• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * lws-minimal-secure-streams-alexa
3  *
4  * This file is made available under the Creative Commons CC0 1.0
5  * Universal Public Domain Dedication.
6  */
7 
8 #include <libwebsockets.h>
9 #include <string.h>
10 #include <signal.h>
11 
12 extern int
13 avs_example_start(struct lws_context *context);
14 
15 static int interrupted;
16 static lws_state_notify_link_t nl;
17 
18 #if !defined(LWS_SS_USE_SSPC)
19 
20 /*
21  * If not using the proxy, we need to bring our own policy
22  */
23 
24 static const char * const default_ss_policy =
25 	"{"
26 	  "\"release\":"			"\"01234567\","
27 	  "\"product\":"			"\"myproduct\","
28 	  "\"schema-version\":"			"1,"
29 	  "\"retry\": ["	/* named backoff / retry strategies */
30 		"{\"default\": {"
31 			"\"backoff\": ["	 "1000,"
32 						 "2000,"
33 						 "3000,"
34 						 "5000,"
35 						"10000"
36 				"],"
37 			"\"conceal\":"		"5,"
38 			"\"jitterpc\":"		"20,"
39 			"\"svalidping\":"	"60,"
40 			"\"svalidhup\":"	"64"
41 		"}}"
42 	  "],"
43 	  "\"certs\": [" /* named individual certificates in BASE64 DER */
44 		"{\"digicert_global_root_g2\": \"" /* api.amazon.com 2038-01 */
45 	"MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh"
46 	"MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3"
47 	"d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH"
48 	"MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT"
49 	"MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j"
50 	"b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG"
51 	"9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI"
52 	"2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx"
53 	"1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ"
54 	"q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz"
55 	"tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ"
56 	"vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP"
57 	"BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV"
58 	"5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY"
59 	"1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4"
60 	"NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG"
61 	"Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91"
62 	"8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe"
63 	"pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl"
64 	"MrY="
65 		"\"},"
66 		"{\"digicert_global_ca_g2\": \"" /* api.amazon.com 2028-08 */
67 	"MIIEizCCA3OgAwIBAgIQDI7gyQ1qiRWIBAYe4kH5rzANBgkqhkiG9w0BAQsFADBh"
68 	"MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3"
69 	"d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH"
70 	"MjAeFw0xMzA4MDExMjAwMDBaFw0yODA4MDExMjAwMDBaMEQxCzAJBgNVBAYTAlVT"
