Home | History | Annotate | Download | only in testspdy
      1 /*
      2     This file is part of libmicrospdy
      3     Copyright Copyright (C) 2012 Andrey Uzunov
      4 
      5     This program is free software: you can redistribute it and/or modify
      6     it under the terms of the GNU General Public License as published by
      7     the Free Software Foundation, either version 3 of the License, or
      8     (at your option) any later version.
      9 
     10     This program is distributed in the hope that it will be useful,
     11     but WITHOUT ANY WARRANTY; without even the implied warranty of
     12     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
     13     GNU General Public License for more details.
     14 
     15     You should have received a copy of the GNU General Public License
     16     along with this program.  If not, see <http://www.gnu.org/licenses/>.
     17 */
     18 
     19 /**
     20  * @file request_response.c
     21  * @brief  tests receiving request and sending response. spdycli.c (spdylay)
     22  * 			code is reused here
     23  * @author Andrey Uzunov
     24  * @author Tatsuhiro Tsujikawa
     25  */
     26 
     27 #include "platform.h"
     28 #include "microspdy.h"
     29 #include <sys/wait.h>
     30 #include "common.h"
     31 
     32 #define RESPONSE_BODY "<html><body><b>Hi, this is libmicrospdy!</b></body></html>"
     33 
     34 #define CLS "anything"
     35 
     36 pid_t parent;
     37 pid_t child;
     38 char *rcvbuf;
     39 int rcvbuf_c = 0;
     40 
     41 int session_closed_called = 0;
     42 
     43 void
     44 killchild(int pid, char *message)
     45 {
     46 	printf("%s\n",message);
     47 	kill(pid, SIGKILL);
     48 	exit(1);
     49 }
     50 
     51 void
     52 killparent(int pid, char *message)
     53 {
     54 	printf("%s\n",message);
     55 	kill(pid, SIGKILL);
     56 	_exit(1);
     57 }
     58 
     59 
     60 /*****
     61  * start of code needed to utilize spdylay
     62  */
     63 
     64 #include <stdint.h>
     65 #include <stdlib.h>
     66 #include <unistd.h>
     67 #include <fcntl.h>
     68 #include <sys/types.h>
     69 #include <sys/socket.h>
     70 #include <netdb.h>
     71 #include <netinet/in.h>
     72 #include <netinet/tcp.h>
     73 #include <poll.h>
     74 #include <signal.h>
     75 #include <stdio.h>
     76 #include <assert.h>
     77 
     78 #include <spdylay/spdylay.h>
     79 
     80 #include <openssl/ssl.h>
     81 #include <openssl/err.h>
     82 
     83 enum {
     84   IO_NONE,
     85   WANT_READ,
     86   WANT_WRITE
     87 };
     88 
     89 struct Connection {
     90   SSL *ssl;
     91   spdylay_session *session;
     92   /* WANT_READ if SSL connection needs more input; or WANT_WRITE if it
     93      needs more output; or IO_NONE. This is necessary because SSL/TLS
     94      re-negotiation is possible at any time. Spdylay API offers
     95      similar functions like spdylay_session_want_read() and
     96      spdylay_session_want_write() but they do not take into account
     97      SSL connection. */
     98   int want_io;
     99 };
    100 
    101 struct Request {
    102   char *host;
    103   uint16_t port;
    104   /* In this program, path contains query component as well. */
    105   char *path;
    106   /* This is the concatenation of host and port with ":" in
    107      between. */
    108   char *hostport;
    109   /* Stream ID for this request. */
    110   int32_t stream_id;
    111   /* The gzip stream inflater for the compressed response. */
    112   spdylay_gzip *inflater;
    113 };
    114 
    115 struct URI {
    116   const char *host;
    117   size_t hostlen;
    118   uint16_t port;
    119   /* In this program, path contains query component as well. */
    120   const char *path;
    121   size_t pathlen;
    122   const char *hostport;
    123   size_t hostportlen;
    124 };
    125 
    126 /*
    127  * Returns copy of string |s| with the length |len|. The returned
    128  * string is NULL-terminated.
    129  */
    130 static char* strcopy(const char *s, size_t len)
    131 {
    132   char *dst;
    133   dst = malloc(len+1);
    134   if (NULL == dst)
    135     abort ();
    136   memcpy(dst, s, len);
    137   dst[len] = '\0';
    138   return dst;
    139 }
    140 
    141 /*
    142  * Prints error message |msg| and exit.
