|  | // Copyright 2012 The Chromium Authors | 
|  | // Use of this source code is governed by a BSD-style license that can be | 
|  | // found in the LICENSE file. | 
|  |  | 
|  | #include "net/websockets/websocket_frame.h" | 
|  |  | 
|  | #include <stddef.h> | 
|  | #include <string.h> | 
|  |  | 
|  | #include <algorithm> | 
|  | #include <ostream> | 
|  |  | 
|  | #include "base/check.h" | 
|  | #include "base/check_op.h" | 
|  | #include "base/containers/span.h" | 
|  | #include "base/containers/span_writer.h" | 
|  | #include "base/numerics/safe_conversions.h" | 
|  | #include "base/rand_util.h" | 
|  | #include "base/strings/string_util.h" | 
|  | #include "base/strings/string_view_util.h" | 
|  | #include "build/build_config.h" | 
|  | #include "net/base/net_errors.h" | 
|  | #include "net/websockets/websocket_errors.h" | 
|  |  | 
|  | namespace net { | 
|  |  | 
|  | namespace { | 
|  |  | 
|  | // GCC (and Clang) can transparently use vector ops. Only try to do this on | 
|  | // architectures where we know it works, otherwise gcc will attempt to emulate | 
|  | // the vector ops, which is unlikely to be efficient. | 
|  | #if defined(COMPILER_GCC) && \ | 
|  | (defined(ARCH_CPU_X86_FAMILY) || defined(ARCH_CPU_ARM_FAMILY)) | 
|  |  | 
|  | using PackedMaskType = uint32_t __attribute__((vector_size(16))); | 
|  | } | 
|  | }  // namespace net | 
|  |  | 
|  | // TODO(https://github.com/llvm/llvm-project/issues/119290): Until | 
|  | // `std::has_unique_object_representations_v<>` works correctly for vector | 
|  | // types, explicitly mark this as safe to convert to/from bytes. | 
|  | namespace base { | 
|  | template <> | 
|  | inline constexpr bool kCanSafelyConvertToByteSpan<net::PackedMaskType> = true; | 
|  | } | 
|  |  | 
|  | namespace net { | 
|  | namespace { | 
|  | #else | 
|  |  | 
|  | using PackedMaskType = size_t; | 
|  |  | 
|  | #endif  // defined(COMPILER_GCC) && | 
|  | // (defined(ARCH_CPU_X86_FAMILY) || defined(ARCH_CPU_ARM_FAMILY)) | 
|  |  | 
|  | constexpr size_t kWebSocketCloseCodeLength = 2; | 
|  |  | 
|  | constexpr uint8_t kFinalBit = 0x80; | 
|  | constexpr uint8_t kReserved1Bit = 0x40; | 
|  | constexpr uint8_t kReserved2Bit = 0x20; | 
|  | constexpr uint8_t kReserved3Bit = 0x10; | 
|  | constexpr uint8_t kOpCodeMask = 0xF; | 
|  | constexpr uint8_t kMaskBit = 0x80; | 
|  | constexpr uint64_t kMaxPayloadLengthWithoutExtendedLengthField = 125; | 
|  | constexpr uint64_t kPayloadLengthWithTwoByteExtendedLengthField = 126; | 
|  | constexpr uint64_t kPayloadLengthWithEightByteExtendedLengthField = 127; | 
|  |  | 
|  | inline void MaskWebSocketFramePayloadByBytes( | 
|  | const WebSocketMaskingKey& masking_key, | 
|  | size_t masking_key_offset, | 
|  | const base::span<uint8_t> payload) { | 
|  | uint8_t* data = payload.data(); | 
|  | const size_t size = payload.size(); | 
|  | for (size_t i = 0; i < size; ++i) { | 
|  | // SAFETY: Performance sensitive. `data` is within `payload` bounds. | 
|  | UNSAFE_BUFFERS(data[i]) ^= | 
|  | masking_key.key[masking_key_offset++ % | 
|  | WebSocketFrameHeader::kMaskingKeyLength]; | 
|  | } | 
|  | } | 
|  |  | 
|  | }  // namespace | 
|  |  | 
|  | std::unique_ptr<WebSocketFrameHeader> WebSocketFrameHeader::Clone() const { | 