71 	"MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxHjAcBgNVBAMTFURpZ2lDZXJ0IEdsb2Jh"
72 	"bCBDQSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANNIfL7zBYZd"
73 	"W9UvhU5L4IatFaxhz1uvPmoKR/uadpFgC4przc/cV35gmAvkVNlW7SHMArZagV+X"
74 	"au4CLyMnuG3UsOcGAngLH1ypmTb+u6wbBfpXzYEQQGfWMItYNdSWYb7QjHqXnxr5"
75 	"IuYUL6nG6AEfq/gmD6yOTSwyOR2Bm40cZbIc22GoiS9g5+vCShjEbyrpEJIJ7RfR"
76 	"ACvmfe8EiRROM6GyD5eHn7OgzS+8LOy4g2gxPR/VSpAQGQuBldYpdlH5NnbQtwl6"
77 	"OErXb4y/E3w57bqukPyV93t4CTZedJMeJfD/1K2uaGvG/w/VNfFVbkhJ+Pi474j4"
78 	"8V4Rd6rfArMCAwEAAaOCAVowggFWMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0P"
79 	"AQH/BAQDAgGGMDQGCCsGAQUFBwEBBCgwJjAkBggrBgEFBQcwAYYYaHR0cDovL29j"
80 	"c3AuZGlnaWNlcnQuY29tMHsGA1UdHwR0MHIwN6A1oDOGMWh0dHA6Ly9jcmw0LmRp"
81 	"Z2ljZXJ0LmNvbS9EaWdpQ2VydEdsb2JhbFJvb3RHMi5jcmwwN6A1oDOGMWh0dHA6"
82 	"Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEdsb2JhbFJvb3RHMi5jcmwwPQYD"
83 	"VR0gBDYwNDAyBgRVHSAAMCowKAYIKwYBBQUHAgEWHGh0dHBzOi8vd3d3LmRpZ2lj"
84 	"ZXJ0LmNvbS9DUFMwHQYDVR0OBBYEFCRuKy3QapJRUSVpAaqaR6aJ50AgMB8GA1Ud"
85 	"IwQYMBaAFE4iVCAYlebjbuYP+vq5Eu0GF485MA0GCSqGSIb3DQEBCwUAA4IBAQAL"
86 	"OYSR+ZfrqoGvhOlaOJL84mxZvzbIRacxAxHhBsCsMsdaVSnaT0AC9aHesO3ewPj2"
87 	"dZ12uYf+QYB6z13jAMZbAuabeGLJ3LhimnftiQjXS8X9Q9ViIyfEBFltcT8jW+rZ"
88 	"8uckJ2/0lYDblizkVIvP6hnZf1WZUXoOLRg9eFhSvGNoVwvdRLNXSmDmyHBwW4co"
89 	"atc7TlJFGa8kBpJIERqLrqwYElesA8u49L3KJg6nwd3jM+/AVTANlVlOnAM2BvjA"
90 	"jxSZnE0qnsHhfTuvcqdFuhOWKU4Z0BqYBvQ3lBetoxi6PrABDJXWKTUgNX31EGDk"
91 	"92hiHuwZ4STyhxGs6QiA"
92 		"\"},"
93 		"{\"amazon_root_ca_1\": \""
94 	"MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF"
95 	"ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6"
96 	"b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL"
97 	"MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv"
98 	"b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj"
99 	"ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM"
100 	"9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw"
101 	"IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6"
102 	"VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L"
103 	"93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm"
104 	"jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC"
105 	"AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA"
106 	"A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI"
107 	"U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs"
108 	"N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv"
109 	"o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU"
110 	"5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy"
111 	"rqXRfboQnoZsG4q5WTP468SQvvG5"
112 		"\"},"
113 		"{\"starfield_services_root_ca\": \""