    143  */
    144 static void die(const char *msg)
    145 {
    146   fprintf(stderr, "FATAL: %s\n", msg);
    147   exit(EXIT_FAILURE);
    148 }
    149 
    150 /*
    151  * Prints error containing the function name |func| and message |msg|
    152  * and exit.
    153  */
    154 static void dief(const char *func, const char *msg)
    155 {
    156   fprintf(stderr, "FATAL: %s: %s\n", func, msg);
    157   exit(EXIT_FAILURE);
    158 }
    159 
    160 /*
    161  * Prints error containing the function name |func| and error code
    162  * |error_code| and exit.
    163  */
    164 static void diec(const char *func, int error_code)
    165 {
    166   fprintf(stderr, "FATAL: %s: error_code=%d, msg=%s\n", func, error_code,
    167           spdylay_strerror(error_code));
    168   exit(EXIT_FAILURE);
    169 }
    170 
    171 /*
    172  * Check response is content-encoding: gzip. We need this because SPDY
    173  * client is required to support gzip.
    174  */
    175 static void check_gzip(struct Request *req, char **nv)
    176 {
    177   int gzip = 0;
    178   size_t i;
    179   for(i = 0; nv[i]; i += 2) {
    180     if(strcmp("content-encoding", nv[i]) == 0) {
    181       gzip = strcmp("gzip", nv[i+1]) == 0;
    182       break;
    183     }
    184   }
    185   if(gzip) {
    186     int rv;
    187     if(req->inflater) {
    188       return;
    189     }
    190     rv = spdylay_gzip_inflate_new(&req->inflater);
    191     if(rv != 0) {
    192       die("Can't allocate inflate stream.");
    193     }
    194   }
    195 }
    196 
    197 /*
    198  * The implementation of spdylay_send_callback type. Here we write
    199  * |data| with size |length| to the network and return the number of
    200  * bytes actually written. See the documentation of
    201  * spdylay_send_callback for the details.
    202  */
    203 static ssize_t send_callback(spdylay_session *session,
    204                              const uint8_t *data, size_t length, int flags,
    205                              void *user_data)
    206 {
    207   (void)session;
    208   (void)flags;
    209 
    210   struct Connection *connection;
    211   ssize_t rv;
    212   connection = (struct Connection*)user_data;
    213   connection->want_io = IO_NONE;
    214   ERR_clear_error();
    215   rv = SSL_write(connection->ssl, data, length);
    216   if(rv < 0) {
    217     int err = SSL_get_error(connection->ssl, rv);
    218     if(err == SSL_ERROR_WANT_WRITE || err == SSL_ERROR_WANT_READ) {
    219       connection->want_io = (err == SSL_ERROR_WANT_READ ?
    220                              WANT_READ : WANT_WRITE);
    221       rv = SPDYLAY_ERR_WOULDBLOCK;
    222     } else {
    223       rv = SPDYLAY_ERR_CALLBACK_FAILURE;
    224     }
    225   }
    226   return rv;
    227 }
    228 
    229 /*
    230  * The implementation of spdylay_recv_callback type. Here we read data
    231  * from the network and write them in |buf|. The capacity of |buf| is
    232  * |length| bytes. Returns the number of bytes stored in |buf|. See
    233  * the documentation of spdylay_recv_callback for the details.
    234  */
    235 static ssize_t recv_callback(spdylay_session *session,
    236                              uint8_t *buf, size_t length, int flags,
    237                              void *user_data)
    238 {
    239   (void)session;
    240   (void)flags;
    241 
    242   struct Connection *connection;
    243   ssize_t rv;
    244   connection = (struct Connection*)user_data;
    245   connection->want_io = IO_NONE;
    246   ERR_clear_error();
    247   rv = SSL_read(connection->ssl, buf, length);
    248   if(rv < 0) {
    249     int err = SSL_get_error(connection->ssl, rv);
    250     if(err == SSL_ERROR_WANT_WRITE || err == SSL_ERROR_WANT_READ) {
    251       connection->want_io = (err == SSL_ERROR_WANT_READ ?
    252                              WANT_READ : WANT_WRITE);
    253       rv = SPDYLAY_ERR_WOULDBLOCK;
    254     } else {
    255       rv = SPDYLAY_ERR_CALLBACK_FAILURE;
    256     }
    257   } else if(rv == 0) {
    258     rv = SPDYLAY_ERR_EOF;
    259   }
    260   return rv;
    261 }
    262 
    263 /*
    264  * The implementation of spdylay_before_ctrl_send_callback type.  We
    265  * use this function to get stream ID of the request. This is because
    266  * stream ID is not known when we submit the request
    267  * (spdylay_submit_request).
