, n) != n) {
|
|
lws_mqtt_str_free(ms);
|
|
|
|
return 1;
|
|
}
|
|
|
|
for (n = 0; n < len; n++)
|
|
buf[n] = code[ran[n] % 62];
|
|
buf[len] = '\0';
|
|
}
|
|
|
|
if (lws_mqtt_str_advance(*ms, (uint16_t)len)) {
|
|
lws_mqtt_str_free(ms);
|
|
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
lws_read_mqtt(struct lws *wsi, unsigned char *buf, lws_filepos_t len)
|
|
{
|
|
lws_mqttc_t *c = &wsi->mqtt->client;
|
|
|
|
return _lws_mqtt_rx_parser(wsi, &c->par, buf, (size_t)len);
|
|
}
|
|
|
|
int
|
|
lws_create_client_mqtt_object(const struct lws_client_connect_info *i,
|
|
struct lws *wsi)
|
|
{
|
|
lws_mqttc_t *c;
|
|
const lws_mqtt_client_connect_param_t *cp = i->mqtt_cp;
|
|
|
|
/* allocate the ws struct for the wsi */
|
|
wsi->mqtt = lws_zalloc(sizeof(*wsi->mqtt), "client mqtt struct");
|
|
if (!wsi->mqtt)
|
|
goto oom;
|
|
|
|
wsi->mqtt->wsi = wsi;
|
|
c = &wsi->mqtt->client;
|
|
|
|
if (lws_mqtt_generate_id(wsi, &c->id, cp->client_id)) {
|
|
lwsl_err("%s: Error generating client ID\n", __func__);
|
|
return 1;
|
|
}
|
|
lwsl_info("%s: using client id '%.*s'\n", __func__, c->id->len,
|
|
(const char *)c->id->buf);
|
|
|
|
if (cp->clean_start || !(cp->client_id &&
|
|
cp->client_id[0]))
|
|
c->conn_flags = LMQCFT_CLEAN_START;
|
|
if (cp->client_id_nofree)
|
|
c->conn_flags |= LMQCFT_CLIENT_ID_NOFREE;
|
|
if (cp->username_nofree)
|
|
c->conn_flags |= LMQCFT_USERNAME_NOFREE;
|
|
if (cp->password_nofree)
|
|
c->conn_flags |= LMQCFT_PASSWORD_NOFREE;
|
|
|
|
if (!(c->conn_flags & LMQCFT_CLIENT_ID_NOFREE))
|
|
lws_free((void *)cp->client_id);
|
|
|
|
c->keep_alive_secs = cp->keep_alive;
|
|
c->aws_iot = cp->aws_iot;
|
|
|
|
if (cp->will_param.topic &&
|
|
*cp->will_param.topic) {
|
|
c->will.topic = lws_mqtt_str_create_cstr_dup(
|
|
cp->will_param.topic, 0);
|
|
if (!c->will.topic)
|
|
goto oom1;
|
|
c->conn_flags |= LMQCFT_WILL_FLAG;
|
|
if (cp->will_param.message) {
|
|
c->will.message = lws_mqtt_str_create_cstr_dup(
|
|
cp->will_param.message, 0);
|
|
if (!c->will.message)
|
|
goto oom2;
|
|
}
|
|
c->conn_flags = (uint16_t)(unsigned int)(c->conn_flags | ((cp->will_param.qos << 3) & LMQCFT_WILL_QOS_MASK));
|
|
c->conn_flags |= (uint16_t)((!!cp->will_param.retain) * LMQCFT_WILL_RETAIN);
|
|
}
|
|
|
|
if (cp->username &&
|
|
*cp->username) {
|
|
c->username = lws_mqtt_str_create_cstr_dup(cp->username, 0);
|
|
if (!c->username)
|
|
goto oom3;
|
|
c->conn_flags |= LMQCFT_USERNAME;
|
|
if (!(c->conn_flags & LMQCFT_USERNAME_NOFREE))
|
|
lws_free((void *)cp->username);
|
|
if (cp->password) {
|
|
c->password =
|
|
lws_mqtt_str_create_cstr_dup(cp->password, 0);
|
|
