• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2     This file is part of libmicrospdy
3     Copyright Copyright (C) 2012 Andrey Uzunov
4 
5     This program is free software: you can redistribute it and/or modify
6     it under the terms of the GNU General Public License as published by
7     the Free Software Foundation, either version 3 of the License, or
8     (at your option) any later version.
9 
10     This program is distributed in the hope that it will be useful,
11     but WITHOUT ANY WARRANTY; without even the implied warranty of
12     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13     GNU General Public License for more details.
14 
15     You should have received a copy of the GNU General Public License
16     along with this program.  If not, see <http://www.gnu.org/licenses/>.
17 */
18 
19 /**
20  * @file request_response.c
21  * @brief  tests receiving request and sending response. spdycli.c (spdylay)
22  * 			code is reused here
23  * @author Andrey Uzunov
24  * @author Tatsuhiro Tsujikawa
25  */
26 
27 #include "platform.h"
28 #include "microspdy.h"
29 #include <sys/wait.h>
30 #include "common.h"
31 
32 #define RESPONSE_BODY "<html><body><b>Hi, this is libmicrospdy!</b></body></html>"
33 
34 #define CLS "anything"
35 
36 pid_t parent;
37 pid_t child;
38 char *rcvbuf;
39 int rcvbuf_c = 0;
40 
41 int session_closed_called = 0;
42 
43 void
killchild(int pid,char * message)44 killchild(int pid, char *message)
45 {
46 	printf("%s\n",message);
47 	kill(pid, SIGKILL);
48 	exit(1);
49 }
50 
51 void
killparent(int pid,char * message)52 killparent(int pid, char *message)
53 {
54 	printf("%s\n",message);
55 	kill(pid, SIGKILL);
56 	_exit(1);
57 }
58 
59 
60 /*****
61  * start of code needed to utilize spdylay
62  */
63 
64 #include <stdint.h>
65 #include <stdlib.h>
66 #include <unistd.h>
67 #include <fcntl.h>
68 #include <sys/types.h>
69 #include <sys/socket.h>
70 #include <netdb.h>
71 #include <netinet/in.h>
72 #include <netinet/tcp.h>
73 #include <poll.h>
74 #include <signal.h>
75 #include <stdio.h>
76 #include <assert.h>
77 
78 #include <spdylay/spdylay.h>
79 
80 #include <openssl/ssl.h>
81 #include <openssl/err.h>
82 
83 enum {
84   IO_NONE,
85   WANT_READ,
86   WANT_WRITE
87 };
88 
89 struct Connection {
90   SSL *ssl;
91   spdylay_session *session;
92   /* WANT_READ if SSL connection needs more input; or WANT_WRITE if it
93      needs more output; or IO_NONE. This is necessary because SSL/TLS
94      re-negotiation is possible at any time. Spdylay API offers
95      similar functions like spdylay_session_want_read() and
96      spdylay_session_want_write() but they do not take into account
97      SSL connection. */
98   int want_io;
99 };
100 
101 struct Request {
102   char *host;
103   uint16_t port;
104   /* In this program, path contains query component as well. */
105   char *path;
106   /* This is the concatenation of host and port with ":" in
107      between. */
108   char *hostport;
109   /* Stream ID for this request. */
110   int32_t stream_id;
111   /* The gzip stream inflater for the compressed response. */
112   spdylay_gzip *inflater;
113 };
114 
115 struct URI {
116   const char *host;
117   size_t hostlen;
118   uint16_t port;
119   /* In this program, path contains query component as well. */
120   const char *path;
121   size_t pathlen;
122   const char *hostport;
123   size_t hostportlen;
124 };
125 
126 /*
127  * Returns copy of string |s| with the length |len|. The returned
128  * string is NULL-terminated.
129  */
strcopy(const char * s,size_t len)130 static char* strcopy(const char *s, size_t len)
131 {
132   char *dst;
133   dst = malloc(len+1);
134   if (NULL == dst)
135     abort ();
136   memcpy(dst, s, len);
137   dst[len] = '\0';
138   return dst;
139 }
140 
141 /*
142  * Prints error message |msg| and exit.
143  */
die(const char * msg)144 static void die(const char *msg)
145 {
146   fprintf(stderr, "FATAL: %s\n", msg);
147   exit(EXIT_FAILURE);
148 }
149 
150 /*
151  * Prints error containing the function name |func| and message |msg|
152  * and exit.