    268  */
    269 static void before_ctrl_send_callback(spdylay_session *session,
    270                                       spdylay_frame_type type,
    271                                       spdylay_frame *frame,
    272                                       void *user_data)
    273 {
    274   (void)user_data;
    275 
    276   if(type == SPDYLAY_SYN_STREAM) {
    277     struct Request *req;
    278     int stream_id = frame->syn_stream.stream_id;
    279     req = spdylay_session_get_stream_user_data(session, stream_id);
    280     if(req && req->stream_id == -1) {
    281       req->stream_id = stream_id;
    282       printf("[INFO] Stream ID = %d\n", stream_id);
    283     }
    284   }
    285 }
    286 
    287 static void on_ctrl_send_callback(spdylay_session *session,
    288                                   spdylay_frame_type type,
    289                                   spdylay_frame *frame, void *user_data)
    290 {
    291   (void)user_data;
    292 
    293   char **nv;
    294   const char *name = NULL;
    295   int32_t stream_id;
    296   size_t i;
    297   switch(type) {
    298   case SPDYLAY_SYN_STREAM:
    299     nv = frame->syn_stream.nv;
    300     name = "SYN_STREAM";
    301     stream_id = frame->syn_stream.stream_id;
    302     break;
    303   default:
    304     break;
    305   }
    306   if(name && spdylay_session_get_stream_user_data(session, stream_id)) {
    307     printf("[INFO] C ----------------------------> S (%s)\n", name);
    308     for(i = 0; nv[i]; i += 2) {
    309       printf("       %s: %s\n", nv[i], nv[i+1]);
    310     }
    311   }
    312 }
    313 
    314 static void on_ctrl_recv_callback(spdylay_session *session,
    315                                   spdylay_frame_type type,
    316                                   spdylay_frame *frame, void *user_data)
    317 {
    318   (void)user_data;
    319 
    320   struct Request *req;
    321   char **nv;
    322   const char *name = NULL;
    323   int32_t stream_id;
    324   size_t i;
    325   switch(type) {
    326   case SPDYLAY_SYN_REPLY:
    327     nv = frame->syn_reply.nv;
    328     name = "SYN_REPLY";
    329     stream_id = frame->syn_reply.stream_id;
    330     break;
    331   case SPDYLAY_HEADERS:
    332     nv = frame->headers.nv;
    333     name = "HEADERS";
    334     stream_id = frame->headers.stream_id;
    335     break;
    336   default:
    337     break;
    338   }
    339   if(!name) {
    340     return;
    341   }
    342   req = spdylay_session_get_stream_user_data(session, stream_id);
    343   if(req) {
    344     check_gzip(req, nv);
    345     printf("[INFO] C <---------------------------- S (%s)\n", name);
    346     for(i = 0; nv[i]; i += 2) {
    347       printf("       %s: %s\n", nv[i], nv[i+1]);
    348     }
    349   }
    350 }
    351 
    352 /*
    353  * The implementation of spdylay_on_stream_close_callback type. We use
    354  * this function to know the response is fully received. Since we just
    355  * fetch 1 resource in this program, after reception of the response,
    356  * we submit GOAWAY and close the session.
    357  */
    358 static void on_stream_close_callback(spdylay_session *session,
    359                                      int32_t stream_id,
    360                                      spdylay_status_code status_code,
    361                                      void *user_data)
    362 {
    363   (void)user_data;
    364   (void)status_code;
    365 
    366   struct Request *req;
    367   req = spdylay_session_get_stream_user_data(session, stream_id);
    368   if(req) {
    369     int rv;
    370     rv = spdylay_submit_goaway(session, SPDYLAY_GOAWAY_OK);
    371     if(rv != 0) {
    372       diec("spdylay_submit_goaway", rv);
    373     }
    374   }
    375 }
    376 
    377 #define MAX_OUTLEN 4096
    378 
    379 /*
    380  * The implementation of spdylay_on_data_chunk_recv_callback type. We
    381  * use this function to print the received response body.