if (!c->password)
|
|
goto oom4;
|
|
c->conn_flags |= LMQCFT_PASSWORD;
|
|
if (!(c->conn_flags & LMQCFT_PASSWORD_NOFREE))
|
|
lws_free((void *)cp->password);
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
oom4:
|
|
lws_mqtt_str_free(&c->username);
|
|
oom3:
|
|
lws_mqtt_str_free(&c->will.message);
|
|
oom2:
|
|
lws_mqtt_str_free(&c->will.topic);
|
|
oom1:
|
|
lws_mqtt_str_free(&c->id);
|
|
oom:
|
|
lwsl_err("%s: OOM!\n", __func__);
|
|
return 1;
|
|
}
|
|
|
|
int
|
|
lws_mqtt_client_socket_service(struct lws *wsi, struct lws_pollfd *pollfd,
|
|
struct lws *wsi_conn)
|
|
{
|
|
struct lws_context *context = wsi->a.context;
|
|
struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
|
|
int n = 0, m = 0;
|
|
struct lws_tokens ebuf;
|
|
int buffered = 0;
|
|
int pending = 0;
|
|
#if defined(LWS_WITH_TLS)
|
|
char erbuf[128];
|
|
#endif
|
|
const char *cce = NULL;
|
|
|
|
switch (lwsi_state(wsi)) {
|
|
#if defined(LWS_WITH_SOCKS5)
|
|
/* SOCKS Greeting Reply */
|
|
case LRS_WAITING_SOCKS_GREETING_REPLY:
|
|
case LRS_WAITING_SOCKS_AUTH_REPLY:
|
|
case LRS_WAITING_SOCKS_CONNECT_REPLY:
|
|
|
|
switch (lws_socks5c_handle_state(wsi, pollfd, &cce)) {
|
|
case LW5CHS_RET_RET0:
|
|
return 0;
|
|
case LW5CHS_RET_BAIL3:
|
|
goto bail3;
|
|
case LW5CHS_RET_STARTHS:
|
|
|
|
/*
|
|
* Now we got the socks5 connection, we need to go down
|
|
* the tls path on it if that's what we want
|
|
*/
|
|
|
|
if (!(wsi->tls.use_ssl & LCCSCF_USE_SSL))
|
|
goto start_ws_handshake;
|
|
|
|
switch (lws_client_create_tls(wsi, &cce, 0)) {
|
|
case 0:
|
|
break;
|
|
case 1:
|
|
return 0;
|
|
default:
|
|
goto bail3;
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
break;
|
|
#endif
|
|
case LRS_WAITING_DNS:
|
|
/*
|
|
* we are under PENDING_TIMEOUT_SENT_CLIENT_HANDSHAKE
|
|
* timeout protection set in client-handshake.c
|
|
*/
|
|
if (!lws_client_connect_2_dnsreq(wsi)) {
|
|
/* closed */
|
|
lwsl_client("closed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* either still pending connection, or changed mode */
|
|
return 0;
|
|
|
|
case LRS_WAITING_CONNECT:
|
|
|
|
/*
|
|
* we are under PENDING_TIMEOUT_SENT_CLIENT_HANDSHAKE
|
|
* timeout protection set in client-handshake.c
|
|
*/
|
|
if (pollfd->revents & LWS_POLLOUT)
|
|
lws_client_connect_3_connect(wsi, NULL, NULL, 0, NULL);
|
|
break;
|
|
|
|
#if defined(LWS_WITH_TLS)
|
|
case LRS_WAITING_SSL:
|
|
|
|
if (wsi->tls.use_ssl & LCCSCF_USE_SSL) {
|
|
n = lws_ssl_client_connect2(wsi, erbuf, sizeof(erbuf));
|
|
if (!n)
|
|
return 0;
|
|
if (n < 0) {
|
|
cce = erbuf;
|
|
goto bail3;
|
|
}
|
|
} else
|
|
wsi->tls.ssl = NULL;
|
|
