/* This file is part of libmicrospdy Copyright Copyright (C) 2012 Andrey Uzunov This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>. */ /** * @file request_response.c * @brief tests new connection callback. spdycli.c * code is reused here * @author Andrey Uzunov * @author Tatsuhiro Tsujikawa */ //TODO child exits with ret val 1 sometimes #include "platform.h" #include "microspdy.h" #include <sys/wait.h> #include "common.h" #define RESPONSE_BODY "<html><body><b>Hi, this is libmicrospdy!</b></body></html>" #define CLS "anything" int port; int loop = 1; pid_t parent; pid_t child; int spdylay_printf(const char *format, ...) { (void)format; return 0; } int spdylay_fprintf(FILE *stream, const char *format, ...) { (void)stream; (void)format; return 0; } void killchild(int pid, char *message) { printf("%s\n",message); kill(pid, SIGKILL); exit(1); } void killparent(int pid, char *message) { printf("%s\n",message); kill(pid, SIGKILL); _exit(2); } /***** * start of code needed to utilize spdylay */ #include <stdint.h> #include <stdlib.h> #include <unistd.h> #include <fcntl.h> #include <sys/types.h> #include <sys/socket.h> #include <netdb.h> #include <netinet/in.h> #include <netinet/tcp.h> #include <poll.h> #include <signal.h> #include <stdio.h> #include <assert.h> #include <spdylay/spdylay.h> #include <openssl/ssl.h> #include <openssl/err.h> enum { IO_NONE, WANT_READ, WANT_WRITE }; struct Connection { SSL *ssl; spdylay_session *session; /* WANT_READ if SSL connection needs more input; or WANT_WRITE if it needs more output; or IO_NONE. This is necessary because SSL/TLS re-negotiation is possible at any time. Spdylay API offers similar functions like spdylay_session_want_read() and spdylay_session_want_write() but they do not take into account SSL connection. */ int want_io; }; struct Request { char *host; uint16_t port; /* In this program, path contains query component as well. */ char *path; /* This is the concatenation of host and port with ":" in between. */ char *hostport; /* Stream ID for this request. */ int32_t stream_id; /* The gzip stream inflater for the compressed response. */ spdylay_gzip *inflater; }; struct URI { const char *host; size_t hostlen; uint16_t port; /* In this program, path contains query component as well. */ const char *path; size_t pathlen; const char *hostport; size_t hostportlen; }; /* * Returns copy of string |s| with the length |len|. The returned * string is NULL-terminated. */ static char* strcopy(const char *s, size_t len) { char *dst; dst = malloc(len+1); if (NULL == dst) abort (); memcpy(dst, s, len); dst[len] = '\0'; return dst; } /* * Prints error message |msg| and exit. */ static void die(const char *msg) { fprintf(stderr, "FATAL: %s\n", msg); exit(EXIT_FAILURE); } /* * Prints error containing the function name |func| and message |msg| * and exit. */ static void dief(const char *func, const char *msg) { fprintf(stderr, "FATAL: %s: %s\n", func, msg); exit(EXIT_FAILURE); } /* * Prints error containing the function name |func| and error code * |error_code| and exit. */ static void diec(const char *func, int error_code) { fprintf(stderr, "FATAL: %s: error_code=%d, msg=%s\n", func, error_code, spdylay_strerror(error_code)); exit(EXIT_FAILURE); } /* * Check response is content-encoding: gzip. We need this because SPDY * client is required to support gzip. */ static void check_gzip(struct Request *req, char **nv) { int gzip = 0; size_t i; for(i = 0; nv[i]; i += 2) { if(strcmp("content-encoding", nv[i]) == 0) { gzip = strcmp("gzip", nv[i+1]) == 0; break; } } if(gzip) { int rv; if(req->inflater) { return; } rv = spdylay_gzip_inflate_new(&req->inflater); if(rv != 0) { die("Can't allocate inflate stream."); } } } /* * The implementation of spdylay_send_callback type. Here we write * |data| with size |length| to the network and return the number of * bytes actually written. See the documentation of * spdylay_send_callback for the details. */ static ssize_t send_callback(spdylay_session *session, const uint8_t *data, size_t length, int flags, void *user_data) { (void)session; (void)flags; struct Connection *connection; ssize_t rv; connection = (struct Connection*)user_data; connection->want_io = IO_NONE; ERR_clear_error(); rv = SSL_write(connection->ssl, data, length); if(rv < 0) { int err = SSL_get_error(connection->ssl, rv); if(err == SSL_ERROR_WANT_WRITE || err == SSL_ERROR_WANT_READ) { connection->want_io = (err == SSL_ERROR_WANT_READ ? WANT_READ : WANT_WRITE); rv = SPDYLAY_ERR_WOULDBLOCK; } else { rv = SPDYLAY_ERR_CALLBACK_FAILURE; } } return rv; } /* * The implementation of spdylay_recv_callback type. Here we read data * from the network and write them in |buf|. The capacity of |buf| is * |length| bytes. Returns the number of bytes stored in |buf|. See * the documentation of spdylay_recv_callback for the details. */ static ssize_t recv_callback(spdylay_session *session, uint8_t *buf, size_t length, int flags, void *user_data) { (void)session; (void)flags; struct Connection *connection; ssize_t rv; connection = (struct Connection*)user_data; connection->want_io = IO_NONE; ERR_clear_error(); rv = SSL_read(connection->ssl, buf, length); if(rv < 0) { int err = SSL_get_error(connection->ssl, rv); if(err == SSL_ERROR_WANT_WRITE || err == SSL_ERROR_WANT_READ) { connection->want_io = (err == SSL_ERROR_WANT_READ ? WANT_READ : WANT_WRITE); rv = SPDYLAY_ERR_WOULDBLOCK; } else { rv = SPDYLAY_ERR_CALLBACK_FAILURE; } } else if(rv == 0) { rv = SPDYLAY_ERR_EOF; } return rv; } /* * The implementation of spdylay_before_ctrl_send_callback type. We * use this function to get stream ID of the request. This is because * stream ID is not known when we submit the request * (spdylay_submit_request). */ static void before_ctrl_send_callback(spdylay_session *session, spdylay_frame_type type, spdylay_frame *frame, void *user_data) { (void)user_data; if(type == SPDYLAY_SYN_STREAM) { struct Request *req; int stream_id = frame->syn_stream.stream_id; req = spdylay_session_get_stream_user_data(session, stream_id); if(req && req->stream_id == -1) { req->stream_id = stream_id; spdylay_printf("[INFO] Stream ID = %d\n", stream_id); } } } static void on_ctrl_send_callback(spdylay_session *session, spdylay_frame_type type, spdylay_frame *frame, void *user_data) { (void)user_data; char **nv; const char *name = NULL; int32_t stream_id; size_t i; switch(type) { case SPDYLAY_SYN_STREAM: nv = frame->syn_stream.nv; name = "SYN_STREAM"; stream_id = frame->syn_stream.stream_id; break; default: break; } if(name && spdylay_session_get_stream_user_data(session, stream_id)) { spdylay_printf("[INFO] C ----------------------------> S (%s)\n", name); for(i = 0; nv[i]; i += 2) { spdylay_printf(" %s: %s\n", nv[i], nv[i+1]); } } } static void on_ctrl_recv_callback(spdylay_session *session, spdylay_frame_type type, spdylay_frame *frame, void *user_data) { (void)user_data; struct Request *req; char **nv; const char *name = NULL; int32_t stream_id; size_t i; switch(type) { case SPDYLAY_SYN_REPLY: nv = frame->syn_reply.nv; name = "SYN_REPLY"; stream_id = frame->syn_reply.stream_id; break; case SPDYLAY_HEADERS: nv = frame->headers.nv; name = "HEADERS"; stream_id = frame->headers.stream_id; break; default: break; } if(!name) { return; } req = spdylay_session_get_stream_user_data(session, stream_id); if(req) { check_gzip(req, nv); spdylay_printf("[INFO] C <---------------------------- S (%s)\n", name); for(i = 0; nv[i]; i += 2) { spdylay_printf(" %s: %s\n", nv[i], nv[i+1]); } } } /* * The implementation of spdylay_on_stream_close_callback type. We use * this function to know the response is fully received. Since we just * fetch 1 resource in this program, after reception of the response, * we submit GOAWAY and close the session. */ static void on_stream_close_callback(spdylay_session *session, int32_t stream_id, spdylay_status_code status_code, void *user_data) { (void)user_data; (void)status_code; struct Request *req; req = spdylay_session_get_stream_user_data(session, stream_id); if(req) { int