    382  */
    383 static void on_data_chunk_recv_callback(spdylay_session *session, uint8_t flags,
    384                                         int32_t stream_id,
    385                                         const uint8_t *data, size_t len,
    386                                         void *user_data)
    387 {
    388   (void)user_data;
    389   (void)flags;
    390 
    391   struct Request *req;
    392   req = spdylay_session_get_stream_user_data(session, stream_id);
    393   if(req) {
    394     printf("[INFO] C <---------------------------- S (DATA)\n");
    395     printf("       %lu bytes\n", (unsigned long int)len);
    396     if(req->inflater) {
    397       while(len > 0) {
    398         uint8_t out[MAX_OUTLEN];
    399         size_t outlen = MAX_OUTLEN;
    400         size_t tlen = len;
    401         int rv;
    402         rv = spdylay_gzip_inflate(req->inflater, out, &outlen, data, &tlen);
    403         if(rv == -1) {
    404           spdylay_submit_rst_stream(session, stream_id, SPDYLAY_INTERNAL_ERROR);
    405           break;
    406         }
    407         fwrite(out, 1, outlen, stdout);
    408         data += tlen;
    409         len -= tlen;
    410       }
    411     } else {
    412       /* TODO add support gzip */
    413       fwrite(data, 1, len, stdout);
    414 
    415       //check if the data is correct
    416       //if(strcmp(RESPONSE_BODY, data) != 0)
    417 		//killparent(parent, "\nreceived data is not the same");
    418       if(len + rcvbuf_c > strlen(RESPONSE_BODY))
    419 		killparent(parent, "\nreceived data is not the same");
    420 
    421 		strcpy(rcvbuf + rcvbuf_c,(char*)data);
    422 		rcvbuf_c+=len;
    423     }
    424     printf("\n");
    425   }
    426 }
    427 
    428 /*
    429  * Setup callback functions. Spdylay API offers many callback
    430  * functions, but most of them are optional. The send_callback is
    431  * always required. Since we use spdylay_session_recv(), the
    432  * recv_callback is also required.
    433  */
    434 static void setup_spdylay_callbacks(spdylay_session_callbacks *callbacks)
    435 {
    436   memset(callbacks, 0, sizeof(spdylay_session_callbacks));
    437   callbacks->send_callback = send_callback;
    438   callbacks->recv_callback = recv_callback;
    439   callbacks->before_ctrl_send_callback = before_ctrl_send_callback;
    440   callbacks->on_ctrl_send_callback = on_ctrl_send_callback;
    441   callbacks->on_ctrl_recv_callback = on_ctrl_recv_callback;
    442   callbacks->on_stream_close_callback = on_stream_close_callback;
    443   callbacks->on_data_chunk_recv_callback = on_data_chunk_recv_callback;
    444 }
    445 
    446 /*
    447  * Callback function for SSL/TLS NPN. Since this program only supports
    448  * SPDY protocol, if server does not offer SPDY protocol the Spdylay
    449  * library supports, we terminate program.
    450  */
    451 static int select_next_proto_cb(SSL* ssl,
    452                                 unsigned char **out, unsigned char *outlen,
    453                                 const unsigned char *in, unsigned int inlen,
    454                                 void *arg)
    455 {
    456   (void)ssl;
    457 
    458   int rv;
    459   uint16_t *spdy_proto_version;
    460   /* spdylay_select_next_protocol() selects SPDY protocol version the
    461      Spdylay library supports. */
    462   rv = spdylay_select_next_protocol(out, outlen, in, inlen);
    463   if(rv <= 0) {
    464     die("Server did not advertise spdy/2 or spdy/3 protocol.");
    465   }
    466   spdy_proto_version = (uint16_t*)arg;
    467   *spdy_proto_version = rv;
    468   return SSL_TLSEXT_ERR_OK;
    469 }
    470 
    471 /*
    472  * Setup SSL context. We pass |spdy_proto_version| to get negotiated
    473  * SPDY protocol version in NPN callback.
    474  */
    475 static void init_ssl_ctx(SSL_CTX *ssl_ctx, uint16_t *spdy_proto_version)
    476 {
    477   /* Disable SSLv2 and enable all workarounds for buggy servers */
    478   SSL_CTX_set_options(ssl_ctx, SSL_OP_ALL|SSL_OP_NO_SSLv2);
    479   SSL_CTX_set_mode(ssl_ctx, SSL_MODE_AUTO_RETRY);
    480   SSL_CTX_set_mode(ssl_ctx, SSL_MODE_RELEASE_BUFFERS);
    481   /* Set NPN callback */
    482   SSL_CTX_set_next_proto_select_cb(ssl_ctx, select_next_proto_cb,
    483                                    spdy_proto_version);
    484 }
    485 
    486 static void ssl_handshake(SSL *ssl, int fd)
    487 {
    488   int rv;
    489   if(SSL_set_fd(ssl, fd) == 0) {
    490     dief("SSL_set_fd", ERR_error_string(ERR_get_error(), NULL));
    491   }
    492   ERR_clear_error();
    493   rv = SSL_connect(ssl);
    494   if(rv <= 0) {
    495     dief("SSL_connect", ERR_error_string(ERR_get_error(), NULL));
    496   }
    497 }
    498 
    499 /*
    500  * Connects to the host |host| and port |port|.  This function returns
    501  * the file descriptor of the client socket.