#endif /* LWS_WITH_TLS */
|
|
|
|
/* fallthru */
|
|
|
|
#if defined(LWS_WITH_SOCKS5)
|
|
start_ws_handshake:
|
|
#endif
|
|
lwsi_set_state(wsi, LRS_MQTTC_IDLE);
|
|
lws_set_timeout(wsi, PENDING_TIMEOUT_AWAITING_CLIENT_HS_SEND,
|
|
(int)context->timeout_secs);
|
|
|
|
/* fallthru */
|
|
|
|
case LRS_MQTTC_IDLE:
|
|
/*
|
|
* we should be ready to send out MQTT CONNECT
|
|
*/
|
|
lwsl_info("%s: %s: Transport established, send out CONNECT\n",
|
|
__func__, lws_wsi_tag(wsi));
|
|
if (lws_change_pollfd(wsi, LWS_POLLOUT, 0))
|
|
return -1;
|
|
if (!lws_mqtt_client_send_connect(wsi)) {
|
|
lwsl_err("%s: Unable to send MQTT CONNECT\n", __func__);
|
|
return -1;
|
|
}
|
|
if (lws_change_pollfd(wsi, 0, LWS_POLLIN))
|
|
return -1;
|
|
|
|
lwsi_set_state(wsi, LRS_MQTTC_AWAIT_CONNACK);
|
|
return 0;
|
|
|
|
case LRS_ESTABLISHED:
|
|
case LRS_MQTTC_AWAIT_CONNACK:
|
|
buffered = 0;
|
|
ebuf.token = pt->serv_buf;
|
|
ebuf.len = (int)wsi->a.context->pt_serv_buf_size;
|
|
|
|
if ((unsigned int)ebuf.len > wsi->a.context->pt_serv_buf_size)
|
|
ebuf.len = (int)wsi->a.context->pt_serv_buf_size;
|
|
|
|
if ((int)pending > ebuf.len)
|
|
pending = (char)ebuf.len;
|
|
|
|
ebuf.len = lws_ssl_capable_read(wsi, ebuf.token,
|
|
(unsigned int)(pending ? pending :
|
|
ebuf.len));
|
|
switch (ebuf.len) {
|
|
case 0:
|
|
lwsl_info("%s: zero length read\n",
|
|
__func__);
|
|
goto fail;
|
|
case LWS_SSL_CAPABLE_MORE_SERVICE:
|
|
lwsl_info("SSL Capable more service\n");
|
|
return 0;
|
|
case LWS_SSL_CAPABLE_ERROR:
|
|
lwsl_info("%s: LWS_SSL_CAPABLE_ERROR\n",
|
|
__func__);
|
|
goto fail;
|
|
}
|
|
|
|
if (ebuf.len < 0)
|
|
n = -1;
|
|
else
|
|
n = lws_read_mqtt(wsi, ebuf.token, (unsigned int)ebuf.len);
|
|
if (n < 0) {
|
|
lwsl_err("%s: Parsing packet failed\n", __func__);
|
|
goto fail;
|
|
}
|
|
|
|
m = ebuf.len - n;
|
|
// lws_buflist_describe(&wsi->buflist, wsi, __func__);
|
|
lwsl_debug("%s: consuming %d / %d\n", __func__, n, ebuf.len);
|
|
if (lws_buflist_aware_finished_consuming(wsi, &ebuf, m,
|
|
buffered,
|
|
__func__))
|
|
return -1;
|
|
|
|
return 0;
|
|
|
|
#if defined(LWS_WITH_TLS) || defined(LWS_WITH_SOCKS5)
|
|
bail3:
|
|
#endif
|
|
lwsl_info("closing conn at LWS_CONNMODE...SERVER_REPLY\n");
|
|
if (cce)
|
|
lwsl_info("reason: %s\n", cce);
|
|
lws_inform_client_conn_fail(wsi, (void *)cce, strlen(cce));
|
|
|
|
lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS, "cbail3");
|
|
return -1;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
fail:
|
|
lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS, "mqtt svc fail");
|
|
|
|
return LWS_HPI_RET_WSI_ALREADY_DIED;
|
|
}
|