|  | auto ret = std::make_unique<WebSocketFrameHeader>(opcode); | 
|  | ret->CopyFrom(*this); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | void WebSocketFrameHeader::CopyFrom(const WebSocketFrameHeader& source) { | 
|  | final = source.final; | 
|  | reserved1 = source.reserved1; | 
|  | reserved2 = source.reserved2; | 
|  | reserved3 = source.reserved3; | 
|  | opcode = source.opcode; | 
|  | masked = source.masked; | 
|  | masking_key = source.masking_key; | 
|  | payload_length = source.payload_length; | 
|  | } | 
|  |  | 
|  | WebSocketFrame::WebSocketFrame(WebSocketFrameHeader::OpCode opcode) | 
|  | : header(opcode) {} | 
|  |  | 
|  | WebSocketFrame::~WebSocketFrame() = default; | 
|  |  | 
|  | WebSocketFrameChunk::WebSocketFrameChunk() = default; | 
|  |  | 
|  | WebSocketFrameChunk::~WebSocketFrameChunk() = default; | 
|  |  | 
|  | size_t GetWebSocketFrameHeaderSize(const WebSocketFrameHeader& header) { | 
|  | size_t extended_length_size = 0u; | 
|  | if (header.payload_length > kMaxPayloadLengthWithoutExtendedLengthField && | 
|  | header.payload_length <= UINT16_MAX) { | 
|  | extended_length_size = 2u; | 
|  | } else if (header.payload_length > UINT16_MAX) { | 
|  | extended_length_size = 8u; | 
|  | } | 
|  |  | 
|  | return (WebSocketFrameHeader::kBaseHeaderSize + extended_length_size + | 
|  | (header.masked ? WebSocketFrameHeader::kMaskingKeyLength : 0u)); | 
|  | } | 
|  |  | 
|  | int WriteWebSocketFrameHeader(const WebSocketFrameHeader& header, | 
|  | const WebSocketMaskingKey* masking_key, | 
|  | base::span<uint8_t> buffer) { | 
|  | DCHECK((header.opcode & kOpCodeMask) == header.opcode) | 
|  | << "header.opcode must fit to kOpCodeMask."; | 
|  | DCHECK(header.payload_length <= static_cast<uint64_t>(INT64_MAX)) | 
|  | << "WebSocket specification doesn't allow a frame longer than " | 
|  | << "INT64_MAX (0x7FFFFFFFFFFFFFFF) bytes."; | 
|  |  | 
|  | // WebSocket frame format is as follows: | 
|  | // - Common header (2 bytes) | 
|  | // - Optional extended payload length | 
|  | //   (2 or 8 bytes, present if actual payload length is more than 125 bytes) | 
|  | // - Optional masking key (4 bytes, present if MASK bit is on) | 
|  | // - Actual payload (XOR masked with masking key if MASK bit is on) | 
|  | // | 
|  | // This function constructs frame header (the first three in the list | 
|  | // above). | 
|  |  | 
|  | size_t header_size = GetWebSocketFrameHeaderSize(header); | 
|  | if (header_size > buffer.size()) { | 
|  | return ERR_INVALID_ARGUMENT; | 
|  | } | 
|  |  | 
|  | base::SpanWriter writer(buffer); | 
|  |  | 
|  | uint8_t first_byte = 0u; | 
|  | first_byte |= header.final ? kFinalBit : 0u; | 
|  | first_byte |= header.reserved1 ? kReserved1Bit : 0u; | 
|  | first_byte |= header.reserved2 ? kReserved2Bit : 0u; | 
|  | first_byte |= header.reserved3 ? kReserved3Bit : 0u; | 
|  | first_byte |= header.opcode & kOpCodeMask; | 
|  | writer.WriteU8BigEndian(first_byte); | 
|  |  | 
|  | int extended_length_size = 0; | 
|  | uint8_t second_byte = 0u; | 
|  | second_byte |= header.masked ? kMaskBit : 0u; | 
|  | if (header.payload_length <= kMaxPayloadLengthWithoutExtendedLengthField) { | 
|  | second_byte |= header.payload_length; | 