    502  */
    503 static int connect_to(const char *host, uint16_t port)
    504 {
    505   struct addrinfo hints;
    506   int fd = -1;
    507   int rv;
    508   char service[NI_MAXSERV];
    509   struct addrinfo *res, *rp;
    510   snprintf(service, sizeof(service), "%u", port);
    511   memset(&hints, 0, sizeof(struct addrinfo));
    512   hints.ai_family = AF_UNSPEC;
    513   hints.ai_socktype = SOCK_STREAM;
    514   rv = getaddrinfo(host, service, &hints, &res);
    515   if(rv != 0) {
    516     dief("getaddrinfo", gai_strerror(rv));
    517   }
    518   for(rp = res; rp; rp = rp->ai_next) {
    519     fd = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol);
    520     if(fd == -1) {
    521       continue;
    522     }
    523     while((rv = connect(fd, rp->ai_addr, rp->ai_addrlen)) == -1 &&
    524           errno == EINTR);
    525     if(rv == 0) {
    526       break;
    527     }
    528     close(fd);
    529     fd = -1;
    530   }
    531   freeaddrinfo(res);
    532   return fd;
    533 }
    534 
    535 static void make_non_block(int fd)
    536 {
    537   int flags, rv;
    538   while((flags = fcntl(fd, F_GETFL, 0)) == -1 && errno == EINTR);
    539   if(flags == -1) {
    540     dief("fcntl", strerror(errno));
    541   }
    542   while((rv = fcntl(fd, F_SETFL, flags | O_NONBLOCK)) == -1 && errno == EINTR);
    543   if(rv == -1) {
    544     dief("fcntl", strerror(errno));
    545   }
    546 }
    547 
    548 /*
    549  * Setting TCP_NODELAY is not mandatory for the SPDY protocol.
    550  */
    551 static void set_tcp_nodelay(int fd)
    552 {
    553   int val = 1;
    554   int rv;
    555   rv = setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &val, (socklen_t)sizeof(val));
    556   if(rv == -1) {
    557     dief("setsockopt", strerror(errno));
    558   }
    559 }
    560 
    561 /*
    562  * Update |pollfd| based on the state of |connection|.
    563  */
    564 static void ctl_poll(struct pollfd *pollfd, struct Connection *connection)
    565 {
    566   pollfd->events = 0;
    567   if(spdylay_session_want_read(connection->session) ||
    568      connection->want_io == WANT_READ) {
    569     pollfd->events |= POLLIN;
    570   }
    571   if(spdylay_session_want_write(connection->session) ||
    572      connection->want_io == WANT_WRITE) {
    573     pollfd->events |= POLLOUT;
    574   }
    575 }
    576 
    577 /*
    578  * Submits the request |req| to the connection |connection|.  This
    579  * function does not send packets; just append the request to the
    580  * internal queue in |connection->session|.
    581  */
    582 static void submit_request(struct Connection *connection, struct Request *req)
    583 {
    584   int pri = 0;
    585   int rv;
    586   const char *nv[15];
    587   /* We always use SPDY/3 style header even if the negotiated protocol
    588      version is SPDY/2. The library translates the header name as
    589      necessary. Make sure that the last item is NULL! */
    590   nv[0] = ":method";     nv[1] = "GET";
    591   nv[2] = ":path";       nv[3] = req->path;
    592   nv[4] = ":version";    nv[5] = "HTTP/1.1";
    593   nv[6] = ":scheme";     nv[7] = "https";
    594   nv[8] = ":host";       nv[9] = req->hostport;
    595   nv[10] = "accept";     nv[11] = "*/*";
    596   nv[12] = "user-agent"; nv[13] = "spdylay/"SPDYLAY_VERSION;
    597   nv[14] = NULL;
    598   rv = spdylay_submit_request(connection->session, pri, nv, NULL, req);
    599   if(rv != 0) {
    600     diec("spdylay_submit_request", rv);
    601   }
    602 }
    603 
    604 /*
    605  * Performs the network I/O.