153  */
dief(const char * func,const char * msg)154 static void dief(const char *func, const char *msg)
155 {
156   fprintf(stderr, "FATAL: %s: %s\n", func, msg);
157   exit(EXIT_FAILURE);
158 }
159 
160 /*
161  * Prints error containing the function name |func| and error code
162  * |error_code| and exit.
163  */
diec(const char * func,int error_code)164 static void diec(const char *func, int error_code)
165 {
166   fprintf(stderr, "FATAL: %s: error_code=%d, msg=%s\n", func, error_code,
167           spdylay_strerror(error_code));
168   exit(EXIT_FAILURE);
169 }
170 
171 /*
172  * Check response is content-encoding: gzip. We need this because SPDY
173  * client is required to support gzip.
174  */
check_gzip(struct Request * req,char ** nv)175 static void check_gzip(struct Request *req, char **nv)
176 {
177   int gzip = 0;
178   size_t i;
179   for(i = 0; nv[i]; i += 2) {
180     if(strcmp("content-encoding", nv[i]) == 0) {
181       gzip = strcmp("gzip", nv[i+1]) == 0;
182       break;
183     }
184   }
185   if(gzip) {
186     int rv;
187     if(req->inflater) {
188       return;
189     }
190     rv = spdylay_gzip_inflate_new(&req->inflater);
191     if(rv != 0) {
192       die("Can't allocate inflate stream.");
193     }
194   }
195 }
196 
197 /*
198  * The implementation of spdylay_send_callback type. Here we write
199  * |data| with size |length| to the network and return the number of
200  * bytes actually written. See the documentation of
201  * spdylay_send_callback for the details.
202  */
send_callback(spdylay_session * session,const uint8_t * data,size_t length,int flags,void * user_data)203 static ssize_t send_callback(spdylay_session *session,
204                              const uint8_t *data, size_t length, int flags,
205                              void *user_data)
206 {
207   (void)session;
208   (void)flags;
209 
210   struct Connection *connection;
211   ssize_t rv;
212   connection = (struct Connection*)user_data;
213   connection->want_io = IO_NONE;
214   ERR_clear_error();
215   rv = SSL_write(connection->ssl, data, length);
216   if(rv < 0) {
217     int err = SSL_get_error(connection->ssl, rv);
218     if(err == SSL_ERROR_WANT_WRITE || err == SSL_ERROR_WANT_READ) {
219       connection->want_io = (err == SSL_ERROR_WANT_READ ?
220                              WANT_READ : WANT_WRITE);
221       rv = SPDYLAY_ERR_WOULDBLOCK;
222     } else {
223       rv = SPDYLAY_ERR_CALLBACK_FAILURE;
224     }
225   }
226   return rv;
227 }
228 
229 /*
230  * The implementation of spdylay_recv_callback type. Here we read data
231  * from the network and write them in |buf|. The capacity of |buf| is
232  * |length| bytes. Returns the number of bytes stored in |buf|. See
233  * the documentation of spdylay_recv_callback for the details.
234  */
recv_callback(spdylay_session * session,uint8_t * buf,size_t length,int flags,void * user_data)235 static ssize_t recv_callback(spdylay_session *session,
236                              uint8_t *buf, size_t length, int flags,
237                              void *user_data)
238 {
239   (void)session;
240   (void)flags;
241 
242   struct Connection *connection;
243   ssize_t rv;
244   connection = (struct Connection*)user_data;
245   connection->want_io = IO_NONE;
246   ERR_clear_error();
247   rv = SSL_read(connection->ssl, buf, length);
248   if(rv < 0) {
249     int err = SSL_get_error(connection->ssl, rv);
250     if(err == SSL_ERROR_WANT_WRITE || err == SSL_ERROR_WANT_READ) {
251       connection->want_io = (err == SSL_ERROR_WANT_READ ?
252                              WANT_READ : WANT_WRITE);
253       rv = SPDYLAY_ERR_WOULDBLOCK;
254     } else {
255       rv = SPDYLAY_ERR_CALLBACK_FAILURE;
256     }
257   } else if(rv == 0) {
258     rv = SPDYLAY_ERR_EOF;
259   }
260   return rv;
261 }
262 
263 /*
264  * The implementation of spdylay_before_ctrl_send_callback type.  We
265  * use this function to get stream ID of the request. This is because
266  * stream ID is not known when we submit the request
267  * (spdylay_submit_request).