114 	"MIID7zCCAtegAwIBAgIBADANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UEBhMCVVMx"
115 	"EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT"
116 	"HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xOzA5BgNVBAMTMlN0YXJmaWVs"
117 	"ZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5"
118 	"MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgZgxCzAJBgNVBAYTAlVTMRAwDgYD"
119 	"VQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFy"
120 	"ZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTswOQYDVQQDEzJTdGFyZmllbGQgU2Vy"
121 	"dmljZXMgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZI"
122 	"hvcNAQEBBQADggEPADCCAQoCggEBANUMOsQq+U7i9b4Zl1+OiFOxHz/Lz58gE20p"
123 	"OsgPfTz3a3Y4Y9k2YKibXlwAgLIvWX/2h/klQ4bnaRtSmpDhcePYLQ1Ob/bISdm2"
124 	"8xpWriu2dBTrz/sm4xq6HZYuajtYlIlHVv8loJNwU4PahHQUw2eeBGg6345AWh1K"
125 	"Ts9DkTvnVtYAcMtS7nt9rjrnvDH5RfbCYM8TWQIrgMw0R9+53pBlbQLPLJGmpufe"
126 	"hRhJfGZOozptqbXuNC66DQO4M99H67FrjSXZm86B0UVGMpZwh94CDklDhbZsc7tk"
127 	"6mFBrMnUVN+HL8cisibMn1lUaJ/8viovxFUcdUBgF4UCVTmLfwUCAwEAAaNCMEAw"
128 	"DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+q"
129 	"AdcwKziIorhtSpzyEZGDMA0GCSqGSIb3DQEBCwUAA4IBAQBLNqaEd2ndOxmfZyMI"
130 	"bw5hyf2E3F/YNoHN2BtBLZ9g3ccaaNnRbobhiCPPE95Dz+I0swSdHynVv/heyNXB"
131 	"ve6SbzJ08pGCL72CQnqtKrcgfU28elUSwhXqvfdqlS5sdJ/PHLTyxQGjhdByPq1z"
132 	"qwubdQxtRbeOlKyWN7Wg0I8VRw7j6IPdj/3vQQF3zCepYoUz8jcI73HPdwbeyBkd"
133 	"iEDPfUYd/x7H4c7/I9vG+o1VTqkC50cRRj70/b17KSa7qWFiNyi2LSr2EIZkyXCn"
134 	"0q23KXB56jzaYyWf/Wi3MOxw+3WKt21gZ7IeyLnp2KhvAotnDU0mV3HaIPzBSlCN"
135 	"sSi6"
136 		"\"},"
137 		"{\"starfield_class_2_ca\": \""
138 	"MIIEDzCCAvegAwIBAgIBADANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJVUzEl"
139 	"MCMGA1UEChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMp"
140 	"U3RhcmZpZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQw"
141 	"NjI5MTczOTE2WhcNMzQwNjI5MTczOTE2WjBoMQswCQYDVQQGEwJVUzElMCMGA1UE"
142 	"ChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMpU3RhcmZp"
143 	"ZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggEgMA0GCSqGSIb3"
144 	"DQEBAQUAA4IBDQAwggEIAoIBAQC3Msj+6XGmBIWtDBFk385N78gDGIc/oav7PKaf"
145 	"8MOh2tTYbitTkPskpD6E8J7oX+zlJ0T1KKY/e97gKvDIr1MvnsoFAZMej2YcOadN"
146 	"+lq2cwQlZut3f+dZxkqZJRRU6ybH838Z1TBwj6+wRir/resp7defqgSHo9T5iaU0"
147 	"X9tDkYI22WY8sbi5gv2cOj4QyDvvBmVmepsZGD3/cVE8MC5fvj13c7JdBmzDI1aa"
148 	"K4UmkhynArPkPw2vCHmCuDY96pzTNbO8acr1zJ3o/WSNF4Azbl5KXZnJHoe0nRrA"
149 	"1W4TNSNe35tfPe/W93bC6j67eA0cQmdrBNj41tpvi/JEoAGrAgEDo4HFMIHCMB0G"
150 	"A1UdDgQWBBS/X7fRzt0fhvRbVazc1xDCDqmI5zCBkgYDVR0jBIGKMIGHgBS/X7fR"
151 	"zt0fhvRbVazc1xDCDqmI56FspGowaDELMAkGA1UEBhMCVVMxJTAjBgNVBAoTHFN0"
152 	"YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAsTKVN0YXJmaWVsZCBD"