    606  */
    607 static void exec_io(struct Connection *connection)
    608 {
    609   int rv;
    610   rv = spdylay_session_recv(connection->session);
    611   if(rv != 0) {
    612     diec("spdylay_session_recv", rv);
    613   }
    614   rv = spdylay_session_send(connection->session);
    615   if(rv != 0) {
    616     diec("spdylay_session_send", rv);
    617   }
    618 }
    619 
    620 static void request_init(struct Request *req, const struct URI *uri)
    621 {
    622   req->host = strcopy(uri->host, uri->hostlen);
    623   req->port = uri->port;
    624   req->path = strcopy(uri->path, uri->pathlen);
    625   req->hostport = strcopy(uri->hostport, uri->hostportlen);
    626   req->stream_id = -1;
    627   req->inflater = NULL;
    628 }
    629 
    630 static void request_free(struct Request *req)
    631 {
    632   free(req->host);
    633   free(req->path);
    634   free(req->hostport);
    635   spdylay_gzip_inflate_del(req->inflater);
    636 }
    637 
    638 /*
    639  * Fetches the resource denoted by |uri|.
    640  */
    641 static void fetch_uri(const struct URI *uri)
    642 {
    643   spdylay_session_callbacks callbacks;
    644   int fd;
    645   SSL_CTX *ssl_ctx;
    646   SSL *ssl;
    647   struct Request req;
    648   struct Connection connection;
    649   int rv;
    650   nfds_t npollfds = 1;
    651   struct pollfd pollfds[1];
    652   uint16_t spdy_proto_version;
    653 
    654   request_init(&req, uri);
    655 
    656   setup_spdylay_callbacks(&callbacks);
    657 
    658   /* Establish connection and setup SSL */
    659   fd = connect_to(req.host, req.port);
    660   if (-1 == fd)
    661     abort ();
    662   ssl_ctx = SSL_CTX_new(SSLv23_client_method());
    663   if(ssl_ctx == NULL) {
    664     dief("SSL_CTX_new", ERR_error_string(ERR_get_error(), NULL));
    665   }
    666   init_ssl_ctx(ssl_ctx, &spdy_proto_version);
    667   ssl = SSL_new(ssl_ctx);
    668   if(ssl == NULL) {
    669     dief("SSL_new", ERR_error_string(ERR_get_error(), NULL));
    670   }
    671   /* To simplify the program, we perform SSL/TLS handshake in blocking
    672      I/O. */
    673   ssl_handshake(ssl, fd);
    674 
    675   connection.ssl = ssl;
    676   connection.want_io = IO_NONE;
    677 
    678   /* Here make file descriptor non-block */
    679   make_non_block(fd);
    680   set_tcp_nodelay(fd);
    681 
    682   printf("[INFO] SPDY protocol version = %d\n", spdy_proto_version);
    683   rv = spdylay_session_client_new(&connection.session, spdy_proto_version,
    684                                   &callbacks, &connection);
    685   if(rv != 0) {
    686     diec("spdylay_session_client_new", rv);
    687   }
    688 
    689   /* Submit the HTTP request to the outbound queue. */
    690   submit_request(&connection, &req);
    691 
    692   pollfds[0].fd = fd;
    693   ctl_poll(pollfds, &connection);
    694 
    695   /* Event loop */
    696   while(spdylay_session_want_read(connection.session) ||
    697         spdylay_session_want_write(connection.session)) {
    698     int nfds = poll(pollfds, npollfds, -1);
    699     if(nfds == -1) {
    700       dief("poll", strerror(errno));
    701     }
    702     if(pollfds[0].revents & (POLLIN | POLLOUT)) {
    703       exec_io(&connection);
    704     }
    705     if((pollfds[0].revents & POLLHUP) || (pollfds[0].revents & POLLERR)) {
    706       die("Connection error");
    707     }
    708     ctl_poll(pollfds, &connection);
    709   }
    710 
    711   /* Resource cleanup */
    712   spdylay_session_del(connection.session);
    713   SSL_shutdown(ssl);
    714   SSL_free(ssl);
    715   SSL_CTX_free(ssl_ctx);
    716   shutdown(fd, SHUT_WR);
    717   close(fd);
    718   request_free(&req);
    719 }
    720 
    721 static int parse_uri(struct URI *res, const char *uri)
    722 {
    723   /* We only interested in https */
    724   size_t len, i, offset;
    725   memset(res, 0, sizeof(struct URI));
    726   len = strlen(uri);