268  */
before_ctrl_send_callback(spdylay_session * session,spdylay_frame_type type,spdylay_frame * frame,void * user_data)269 static void before_ctrl_send_callback(spdylay_session *session,
270                                       spdylay_frame_type type,
271                                       spdylay_frame *frame,
272                                       void *user_data)
273 {
274   (void)user_data;
275 
276   if(type == SPDYLAY_SYN_STREAM) {
277     struct Request *req;
278     int stream_id = frame->syn_stream.stream_id;
279     req = spdylay_session_get_stream_user_data(session, stream_id);
280     if(req && req->stream_id == -1) {
281       req->stream_id = stream_id;
282       printf("[INFO] Stream ID = %d\n", stream_id);
283     }
284   }
285 }
286 
on_ctrl_send_callback(spdylay_session * session,spdylay_frame_type type,spdylay_frame * frame,void * user_data)287 static void on_ctrl_send_callback(spdylay_session *session,
288                                   spdylay_frame_type type,
289                                   spdylay_frame *frame, void *user_data)
290 {
291   (void)user_data;
292 
293   char **nv;
294   const char *name = NULL;
295   int32_t stream_id;
296   size_t i;
297   switch(type) {
298   case SPDYLAY_SYN_STREAM:
299     nv = frame->syn_stream.nv;
300     name = "SYN_STREAM";
301     stream_id = frame->syn_stream.stream_id;
302     break;
303   default:
304     break;
305   }
306   if(name && spdylay_session_get_stream_user_data(session, stream_id)) {
307     printf("[INFO] C ----------------------------> S (%s)\n", name);
308     for(i = 0; nv[i]; i += 2) {
309       printf("       %s: %s\n", nv[i], nv[i+1]);
310     }
311   }
312 }
313 
on_ctrl_recv_callback(spdylay_session * session,spdylay_frame_type type,spdylay_frame * frame,void * user_data)314 static void on_ctrl_recv_callback(spdylay_session *session,
315                                   spdylay_frame_type type,
316                                   spdylay_frame *frame, void *user_data)
317 {
318   (void)user_data;
319 
320   struct Request *req;
321   char **nv;
322   const char *name = NULL;
323   int32_t stream_id;
324   size_t i;
325   switch(type) {
326   case SPDYLAY_SYN_REPLY:
327     nv = frame->syn_reply.nv;
328     name = "SYN_REPLY";
329     stream_id = frame->syn_reply.stream_id;
330     break;
331   case SPDYLAY_HEADERS:
332     nv = frame->headers.nv;
333     name = "HEADERS";
334     stream_id = frame->headers.stream_id;
335     break;
336   default:
337     break;
338   }
339   if(!name) {
340     return;
341   }
342   req = spdylay_session_get_stream_user_data(session, stream_id);
343   if(req) {
344     check_gzip(req, nv);
345     printf("[INFO] C <---------------------------- S (%s)\n", name);
346     for(i = 0; nv[i]; i += 2) {
347       printf("       %s: %s\n", nv[i], nv[i+1]);
348     }
349   }
350 }
351 
352 /*
353  * The implementation of spdylay_on_stream_close_callback type. We use
354  * this function to know the response is fully received. Since we just
355  * fetch 1 resource in this program, after reception of the response,
356  * we submit GOAWAY and close the session.
357  */
on_stream_close_callback(spdylay_session * session,int32_t stream_id,spdylay_status_code status_code,void * user_data)358 static void on_stream_close_callback(spdylay_session *session,
359                                      int32_t stream_id,
360                                      spdylay_status_code status_code,
361                                      void *user_data)
362 {
363   (void)user_data;
364   (void)status_code;
365 
366   struct Request *req;
367   req = spdylay_session_get_stream_user_data(session, stream_id);
368   if(req) {
369     int rv;
370     rv = spdylay_submit_goaway(session, SPDYLAY_GOAWAY_OK);
371     if(rv != 0) {
372       diec("spdylay_submit_goaway", rv);
373     }
374   }
375 }
376 
377 #define MAX_OUTLEN 4096
378 
379 /*
380  * The implementation of spdylay_on_data_chunk_recv_callback type. We
381  * use this function to print the received response body.