|  | } else if (header.payload_length <= UINT16_MAX) { | 
|  | second_byte |= kPayloadLengthWithTwoByteExtendedLengthField; | 
|  | extended_length_size = 2; | 
|  | } else { | 
|  | second_byte |= kPayloadLengthWithEightByteExtendedLengthField; | 
|  | extended_length_size = 8; | 
|  | } | 
|  | writer.WriteU8BigEndian(second_byte); | 
|  |  | 
|  | // Writes "extended payload length" field. | 
|  | if (extended_length_size == 2) { | 
|  | writer.WriteU16BigEndian(static_cast<uint16_t>(header.payload_length)); | 
|  | } else if (extended_length_size == 8) { | 
|  | writer.WriteU64BigEndian(header.payload_length); | 
|  | } | 
|  |  | 
|  | // Writes "masking key" field, if needed. | 
|  | if (header.masked) { | 
|  | DCHECK(masking_key); | 
|  | writer.Write(masking_key->key); | 
|  | } else { | 
|  | DCHECK(!masking_key); | 
|  | } | 
|  |  | 
|  | // Verify we wrote the expected number of bytes. | 
|  | DCHECK_EQ(header_size, writer.num_written()); | 
|  | return header_size; | 
|  | } | 
|  |  | 
|  | WebSocketMaskingKey GenerateWebSocketMaskingKey() { | 
|  | // Masking keys should be generated from a cryptographically secure random | 
|  | // number generator, which means web application authors should not be able | 
|  | // to guess the next value of masking key. | 
|  | WebSocketMaskingKey masking_key; | 
|  | base::RandBytes(masking_key.key); | 
|  | return masking_key; | 
|  | } | 
|  |  | 
|  | void MaskWebSocketFramePayload(const WebSocketMaskingKey& masking_key, | 
|  | uint64_t frame_offset, | 
|  | base::span<uint8_t> data) { | 
|  | static constexpr size_t kMaskingKeyLength = | 
|  | WebSocketFrameHeader::kMaskingKeyLength; | 
|  |  | 
|  | // Most of the masking is done in chunks of sizeof(PackedMaskType), except for | 
|  | // the beginning and the end of the buffer which may be unaligned. | 
|  | // PackedMaskType must be a multiple of kMaskingKeyLength in size. | 
|  | PackedMaskType packed_mask_key; | 
|  | static constexpr size_t kPackedMaskKeySize = sizeof(packed_mask_key); | 
|  | static_assert((kPackedMaskKeySize >= kMaskingKeyLength && | 
|  | kPackedMaskKeySize % kMaskingKeyLength == 0), | 
|  | "PackedMaskType size is not a multiple of mask length"); | 
|  | // If the buffer is too small for the vectorised version to be useful, revert | 
|  | // to the byte-at-a-time implementation early. | 
|  | if (data.size() <= kPackedMaskKeySize * 2) { | 
|  | MaskWebSocketFramePayloadByBytes(masking_key, | 
|  | frame_offset % kMaskingKeyLength, data); | 
|  | return; | 
|  | } | 
|  | const size_t data_modulus = | 
|  | reinterpret_cast<size_t>(data.data()) % kPackedMaskKeySize; | 
|  | auto [before_aligned, remaining] = data.split_at( | 
|  | data_modulus == 0 ? 0 : (kPackedMaskKeySize - data_modulus)); | 
|  | auto [aligned, after_aligned] = remaining.split_at( | 
|  | remaining.size() - remaining.size() % kPackedMaskKeySize); | 
|  | MaskWebSocketFramePayloadByBytes( | 
|  | masking_key, frame_offset % kMaskingKeyLength, before_aligned); | 
|  |  | 
|  | // Create a version of the mask which is rotated by the appropriate offset | 
|  | // for our alignment. The "trick" here is that 0 XORed with the mask will | 
|  | // give the value of the mask for the appropriate byte. | 
