aboutsummaryrefslogtreecommitdiff
path: root/v_windows/v/old/vlib/net/websocket/utils.v
diff options
context:
space:
mode:
authorIndrajith K L2022-12-03 17:00:20 +0530
committerIndrajith K L2022-12-03 17:00:20 +0530
commitf5c4671bfbad96bf346bd7e9a21fc4317b4959df (patch)
tree2764fc62da58f2ba8da7ed341643fc359873142f /v_windows/v/old/vlib/net/websocket/utils.v
downloadcli-tools-windows-f5c4671bfbad96bf346bd7e9a21fc4317b4959df.tar.gz
cli-tools-windows-f5c4671bfbad96bf346bd7e9a21fc4317b4959df.tar.bz2
cli-tools-windows-f5c4671bfbad96bf346bd7e9a21fc4317b4959df.zip
Adds most of the toolsHEADmaster
Diffstat (limited to 'v_windows/v/old/vlib/net/websocket/utils.v')
-rw-r--r--v_windows/v/old/vlib/net/websocket/utils.v54
1 files changed, 54 insertions, 0 deletions
diff --git a/v_windows/v/old/vlib/net/websocket/utils.v b/v_windows/v/old/vlib/net/websocket/utils.v
new file mode 100644
index 0000000..4e48359
--- /dev/null
+++ b/v_windows/v/old/vlib/net/websocket/utils.v
@@ -0,0 +1,54 @@
+module websocket
+
+import rand
+import crypto.sha1
+import encoding.base64
+
+// htonl64 converts payload length to header bits
+fn htonl64(payload_len u64) []byte {
+ mut ret := []byte{len: 8}
+ ret[0] = byte(((payload_len & (u64(0xff) << 56)) >> 56) & 0xff)
+ ret[1] = byte(((payload_len & (u64(0xff) << 48)) >> 48) & 0xff)
+ ret[2] = byte(((payload_len & (u64(0xff) << 40)) >> 40) & 0xff)
+ ret[3] = byte(((payload_len & (u64(0xff) << 32)) >> 32) & 0xff)
+ ret[4] = byte(((payload_len & (u64(0xff) << 24)) >> 24) & 0xff)
+ ret[5] = byte(((payload_len & (u64(0xff) << 16)) >> 16) & 0xff)
+ ret[6] = byte(((payload_len & (u64(0xff) << 8)) >> 8) & 0xff)
+ ret[7] = byte(((payload_len & (u64(0xff) << 0)) >> 0) & 0xff)
+ return ret
+}
+
+// create_masking_key returs a new masking key to use when masking websocket messages
+fn create_masking_key() []byte {
+ mask_bit := byte(rand.intn(255))
+ buf := []byte{len: 4, init: `0`}
+ unsafe { C.memcpy(buf.data, &mask_bit, 4) }
+ return buf
+}
+
+// create_key_challenge_response creates a key challange response from security key
+fn create_key_challenge_response(seckey string) ?string {
+ if seckey.len == 0 {
+ return error('unexpected seckey lengt zero')
+ }
+ guid := '258EAFA5-E914-47DA-95CA-C5AB0DC85B11'
+ sha1buf := seckey + guid
+ shabytes := sha1buf.bytes()
+ hash := sha1.sum(shabytes)
+ b64 := base64.encode(hash)
+ unsafe {
+ hash.free()
+ shabytes.free()
+ }
+ return b64
+}
+
+// get_nonce creates a randomized array used in handshake process
+fn get_nonce(nonce_size int) string {
+ mut nonce := []byte{len: nonce_size, cap: nonce_size}
+ alphanum := '0123456789ABCDEFGHIJKLMNOPQRSTUVXYZabcdefghijklmnopqrstuvwxyz'
+ for i in 0 .. nonce_size {
+ nonce[i] = alphanum[rand.intn(alphanum.len)]
+ }
+ return unsafe { tos(nonce.data, nonce.len) }.clone()
+}