153 	"bGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8w"
154 	"DQYJKoZIhvcNAQEFBQADggEBAAWdP4id0ckaVaGsafPzWdqbAYcaT1epoXkJKtv3"
155 	"L7IezMdeatiDh6GX70k1PncGQVhiv45YuApnP+yz3SFmH8lU+nLMPUxA2IGvd56D"
156 	"eruix/U0F47ZEUD0/CwqTRV/p2JdLiXTAAsgGh1o+Re49L2L7ShZ3U0WixeDyLJl"
157 	"xy16paq8U4Zt3VekyvggQQto8PT7dL5WXXp59fkdheMtlb71cZBDzI0fmgAKhynp"
158 	"VSJYACPq4xJDKVtHCN2MQWplBqjlIapBtJUhlbl90TSrE9atvNziPTnNvT51cKEY"
159 	"WQPJIrSPnNVeKtelttQKbfi3QBFGmh95DmK/D5fs4C8fF5Q="
160 		"\"}"
161 	  "],"
162 	  "\"trust_stores\": [" /* named cert chains */
163 		"{"  /* chain for alexa.na.gateway.devices.a2z.com */
164 			"\"name\": \"avs_via_starfield\","
165 			"\"stack\": ["
166 				"\"starfield_class_2_ca\","
167 				"\"starfield_services_root_ca\""
168 			"]"
169 		"},"
170 		"{" /* chain for api.amazon.com */
171 			"\"name\": \"api_amazon_com\","
172 			"\"stack\": ["
173 				"\"digicert_global_ca_g2\","
174 				"\"digicert_global_root_g2\""
175 			"]"
176 		"}"
177 	  "],"
178 	  "\"auth\": [" /* available auth type bindings */
179 		"{"
180 		  "\"name\":"		"\"lwa\","
181 		  "\"streamtype\":"	"\"api_amazon_com_lwa\","
182 		  "\"blob\":"		"0"
183 		"}"
184 	  "],"
185 	  "\"s\": [" /* the supported stream types */
186 		"{\"api_amazon_com_lwa\": {"
187 			"\"endpoint\":"			"\"api.amazon.com\","
188 			"\"port\":"			"443,"
189 			"\"protocol\":"			"\"h1\","
190 			"\"http_method\":"		"\"POST\","
191 			"\"http_url\":"			"\"auth/o2/token\","
192 			"\"opportunistic\":"		"true,"
193 			"\"tls\":"			"true,"
194 			"\"h2q_oflow_txcr\":"		"true,"
195 			"\"http_www_form_urlencoded\":"	"true,"
196 			"\"http_no_content_length\":"	"true,"
197 			"\"retry\":"			"\"default\","
198 			"\"tls_trust_store\":"		"\"api_amazon_com\""
199 		"}},"
200 		/*
201 		 * long poll event listener
202 		 */
203 		"{\"avs_event\": {"
204 			"\"endpoint\":"			"\"alexa.na.gateway.devices.a2z.com\","
205 			"\"port\":"			"443,"
206 			"\"protocol\":"			"\"h2\","
207 			"\"http_method\":"		"\"GET\","
208 			"\"http_url\":"			"\"v20160207/directives\","
209 			"\"use_auth\":"			"\"lwa\","
210 			"\"h2q_oflow_txcr\":"		"true,"
211 			"\"http_auth_header\":"		"\"authorization:\","
212 			"\"http_auth_preamble\":"	"\"Bearer \","
213 			"\"http_multipart_ss_in\":"	"true,"
214 			"\"nailed_up\":"		"true,"
215 			"\"long_poll\":"		"true,"
216 			"\"retry\":"			"\"default\","
217 			"\"tls\":"			"true,"
218 			"\"tls_trust_store\":"		"\"avs_via_starfield\""
219 		"}},"
220 		/*
221 		 * Utterance metadata and audio send and reply processing.
222 		 *
223 		 * "Rideshare" and http_multipart_mime means these both go out
224 		 * in one multipart http transaction.