382  */
on_data_chunk_recv_callback(spdylay_session * session,uint8_t flags,int32_t stream_id,const uint8_t * data,size_t len,void * user_data)383 static void on_data_chunk_recv_callback(spdylay_session *session, uint8_t flags,
384                                         int32_t stream_id,
385                                         const uint8_t *data, size_t len,
386                                         void *user_data)
387 {
388   (void)user_data;
389   (void)flags;
390 
391   struct Request *req;
392   req = spdylay_session_get_stream_user_data(session, stream_id);
393   if(req) {
394     printf("[INFO] C <---------------------------- S (DATA)\n");
395     printf("       %lu bytes\n", (unsigned long int)len);
396     if(req->inflater) {
397       while(len > 0) {
398         uint8_t out[MAX_OUTLEN];
399         size_t outlen = MAX_OUTLEN;
400         size_t tlen = len;
401         int rv;
402         rv = spdylay_gzip_inflate(req->inflater, out, &outlen, data, &tlen);
403         if(rv == -1) {
404           spdylay_submit_rst_stream(session, stream_id, SPDYLAY_INTERNAL_ERROR);
405           break;
406         }
407         fwrite(out, 1, outlen, stdout);
408         data += tlen;
409         len -= tlen;
410       }
411     } else {
412       /* TODO add support gzip */
413       fwrite(data, 1, len, stdout);
414 
415       //check if the data is correct
416       //if(strcmp(RESPONSE_BODY, data) != 0)
417 		//killparent(parent, "\nreceived data is not the same");
418       if(len + rcvbuf_c > strlen(RESPONSE_BODY))
419 		killparent(parent, "\nreceived data is not the same");
420 
421 		strcpy(rcvbuf + rcvbuf_c,(char*)data);
422 		rcvbuf_c+=len;
423     }
424     printf("\n");
425   }
426 }
427 
428 /*
429  * Setup callback functions. Spdylay API offers many callback
430  * functions, but most of them are optional. The send_callback is
431  * always required. Since we use spdylay_session_recv(), the
432  * recv_callback is also required.
433  */
setup_spdylay_callbacks(spdylay_session_callbacks * callbacks)434 static void setup_spdylay_callbacks(spdylay_session_callbacks *callbacks)
435 {
436   memset(callbacks, 0, sizeof(spdylay_session_callbacks));
437   callbacks->send_callback = send_callback;
438   callbacks->recv_callback = recv_callback;
439   callbacks->before_ctrl_send_callback = before_ctrl_send_callback;
440   callbacks->on_ctrl_send_callback = on_ctrl_send_callback;
441   callbacks->on_ctrl_recv_callback = on_ctrl_recv_callback;
442   callbacks->on_stream_close_callback = on_stream_close_callback;
443   callbacks->on_data_chunk_recv_callback = on_data_chunk_recv_callback;
444 }
445 
446 /*
447  * Callback function for SSL/TLS NPN. Since this program only supports
448  * SPDY protocol, if server does not offer SPDY protocol the Spdylay
449  * library supports, we terminate program.
450  */
select_next_proto_cb(SSL * ssl,unsigned char ** out,unsigned char * outlen,const unsigned char * in,unsigned int inlen,void * arg)451 static int select_next_proto_cb(SSL* ssl,
452                                 unsigned char **out, unsigned char *outlen,
453                                 const unsigned char *in, unsigned int inlen,
454                                 void *arg)
455 {
456   (void)ssl;
457 
458   int rv;
459   uint16_t *spdy_proto_version;
460   /* spdylay_select_next_protocol() selects SPDY protocol version the
461      Spdylay library supports. */
462   rv = spdylay_select_next_protocol(out, outlen, in, inlen);
463   if(rv <= 0) {
464     die("Server did not advertise spdy/2 or spdy/3 protocol.");
465   }
466   spdy_proto_version = (uint16_t*)arg;
467   *spdy_proto_version = rv;
468   return SSL_TLSEXT_ERR_OK;
469 }
470 
471 /*
472  * Setup SSL context. We pass |spdy_proto_version| to get negotiated
473  * SPDY protocol version in NPN callback.