|  | std::array<uint8_t, kMaskingKeyLength> realigned_mask = {}; | 
|  | MaskWebSocketFramePayloadByBytes( | 
|  | masking_key, (frame_offset + before_aligned.size()) % kMaskingKeyLength, | 
|  | base::as_writable_byte_span(realigned_mask)); | 
|  |  | 
|  | base::span<uint8_t> packed_span = base::byte_span_from_ref(packed_mask_key); | 
|  | while (!packed_span.empty()) { | 
|  | packed_span.copy_prefix_from(realigned_mask); | 
|  | packed_span = packed_span.subspan(realigned_mask.size()); | 
|  | } | 
|  |  | 
|  | // The main loop. | 
|  | while (!aligned.empty()) { | 
|  | // This is not quite standard-compliant C++. However, the standard-compliant | 
|  | // equivalent (using memcpy()) compiles to slower code using g++. In | 
|  | // practice, this will work for the compilers and architectures currently | 
|  | // supported by Chromium, and the tests are extremely unlikely to pass if a | 
|  | // future compiler/architecture breaks it. | 
|  | *reinterpret_cast<PackedMaskType*>(aligned.data()) ^= packed_mask_key; | 
|  | aligned = aligned.subspan(kPackedMaskKeySize); | 
|  | } | 
|  |  | 
|  | MaskWebSocketFramePayloadByBytes( | 
|  | masking_key, | 
|  | (frame_offset + (data.size() - after_aligned.size())) % kMaskingKeyLength, | 
|  | after_aligned); | 
|  | } | 
|  |  | 
|  | ParseCloseFrameResult ParseCloseFrame(base::span<const char> payload) { | 
|  | const uint64_t size = static_cast<uint64_t>(payload.size()); | 
|  |  | 
|  | // Payload size is 0 -> No status received | 
|  | if (size == 0U) { | 
|  | return ParseCloseFrameResult(kWebSocketErrorNoStatusReceived, | 
|  | std::string_view()); | 
|  | } | 
|  |  | 
|  | // Payload size is 1 -> Protocol error (invalid size) | 
|  | if (size == 1U) { | 
|  | return ParseCloseFrameResult( | 
|  | kWebSocketErrorProtocolError, std::string_view(), | 
|  | "Received a broken close frame with an invalid size of 1 byte."); | 
|  | } | 
|  |  | 
|  | // Get the status code from the first 2 bytes | 
|  | const uint16_t unchecked_code = | 
|  | base::U16FromBigEndian(base::as_byte_span(payload).first<2>()); | 
|  |  | 
|  | // Invalid or reserved status codes | 
|  | if (unchecked_code == kWebSocketErrorNoStatusReceived || | 
|  | unchecked_code == kWebSocketErrorAbnormalClosure || | 
|  | unchecked_code == kWebSocketErrorTlsHandshake) { | 
|  | return ParseCloseFrameResult(kWebSocketErrorProtocolError, | 
|  | std::string_view(), | 
|  | "Received a broken close frame containing a " | 
|  | "reserved status code."); | 
|  | } | 
|  |  | 
|  | // If size is exactly 2, return the code without a reason | 
|  | if (size == 2U) { | 
|  | return ParseCloseFrameResult(unchecked_code, std::string_view()); | 
|  | } | 
|  |  | 
|  | const base::span<const char> reason_span = | 
|  | payload.subspan(kWebSocketCloseCodeLength); | 
|  | const auto reason = base::as_string_view(reason_span); | 
|  |  | 
|  | if (base::IsStringUTF8AllowingNoncharacters(reason)) { | 
|  | return ParseCloseFrameResult(unchecked_code, reason); | 
|  | } | 
|  |  | 
|  | return ParseCloseFrameResult( | 
|  | kWebSocketErrorProtocolError, | 
|  | std::string_view("Invalid UTF-8 in Close frame"), | 
|  | "Received a broken close frame containing invalid UTF-8."); | 
|  | } | 
|  |  | 
|  | }  // namespace net |