225 		 */
226 		"{\"avs_metadata\": {"
227 			"\"endpoint\":"			"\"alexa.na.gateway.devices.a2z.com\","
228 			"\"port\":"			"443,"
229 			"\"protocol\":"			"\"h2\","
230 			"\"http_method\":"		"\"POST\","
231 			"\"http_url\":"			"\"v20160207/events\","
232 			"\"use_auth\":"			"\"lwa\","
233 			"\"opportunistic\":"		"true,"
234 			"\"h2q_oflow_txcr\":"		"true,"
235 			"\"http_auth_header\":"		"\"authorization:\","
236 			"\"http_auth_preamble\":"	"\"Bearer \","
237 			"\"http_multipart_name\":"	"\"metadata\","
238 			"\"http_mime_content_type\":"	"\"application/json; charset=UTF-8\","
239 			"\"http_no_content_length\":"	"true,"
240 			"\"http_multipart_ss_in\":"	"true,"
241 			"\"rideshare\":"		"\"avs_audio\","
242 			"\"retry\":"			"\"default\","
243 			"\"tls\":"			"true,"
244 			"\"tls_trust_store\":"		"\"avs_via_starfield\""
245 		"}},"
246 		"{\"avs_audio\": {"
247 			"\"endpoint\":"			"\"alexa.na.gateway.devices.a2z.com\","
248 			"\"port\":"			"443,"
249 			"\"protocol\":"			"\"h2\","
250 			"\"http_method\":"		"\"POST\","
251 			"\"http_url\":"			"\"v20160207/events\","
252 			"\"use_auth\":"			"\"lwa\","
253 			"\"tls\":"			"true,"
254 			"\"h2q_oflow_txcr\":"		"true,"
255 			"\"http_auth_header\":"		"\"authorization:\","
256 			"\"http_auth_preamble\":"	"\"Bearer \","
257 			"\"http_multipart_ss_in\":"	"true,"
258 			"\"http_multipart_name\":"	"\"audio\","
259 			"\"http_mime_content_type\":"	"\"application/octet-stream\","
260 			"\"http_no_content_length\":"	"true,"
261 			"\"retry\":"			"\"default\","
262 			"\"tls_trust_store\":"		"\"avs_via_starfield\""
263 		"}}"
264 	  "]"
265 	"}"
266 ;
267 
268 #endif
269 
270 static const char *canned_root_token_payload =
271 	"grant_type=refresh_token"
272 	"&refresh_token=Atzr|IwEBIJedGXjDqsU_vMxykqOMg"
273 	"SHfYe3CPcedueWEMWSDMaDnEmiW8RlR1Kns7Cb4B-TOSnqp7ifVsY4BMY2B8tpHfO39XP"
274 	"zfu9HapGjTR458IyHX44FE71pWJkGZ79uVBpljP4sazJuk8XS3Oe_yLnm_DIO6fU1nU3Y"
275 	"0flYmsOiOAQE_gRk_pdlmEtHnpMA-9rLw3mkY5L89Ty9kUygBsiFaYatouROhbsTn8-jW"
276 	"k1zZLUDpT6ICtBXSnrCIg0pUbZevPFhTwdXd6eX-u4rq0W-XaDvPWFO7au-iPb4Zk5eZE"
277 	"iX6sissYrtNmuEXc2uHu7MnQO1hHCaTdIO2CANVumf-PHSD8xseamyh04sLV5JgFzY45S"
278 	"KvKMajiUZuLkMokOx86rjC2Hdkx5DO7G-dbG1ufBDG-N79pFMSs7Ck5pc283IdLoJkCQc"
279 	"AGvTX8o8I29QqkcGou-9TKhOJmpX8As94T61ok0UqqEKPJ7RhfQHHYdCtsdwxgvfVr9qI"
280 	"xL_hDCcTho8opCVX-6QhJHl6SQFlTw13"
281 	"&client_id="
282 		"amzn1.application-oa2-client.4823334c434b4190a2b5a42c07938a2d";
283 
284 /*
285  * Register the root token, and make the sticky AVS connection at the
286  * appropriate times during system startup
287  */
288 
289 static int
app_system_state_nf(lws_state_manager_t * mgr,lws_state_notify_link_t * link,int current,int target)290 app_system_state_nf(lws_state_manager_t *mgr, lws_state_notify_link_t *link,
291 		    int current, int target)
292 {
293 	struct lws_context *context = lws_system_context_from_system_mgr(mgr);
294 	lws_system_blob_t *ab = lws_system_get_blob(context,
295 				LWS_SYSBLOB_TYPE_AUTH, 1 /* AUTH_IDX_ROOT */);
296 	size_t size;
297 
298 	/*
299 	 * For the things we care about, let's notice if we are trying to get
300 	 * past them when we haven't solved them yet, and make the system
301 	 * state wait while we trigger the dependent action.