474  */
init_ssl_ctx(SSL_CTX * ssl_ctx,uint16_t * spdy_proto_version)475 static void init_ssl_ctx(SSL_CTX *ssl_ctx, uint16_t *spdy_proto_version)
476 {
477   /* Disable SSLv2 and enable all workarounds for buggy servers */
478   SSL_CTX_set_options(ssl_ctx, SSL_OP_ALL|SSL_OP_NO_SSLv2);
479   SSL_CTX_set_mode(ssl_ctx, SSL_MODE_AUTO_RETRY);
480   SSL_CTX_set_mode(ssl_ctx, SSL_MODE_RELEASE_BUFFERS);
481   /* Set NPN callback */
482   SSL_CTX_set_next_proto_select_cb(ssl_ctx, select_next_proto_cb,
483                                    spdy_proto_version);
484 }
485 
ssl_handshake(SSL * ssl,int fd)486 static void ssl_handshake(SSL *ssl, int fd)
487 {
488   int rv;
489   if(SSL_set_fd(ssl, fd) == 0) {
490     dief("SSL_set_fd", ERR_error_string(ERR_get_error(), NULL));
491   }
492   ERR_clear_error();
493   rv = SSL_connect(ssl);
494   if(rv <= 0) {
495     dief("SSL_connect", ERR_error_string(ERR_get_error(), NULL));
496   }
497 }
498 
499 /*
500  * Connects to the host |host| and port |port|.  This function returns
501  * the file descriptor of the client socket.
502  */
connect_to(const char * host,uint16_t port)503 static int connect_to(const char *host, uint16_t port)
504 {
505   struct addrinfo hints;
506   int fd = -1;
507   int rv;
508   char service[NI_MAXSERV];
509   struct addrinfo *res, *rp;
510   snprintf(service, sizeof(service), "%u", port);
511   memset(&hints, 0, sizeof(struct addrinfo));
512   hints.ai_family = AF_UNSPEC;
513   hints.ai_socktype = SOCK_STREAM;
514   rv = getaddrinfo(host, service, &hints, &res);
515   if(rv != 0) {
516     dief("getaddrinfo", gai_strerror(rv));
517   }
518   for(rp = res; rp; rp = rp->ai_next) {
519     fd = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol);
520     if(fd == -1) {
521       continue;
522     }
523     while((rv = connect(fd, rp->ai_addr, rp->ai_addrlen)) == -1 &&
524           errno == EINTR);
525     if(rv == 0) {
526       break;
527     }
528     close(fd);
529     fd = -1;
530   }
531   freeaddrinfo(res);
532   return fd;
533 }
534 
make_non_block(int fd)535 static void make_non_block(int fd)
536 {
537   int flags, rv;
538   while((flags = fcntl(fd, F_GETFL, 0)) == -1 && errno == EINTR);
539   if(flags == -1) {
540     dief("fcntl", strerror(errno));
541   }
542   while((rv = fcntl(fd, F_SETFL, flags | O_NONBLOCK)) == -1 && errno == EINTR);
543   if(rv == -1) {
544     dief("fcntl", strerror(errno));
545   }
546 }
547 
548 /*
549  * Setting TCP_NODELAY is not mandatory for the SPDY protocol.
550  */
set_tcp_nodelay(int fd)551 static void set_tcp_nodelay(int fd)
552 {
553   int val = 1;
554   int rv;
555   rv = setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &val, (socklen_t)sizeof(val));
556   if(rv == -1) {
557     dief("setsockopt", strerror(errno));
558   }
559 }
560 
561 /*
562  * Update |pollfd| based on the state of |connection|.
563  */
ctl_poll(struct pollfd * pollfd,struct Connection * connection)564 static void ctl_poll(struct pollfd *pollfd, struct Connection *connection)
565 {
566   pollfd->events = 0;
567   if(spdylay_session_want_read(connection->session) ||
568      connection->want_io == WANT_READ) {
569     pollfd->events |= POLLIN;
570   }
571   if(spdylay_session_want_write(connection->session) ||
572      connection->want_io == WANT_WRITE) {
573     pollfd->events |= POLLOUT;
574   }
575 }
576 
577 /*
578  * Submits the request |req| to the connection |connection|.  This
579  * function does not send packets; just append the request to the
580  * internal queue in |connection->session|.
581  */
submit_request(struct Connection * connection,struct Request * req)582 static void submit_request(struct Connection *connection, struct Request *req)
583 {
584   int pri = 0;
585   int rv;
586   const char *nv[15];
587   /* We always use SPDY/3 style header even if the negotiated protocol
588      version is SPDY/2. The library translates the header name as
589      necessary. Make sure that the last item is NULL! */
590   nv[0] = ":method";     nv[1] = "GET";
591   nv[2] = ":path";       nv[3] = req->path;
592   nv[4] = ":version";    nv[5] = "HTTP/1.1";
593   nv[6] = ":scheme";     nv[7] = "https";
594   nv[8] = ":host";       nv[9] = req->hostport;
595   nv[10] = "accept";     nv[11] = "*/*";
596   nv[12] = "user-agent"; nv[13] = "spdylay/"SPDYLAY_VERSION;
597   nv[14] = NULL;
598   rv = spdylay_submit_request(connection->session, pri, nv, NULL, req);
599   if(rv != 0) {
600     diec("spdylay_submit_request", rv);
601   }
602 }
603 
604 /*
605  * Performs the network I/O.