    727   if(len < 9 || memcmp("https://", uri, 8) != 0) {
    728     return -1;
    729   }
    730   offset = 8;
    731   res->host = res->hostport = &uri[offset];
    732   res->hostlen = 0;
    733   if(uri[offset] == '[') {
    734     /* IPv6 literal address */
    735     ++offset;
    736     ++res->host;
    737     for(i = offset; i < len; ++i) {
    738       if(uri[i] == ']') {
    739         res->hostlen = i-offset;
    740         offset = i+1;
    741         break;
    742       }
    743     }
    744   } else {
    745     const char delims[] = ":/?#";
    746     for(i = offset; i < len; ++i) {
    747       if(strchr(delims, uri[i]) != NULL) {
    748         break;
    749       }
    750     }
    751     res->hostlen = i-offset;
    752     offset = i;
    753   }
    754   if(res->hostlen == 0) {
    755     return -1;
    756   }
    757   /* Assuming https */
    758   res->port = 443;
    759   if(offset < len) {
    760     if(uri[offset] == ':') {
    761       /* port */
    762       const char delims[] = "/?#";
    763       int port = 0;
    764       ++offset;
    765       for(i = offset; i < len; ++i) {
    766         if(strchr(delims, uri[i]) != NULL) {
    767           break;
    768         }
    769         if('0' <= uri[i] && uri[i] <= '9') {
    770           port *= 10;
    771           port += uri[i]-'0';
    772           if(port > 65535) {
    773             return -1;
    774           }
    775         } else {
    776           return -1;
    777         }
    778       }
    779       if(port == 0) {
    780         return -1;
    781       }
    782       offset = i;
    783       res->port = port;
    784     }
    785   }
    786   res->hostportlen = uri+offset-res->host;
    787   for(i = offset; i < len; ++i) {
    788     if(uri[i] == '#') {
    789       break;
    790     }
    791   }
    792   if(i-offset == 0) {
    793     res->path = "/";
    794     res->pathlen = 1;
    795   } else {
    796     res->path = &uri[offset];
    797     res->pathlen = i-offset;
    798   }
    799   return 0;
    800 }
    801 
    802 
    803 /*****
    804  * end of code needed to utilize spdylay
    805  */
    806 
    807 
    808 /*****
    809  * start of code needed to utilize microspdy
    810  */
    811 
    812 
    813 void
    814 standard_request_handler(void *cls,
    815 						struct SPDY_Request * request,
    816 						uint8_t priority,
    817                         const char *method,
    818                         const char *path,
    819                         const char *version,
    820                         const char *host,
    821                         const char *scheme,
    822 						struct SPDY_NameValue * headers,
    823             bool more)
    824 {
    825 	(void)cls;
    826 	(void)request;
    827 	(void)priority;
    828 	(void)host;
    829 	(void)scheme;
    830 	(void)headers;
    831 	(void)method;
    832 	(void)version;
    833 
    834 	struct SPDY_Response *response=NULL;
    835 
    836 	if(strcmp(CLS,cls)!=0)
    837 	{
    838 		killchild(child,"wrong cls");
    839 	}
    840 
    841 	if(false != more){
    842 		fprintf(stdout,"more has wrong value\n");
    843 		exit(5);
    844 	}
    845 
    846 	response = SPDY_build_response(200,NULL,SPDY_HTTP_VERSION_1_1,NULL,RESPONSE_BODY,strlen(RESPONSE_BODY));
    847 
    848 	if(NULL==response){
    849 		fprintf(stdout,"no response obj\n");
    850 		exit(3);
    851 	}
    852 
    853 	if(SPDY_queue_response(request,response,true,false,NULL,(void*)strdup(path))!=SPDY_YES)
    854 	{
    855 		fprintf(stdout,"queue\n");
    856 		exit(4);
    857 	}
    858 }
    859 
    860 void
    861 session_closed_handler (void *cls,
    862 						struct SPDY_Session * session,
    863 						int by_client)
    864 {
    865 	printf("session_closed_handler called\n");
    866 
    867 	if(strcmp(CLS,cls)!=0)
    868 	{
    869 		killchild(child,"wrong cls");
    870 	}
    871 
    872 	if(SPDY_YES != by_client)
    873 	{