302 	 */
303 	switch (target) {
304 	case LWS_SYSTATE_REGISTERED:
305 		size = lws_system_blob_get_size(ab);
306 		if (size)
307 			break;
308 
309 		/* let's register our canned root token so auth can use it */
310 		lws_system_blob_direct_set(ab,
311 				(const uint8_t *)canned_root_token_payload,
312 				strlen(canned_root_token_payload));
313 		break;
314 	case LWS_SYSTATE_OPERATIONAL:
315 		if (current == target)
316 			avs_example_start(context);
317 		break;
318 	case LWS_SYSTATE_POLICY_INVALID:
319 		/*
320 		 * This is a NOP since we used direct set... but in a real
321 		 * system this could easily change to be done on the heap, then
322 		 * this would be important
323 		 */
324 		lws_system_blob_destroy(lws_system_get_blob(context,
325 					LWS_SYSBLOB_TYPE_AUTH,
326 					1 /* AUTH_IDX_ROOT */));
327 		break;
328 	}
329 
330 	return 0;
331 }
332 
333 static void
sigint_handler(int sig)334 sigint_handler(int sig)
335 {
336 	interrupted = 1;
337 }
338 
339 static lws_state_notify_link_t * const app_notifier_list[] = {
340 	&nl, NULL
341 };
342 
343 extern struct lws_protocols protocol_audio_test;
344 static const struct lws_protocols *protocols[] = {
345 	&protocol_audio_test,
346 #if defined(LWS_SS_USE_SSPC)
347 	lws_sspc_protocols,
348 #endif
349 	NULL
350 };
351 
main(int argc,const char ** argv)352 int main(int argc, const char **argv)
353 {
354 	struct lws_context_creation_info info;
355 	struct lws_context *context;
356 	int n = 0;
357 
358 	signal(SIGINT, sigint_handler);
359 	memset(&info, 0, sizeof info); /* otherwise uninitialized garbage */
360 	lws_cmdline_option_handle_builtin(argc, argv, &info);
361 
362 	lwsl_user("LWS secure streams - Alexa voice test [-d<verb>]\n");
363 
364 	info.fd_limit_per_thread = 1 + 6 + 1;
365 #if !defined(LWS_SS_USE_SSPC)
366 	info.options = LWS_SERVER_OPTION_EXPLICIT_VHOSTS |
367 		       LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT;
368 	info.pss_policies_json = default_ss_policy;
369 #else
370 	{
371 		const char *p;
372 
373 		/* connect to ssproxy via UDS by default, else via
374 		 * tcp connection to this port */
375 		if ((p = lws_cmdline_option(argc, argv, "-p")))
376 			info.ss_proxy_port = atoi(p);
377 
378 		/* UDS "proxy.ss.lws" in abstract namespace, else this socket
379 		 * path; when -p given this can specify the network interface
380 		 * to bind to */
381 		if ((p = lws_cmdline_option(argc, argv, "-i")))
382 			info.ss_proxy_bind = p;
383 
384 		/* if -p given, -a specifies the proxy address to connect to */
385 		if ((p = lws_cmdline_option(argc, argv, "-a")))
386 			info.ss_proxy_address = p;
387 	}
388 #endif
389 	info.port = CONTEXT_PORT_NO_LISTEN;
390 	info.pprotocols = protocols;
391 
392 	/* integrate us with lws system state management when context created */
393 	nl.name = "app";
394 	nl.notify_cb = app_system_state_nf;
395 	info.register_notifier_list = app_notifier_list;
396 
397 	context = lws_create_context(&info);
398 	if (!context) {
399 		lwsl_err("lws init failed\n");
400 		return 1;
401 	}
402 
403 	/* create an explicit vhost so the sound protocol is initialized */
404 
405 	info.vhost_name = "asound";
406 	if (!lws_create_vhost(context, &info)) {
407 		lwsl_err("lws init failed\n");
408 		goto bail;
409 	}
410 
411 	/* the event loop */
412 
413 	while (n >= 0 && !interrupted)
414 		n = lws_service(context, 0);
415 
416 bail:
417 	lws_context_destroy(context);
418 	lwsl_user("Completed\n");
419 
420 	return 0;
421 }
422