606  */
exec_io(struct Connection * connection)607 static void exec_io(struct Connection *connection)
608 {
609   int rv;
610   rv = spdylay_session_recv(connection->session);
611   if(rv != 0) {
612     diec("spdylay_session_recv", rv);
613   }
614   rv = spdylay_session_send(connection->session);
615   if(rv != 0) {
616     diec("spdylay_session_send", rv);
617   }
618 }
619 
request_init(struct Request * req,const struct URI * uri)620 static void request_init(struct Request *req, const struct URI *uri)
621 {
622   req->host = strcopy(uri->host, uri->hostlen);
623   req->port = uri->port;
624   req->path = strcopy(uri->path, uri->pathlen);
625   req->hostport = strcopy(uri->hostport, uri->hostportlen);
626   req->stream_id = -1;
627   req->inflater = NULL;
628 }
629 
request_free(struct Request * req)630 static void request_free(struct Request *req)
631 {
632   free(req->host);
633   free(req->path);
634   free(req->hostport);
635   spdylay_gzip_inflate_del(req->inflater);
636 }
637 
638 /*
639  * Fetches the resource denoted by |uri|.
640  */
fetch_uri(const struct URI * uri)641 static void fetch_uri(const struct URI *uri)
642 {
643   spdylay_session_callbacks callbacks;
644   int fd;
645   SSL_CTX *ssl_ctx;
646   SSL *ssl;
647   struct Request req;
648   struct Connection connection;
649   int rv;
650   nfds_t npollfds = 1;
651   struct pollfd pollfds[1];
652   uint16_t spdy_proto_version;
653 
654   request_init(&req, uri);
655 
656   setup_spdylay_callbacks(&callbacks);
657 
658   /* Establish connection and setup SSL */
659   fd = connect_to(req.host, req.port);
660   if (-1 == fd)
661     abort ();
662   ssl_ctx = SSL_CTX_new(SSLv23_client_method());
663   if(ssl_ctx == NULL) {
664     dief("SSL_CTX_new", ERR_error_string(ERR_get_error(), NULL));
665   }
666   init_ssl_ctx(ssl_ctx, &spdy_proto_version);
667   ssl = SSL_new(ssl_ctx);
668   if(ssl == NULL) {
669     dief("SSL_new", ERR_error_string(ERR_get_error(), NULL));
670   }
671   /* To simplify the program, we perform SSL/TLS handshake in blocking
672      I/O. */
673   ssl_handshake(ssl, fd);
674 
675   connection.ssl = ssl;
676   connection.want_io = IO_NONE;
677 
678   /* Here make file descriptor non-block */
679   make_non_block(fd);
680   set_tcp_nodelay(fd);
681 
682   printf("[INFO] SPDY protocol version = %d\n", spdy_proto_version);
683   rv = spdylay_session_client_new(&connection.session, spdy_proto_version,
684                                   &callbacks, &connection);
685   if(rv != 0) {
686     diec("spdylay_session_client_new", rv);
687   }
688 
689   /* Submit the HTTP request to the outbound queue. */
690   submit_request(&connection, &req);
691 
692   pollfds[0].fd = fd;
693   ctl_poll(pollfds, &connection);
694 
695   /* Event loop */
696   while(spdylay_session_want_read(connection.session) ||
697         spdylay_session_want_write(connection.session)) {
698     int nfds = poll(pollfds, npollfds, -1);
699     if(nfds == -1) {
700       dief("poll", strerror(errno));
701     }
702     if(pollfds[0].revents & (POLLIN | POLLOUT)) {
703       exec_io(&connection);
704     }
705     if((pollfds[0].revents & POLLHUP) || (pollfds[0].revents & POLLERR)) {
706       die("Connection error");
707     }
708     ctl_poll(pollfds, &connection);
709   }
710 
711   /* Resource cleanup */
712   spdylay_session_del(connection.session);
713   SSL_shutdown(ssl);
714   SSL_free(ssl);
715   SSL_CTX_free(ssl_ctx);
716   shutdown(fd, SHUT_WR);
717   close(fd);
718   request_free(&req);
719 }
720 
parse_uri(struct URI * res,const char * uri)721 static int parse_uri(struct URI *res, const char *uri)
722 {
723   /* We only interested in https */