rv; rv = spdylay_submit_goaway(session, SPDYLAY_GOAWAY_OK); if(rv != 0) { diec("spdylay_submit_goaway", rv); } } } #define MAX_OUTLEN 4096 /* * The implementation of spdylay_on_data_chunk_recv_callback type. We * use this function to print the received response body. */ static void on_data_chunk_recv_callback(spdylay_session *session, uint8_t flags, int32_t stream_id, const uint8_t *data, size_t len, void *user_data) { (void)user_data; (void)flags; struct Request *req; req = spdylay_session_get_stream_user_data(session, stream_id); if(req) { spdylay_printf("[INFO] C <---------------------------- S (DATA)\n"); spdylay_printf(" %lu bytes\n", (unsigned long int)len); if(req->inflater) { while(len > 0) { uint8_t out[MAX_OUTLEN]; size_t outlen = MAX_OUTLEN; size_t tlen = len; int rv; rv = spdylay_gzip_inflate(req->inflater, out, &outlen, data, &tlen); if(rv == -1) { spdylay_submit_rst_stream(session, stream_id, SPDYLAY_INTERNAL_ERROR); break; } fwrite(out, 1, outlen, stdout); data += tlen; len -= tlen; } } else { /* TODO add support gzip */ fwrite(data, 1, len, stdout); //check if the data is correct if(strcmp(RESPONSE_BODY, (char *)data) != 0) killparent(parent, "\nreceived data is not the same"); } spdylay_printf("\n"); } } /* * Setup callback functions. Spdylay API offers many callback * functions, but most of them are optional. The send_callback is * always required. Since we use spdylay_session_recv(), the * recv_callback is also required. */ static void setup_spdylay_callbacks(spdylay_session_callbacks *callbacks) { memset(callbacks, 0, sizeof(spdylay_session_callbacks)); callbacks->send_callback = send_callback; callbacks->recv_callback = recv_callback; callbacks->before_ctrl_send_callback = before_ctrl_send_callback; callbacks->on_ctrl_send_callback = on_ctrl_send_callback; callbacks->on_ctrl_recv_callback = on_ctrl_recv_callback; callbacks->on_stream_close_callback = on_stream_close_callback; callbacks->on_data_chunk_recv_callback = on_data_chunk_recv_callback; } /* * Callback function for SSL/TLS NPN. Since this program only supports * SPDY protocol, if server does not offer SPDY protocol the Spdylay * library supports, we terminate program. */ static int select_next_proto_cb(SSL* ssl, unsigned char **out, unsigned char *outlen, const unsigned char *in, unsigned int inlen, void *arg) { (void)ssl; int rv; uint16_t *spdy_proto_version; /* spdylay_select_next_protocol() selects SPDY protocol version the Spdylay library supports. */ rv = spdylay_select_next_protocol(out, outlen, in, inlen); if(rv <= 0) { die("Server did not advertise spdy/2 or spdy/3 protocol."); } spdy_proto_version = (uint16_t*)arg; *spdy_proto_version = rv; return SSL_TLSEXT_ERR_OK; } /* * Setup SSL context. We pass |spdy_proto_version| to get negotiated * SPDY protocol version in NPN callback. */ static void init_ssl_ctx(SSL_CTX *ssl_ctx, uint16_t *spdy_proto_version) { /* Disable SSLv2 and enable all workarounds for buggy servers */ SSL_CTX_set_options(ssl_ctx, SSL_OP_ALL|SSL_OP_NO_SSLv2); SSL_CTX_set_mode(ssl_ctx, SSL_MODE_AUTO_RETRY); SSL_CTX_set_mode(ssl_ctx, SSL_MODE_RELEASE_BUFFERS); /* Set NPN callback */ SSL_CTX_set_next_proto_select_cb(ssl_ctx, select_next_proto_cb, spdy_proto_version); } static void ssl_handshake(SSL *ssl, int fd) { int rv; if(SSL_set_fd(ssl, fd) == 0) { dief("SSL_set_fd", ERR_error_string(ERR_get_error(), NULL)); } ERR_clear_error(); rv = SSL_connect(ssl); if(rv <= 0) { dief("SSL_connect", ERR_error_string(ERR_get_error(), NULL)); } } /* * Connects to the host |host| and port |port|. This function returns * the file descriptor of the client socket. */ static int connect_to(const char *host, uint16_t port) { struct addrinfo hints; int fd = -1; int rv; char service[NI_MAXSERV]; struct addrinfo *res, *rp; snprintf(service, sizeof(service), "%u", port); memset(&hints, 0, sizeof(struct addrinfo)); hints.ai_family = AF_UNSPEC; hints.ai_socktype = SOCK_STREAM; rv = getaddrinfo(host, service, &hints, &res); if(rv != 