    874 		//killchild(child,"wrong by_client");
    875 		printf("session closed by server\n");
    876 	}
    877 	else
    878 	{
    879 		printf("session closed by client\n");
    880 	}
    881 
    882 	if(NULL == session)
    883 	{
    884 		killchild(child,"session is NULL");
    885 	}
    886 
    887 	session_closed_called = 1;
    888 }
    889 
    890 
    891 /*****
    892  * end of code needed to utilize microspdy
    893  */
    894 
    895 //child process
    896 void
    897 childproc(int port)
    898 {
    899   struct URI uri;
    900   struct sigaction act;
    901   int rv;
    902   char *uristr;
    903 
    904   memset(&act, 0, sizeof(struct sigaction));
    905   act.sa_handler = SIG_IGN;
    906   sigaction(SIGPIPE, &act, 0);
    907 
    908 	asprintf(&uristr, "https://127.0.0.1:%i/",port);
    909 	if(NULL == (rcvbuf = malloc(strlen(RESPONSE_BODY)+1)))
    910 		killparent(parent,"no memory");
    911 
    912   SSL_load_error_strings();
    913   SSL_library_init();
    914 
    915   rv = parse_uri(&uri, uristr);
    916   if(rv != 0) {
    917     killparent(parent,"parse_uri failed");
    918   }
    919   fetch_uri(&uri);
    920 
    921   if(strcmp(rcvbuf, RESPONSE_BODY))
    922     killparent(parent,"received data is different");
    923 }
    924 
    925 //parent proc
    926 int
    927 parentproc( int port)
    928 {
    929 	int childstatus;
    930 	unsigned long long timeoutlong=0;
    931 	struct timeval timeout;
    932 	int ret;
    933 	fd_set read_fd_set;
    934 	fd_set write_fd_set;
    935 	fd_set except_fd_set;
    936 	int maxfd = -1;
    937 	struct SPDY_Daemon *daemon;
    938 
    939 	SPDY_init();
    940 
    941 	daemon = SPDY_start_daemon(port,
    942 								DATA_DIR "cert-and-key.pem",
    943 								DATA_DIR "cert-and-key.pem",
    944 								NULL,&session_closed_handler,&standard_request_handler,NULL,CLS,SPDY_DAEMON_OPTION_END);
    945 
    946 	if(NULL==daemon){
    947 		printf("no daemon\n");
    948 		return 1;
    949 	}
    950 
    951 	do
    952 	{
    953 		FD_ZERO(&read_fd_set);
    954 		FD_ZERO(&write_fd_set);
    955 		FD_ZERO(&except_fd_set);
    956 
    957 		ret = SPDY_get_timeout(daemon, &timeoutlong);
    958 		if(SPDY_NO == ret || timeoutlong > 1000)
    959 		{
    960 			timeout.tv_sec = 1;
    961       timeout.tv_usec = 0;
    962 		}
    963 		else
    964 		{
    965 			timeout.tv_sec = timeoutlong / 1000;
    966 			timeout.tv_usec = (timeoutlong % 1000) * 1000;
    967 		}
    968 
    969 		maxfd = SPDY_get_fdset (daemon,
    970 								&read_fd_set,
    971 								&write_fd_set,
    972 								&except_fd_set);
    973 
    974 		ret = select(maxfd+1, &read_fd_set, &write_fd_set, &except_fd_set, &timeout);
    975 
    976 		switch(ret) {
    977 			case -1:
    978 				printf("select error: %i\n", errno);
    979 				killchild(child, "select error");
    980 				break;
    981 			case 0:
    982 
    983 				break;
    984 			default:
    985 				SPDY_run(daemon);
    986 
    987 			break;
    988 		}
    989 	}
    990 	while(waitpid(child,&childstatus,WNOHANG) != child);
    991 
    992 	//give chance to the client to close socket and handle this in run
    993 	usleep(100000);
    994 	SPDY_run(daemon);
    995 
    996 	SPDY_stop_daemon(daemon);
    997 
    998 	SPDY_deinit();
    999 
   1000 	return WEXITSTATUS(childstatus);
   1001 }
   1002 
   1003 int main()
   1004 {
   1005 	int port = get_port(12123);
   1006 	parent = getpid();
   1007 
   1008    child = fork();
   1009    if (child == -1)
   1010    {
   1011       fprintf(stderr, "can't fork, error %d\n", errno);
   1012       exit(EXIT_FAILURE);
   1013    }
   1014 
   1015    if (child == 0)
   1016    {
   1017       childproc(port);
   1018       _exit(0);
   1019    }
   1020    else
   1021    {
   1022 	   int ret = parentproc(port);
   1023 	   if(1 == session_closed_called && 0 == ret)
   1024       exit(0);
   1025       else
   1026       exit(ret ? ret : 21);
   1027    }
   1028    return 1;
   1029 }
   1030