724   size_t len, i, offset;
725   memset(res, 0, sizeof(struct URI));
726   len = strlen(uri);
727   if(len < 9 || memcmp("https://", uri, 8) != 0) {
728     return -1;
729   }
730   offset = 8;
731   res->host = res->hostport = &uri[offset];
732   res->hostlen = 0;
733   if(uri[offset] == '[') {
734     /* IPv6 literal address */
735     ++offset;
736     ++res->host;
737     for(i = offset; i < len; ++i) {
738       if(uri[i] == ']') {
739         res->hostlen = i-offset;
740         offset = i+1;
741         break;
742       }
743     }
744   } else {
745     const char delims[] = ":/?#";
746     for(i = offset; i < len; ++i) {
747       if(strchr(delims, uri[i]) != NULL) {
748         break;
749       }
750     }
751     res->hostlen = i-offset;
752     offset = i;
753   }
754   if(res->hostlen == 0) {
755     return -1;
756   }
757   /* Assuming https */
758   res->port = 443;
759   if(offset < len) {
760     if(uri[offset] == ':') {
761       /* port */
762       const char delims[] = "/?#";
763       int port = 0;
764       ++offset;
765       for(i = offset; i < len; ++i) {
766         if(strchr(delims, uri[i]) != NULL) {
767           break;
768         }
769         if('0' <= uri[i] && uri[i] <= '9') {
770           port *= 10;
771           port += uri[i]-'0';
772           if(port > 65535) {
773             return -1;
774           }
775         } else {
776           return -1;
777         }
778       }
779       if(port == 0) {
780         return -1;
781       }
782       offset = i;
783       res->port = port;
784     }
785   }
786   res->hostportlen = uri+offset-res->host;
787   for(i = offset; i < len; ++i) {
788     if(uri[i] == '#') {
789       break;
790     }
791   }
792   if(i-offset == 0) {
793     res->path = "/";
794     res->pathlen = 1;
795   } else {
796     res->path = &uri[offset];
797     res->pathlen = i-offset;
798   }
799   return 0;
800 }
801 
802 
803 /*****
804  * end of code needed to utilize spdylay
805  */
806 
807 
808 /*****
809  * start of code needed to utilize microspdy
810  */
811 
812 
813 void
standard_request_handler(void * cls,struct SPDY_Request * request,uint8_t priority,const char * method,const char * path,const char * version,const char * host,const char * scheme,struct SPDY_NameValue * headers,bool more)814 standard_request_handler(void *cls,
815 						struct SPDY_Request * request,
816 						uint8_t priority,
817                         const char *method,
818                         const char *path,
819                         const char *version,
820                         const char *host,
821                         const char *scheme,
822 						struct SPDY_NameValue * headers,
823             bool more)
824 {
825 	(void)cls;
826 	(void)request;
827 	(void)priority;
828 	(void)host;
829 	(void)scheme;
830 	(void)headers;
831 	(void)method;
832 	(void)version;
833 
834 	struct SPDY_Response *response=NULL;
835 
836 	if(strcmp(CLS,cls)!=0)
837 	{
838 		killchild(child,"wrong cls");
839 	}
840 
841 	if(false != more){
842 		fprintf(stdout,"more has wrong value\n");
843 		exit(5);
844 	}
845 
846 	response = SPDY_build_response(200,NULL,SPDY_HTTP_VERSION_1_1,NULL,RESPONSE_BODY,strlen(RESPONSE_BODY));
847 
848 	if(NULL==response){
849 		fprintf(stdout,"no response obj\n");
850 		exit(3);
851 	}
852 
853 	if(SPDY_queue_response(request,response,true,false,NULL,(void*)strdup(path))!=SPDY_YES)
854 	{
855 		fprintf(stdout,"queue\n");
856 		exit(4);
857 	}
858 }
859 
860 void
session_closed_handler(void * cls,struct SPDY_Session * session,int by_client)861 session_closed_handler (void *cls,
862 						struct SPDY_Session * session,
863 						int by_client)
864 {
865 	printf("session_closed_handler called\n");
866 
867 	if(strcmp(CLS,cls)!=0)
868 	{
869 		killchild(child,"wrong cls");
870 	}
871 
872 	if(SPDY_YES != by_client)
873 	{
874 		//killchild(child,"wrong by_client");
875 		printf("session closed by server\n");
876 	}
877 	else
878 	{
879 		printf("session closed by client\n");
880 	}
881 
882 	if(NULL == session)
883 	{
884 		killchild(child,"session is NULL");
885 	}
886 
887 	session_closed_called = 1;
888 }
889 
890 
891 /*****
892  * end of code needed to utilize microspdy
893  */
894 
895 //child process
896 void
childproc(int port)897 childproc(int port)
898 {
899   struct URI uri;
900   struct sigaction act;
901   int rv;
902   char *uristr;
903 
904   memset(&act, 0, sizeof(struct sigaction));
905   act.sa_handler = SIG_IGN;
906   sigaction(SIGPIPE, &act, 0);
907 
908 	asprintf(&uristr, "https://127.0.0.1:%i/",port);
909 	if(NULL == (rcvbuf = malloc(strlen(RESPONSE_BODY)+1)))
910 		killparent(parent,"no memory");
911 
912   SSL_load_error_strings();
913   SSL_library_init();
914 
915   rv = parse_uri(&uri, uristr);
916   if(rv != 0) {
917     killparent(parent,"parse_uri failed");
918   }
919   fetch_uri(&uri);
920 
921   if(strcmp(rcvbuf, RESPONSE_BODY))
922     killparent(parent,"received data is different");
923 }
924 
925 //parent proc
926 int
parentproc(int port)927 parentproc( int port)
928 {
929 	int childstatus;
930 	unsigned long long timeoutlong=0;
931 	struct timeval timeout;
932 	int ret;
933 	fd_set read_fd_set;
934 	fd_set write_fd_set;
935 	fd_set except_fd_set;
936 	int maxfd = -1;
937 	struct SPDY_Daemon *daemon;
938 
939 	SPDY_init();
940 
941 	daemon = SPDY_start_daemon(port,
942 								DATA_DIR "cert-and-key.pem",
943 								DATA_DIR "cert-and-key.pem",
944 								NULL,&session_closed_handler,&standard_request_handler,NULL,CLS,SPDY_DAEMON_OPTION_END);
945 
946 	if(NULL==daemon){
947 		printf("no daemon\n");
948 		return 1;
949 	}
950 
951 	do
952 	{
953 		FD_ZERO(&read_fd_set);
954 		FD_ZERO(&write_fd_set);
955 		FD_ZERO(&except_fd_set);
956 
957 		ret = SPDY_get_timeout(daemon, &timeoutlong);
958 		if(SPDY_NO == ret || timeoutlong > 1000)
959 		{
960 			timeout.tv_sec = 1;
961       timeout.tv_usec = 0;
962 		}
963 		else
964 		{
965 			timeout.tv_sec = timeoutlong / 1000;
966 			timeout.tv_usec = (timeoutlong % 1000) * 1000;
967 		}
968 
969 		maxfd = SPDY_get_fdset (daemon,
970 								&read_fd_set,
971 								&write_fd_set,
972 								&except_fd_set);
973 
974 		ret = select(maxfd+1, &read_fd_set, &write_fd_set, &except_fd_set, &timeout);
975 
976 		switch(ret) {
977 			case -1:
978 				printf("select error: %i\n", errno);
979 				killchild(child, "select error");
980 				break;
981 			case 0:
982 
983 				break;
984 			default:
985 				SPDY_run(daemon);
986 
987 			break;
988 		}
989 	}
990 	while(waitpid(child,&childstatus,WNOHANG) != child);
991 
992 	//give chance to the client to close socket and handle this in run
993 	usleep(100000);
994 	SPDY_run(daemon);
995 
996 	SPDY_stop_daemon(daemon);
997 
998 	SPDY_deinit();
999 
1000 	return WEXITSTATUS(childstatus);
1001 }
1002 
main()1003 int main()
1004 {
1005 	int port = get_port(12123);
1006 	parent = getpid();
1007 
1008    child = fork();
1009    if (child == -1)
1010    {
1011       fprintf(stderr, "can't fork, error %d\n", errno);
1012       exit(EXIT_FAILURE);
1013    }
1014 
1015    if (child == 0)
1016    {
1017       childproc(port);
1018       _exit(0);
1019    }
1020    else
1021    {
1022 	   int ret = parentproc(port);
1023 	   if(1 == session_closed_called && 0 == ret)
1024       exit(0);
1025       else
1026       exit(ret ? ret : 21);
1027    }
1028    return 1;
1029 }
1030