0) { dief("getaddrinfo", gai_strerror(rv)); } for(rp = res; rp; rp = rp->ai_next) { fd = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol); if(fd == -1) { continue; } while((rv = connect(fd, rp->ai_addr, rp->ai_addrlen)) == -1 && errno == EINTR); if(rv == 0) { break; } close(fd); fd = -1; } freeaddrinfo(res); return fd; } static void make_non_block(int fd) { int flags, rv; while((flags = fcntl(fd, F_GETFL, 0)) == -1 && errno == EINTR); if(flags == -1) { dief("fcntl", strerror(errno)); } while((rv = fcntl(fd, F_SETFL, flags | O_NONBLOCK)) == -1 && errno == EINTR); if(rv == -1) { dief("fcntl", strerror(errno)); } } /* * Setting TCP_NODELAY is not mandatory for the SPDY protocol. */ static void set_tcp_nodelay(int fd) { int val = 1; int rv; rv = setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &val, (socklen_t)sizeof(val)); if(rv == -1) { dief("setsockopt", strerror(errno)); } } /* * Update |pollfd| based on the state of |connection|. */ static void ctl_poll(struct pollfd *pollfd, struct Connection *connection) { pollfd->events = 0; if(spdylay_session_want_read(connection->session) || connection->want_io == WANT_READ) { pollfd->events |= POLLIN; } if(spdylay_session_want_write(connection->session) || connection->want_io == WANT_WRITE) { pollfd->events |= POLLOUT; } } /* * Submits the request |req| to the connection |connection|. This * function does not send packets; just append the request to the * internal queue in |connection->session|. */ static void submit_request(struct Connection *connection, struct Request *req) { int pri = 0; int rv; const char *nv[15]; /* We always use SPDY/3 style header even if the negotiated protocol version is SPDY/2. The library translates the header name as necessary. Make sure that the last item is NULL! */ nv[0] = ":method"; nv[1] = "GET"; nv[2] = ":path"; nv[3] = req->path; nv[4] = ":version"; nv[5] = "HTTP/1.1"; nv[6] = ":scheme"; nv[7] = "https"; nv[8] = ":host"; nv[9] = req->hostport; nv[10] = "accept"; nv[11] = "*/*"; nv[12] = "user-agent"; nv[13] = "spdylay/"SPDYLAY_VERSION; nv[14] = NULL; rv = spdylay_submit_request(connection->session, pri, nv, NULL, req); if(rv != 0) { diec("spdylay_submit_request", rv); } } /* * Performs the network I/O. */ static void exec_io(struct Connection *connection) { int rv; rv = spdylay_session_recv(connection->session); if(rv != 0) { diec("spdylay_session_recv", rv); } rv = spdylay_session_send(connection->session); if(rv != 0) { diec("spdylay_session_send", rv); } } static void request_init(struct Request *req, const struct URI *uri) { req->host = strcopy(uri->host, uri->hostlen); req->port = uri->port; req->path = strcopy(uri->path, uri->pathlen); req->hostport = strcopy(uri->hostport, uri->hostportlen); req->stream_id = -1; req->inflater = NULL; } static void request_free(struct Request *req) { free(req->host); free(req->path); free(req->hostport); spdylay_gzip_inflate_del(req->inflater); } /* * Fetches the resource denoted by |uri|. */ static void fetch_uri(const struct URI *uri) { spdylay_session_callbacks callbacks; int fd; SSL_CTX *ssl_ctx; SSL *ssl; struct Request req; struct Connection connection; int rv; nfds_t npollfds = 1; struct pollfd pollfds[1]; uint16_t spdy_proto_version; request_init(&req, uri); setup_spdylay_callbacks(&callbacks); /* Establish connection and setup SSL */ fd = connect_to(req.host, req.port); if (-1 == fd) abort (); ssl_ctx = SSL_CTX_new(SSLv23_client_method()); if(ssl_ctx == NULL) { dief("SSL_CTX_new", ERR_error_string(ERR_get_error(), NULL)); } init_ssl_ctx(ssl_ctx, &spdy_proto_version); ssl = SSL_new(ssl_ctx); if(ssl == NULL) { dief("SSL_new", ERR_error_string(ERR_get_error(), NULL)); } /* To simplify the program, we perform SSL/TLS handshake in blocking I/O. */ ssl_handshake(ssl, fd); connection.ssl = ssl; connection.want_io = IO_NONE; /* Here make file descriptor non-block */ make_non_block(fd); set_tcp_nodelay(fd); spdylay_printf("[INFO] SPDY protocol version = %d\n", spdy_proto_version); rv = spdylay_session_client_new(&connection.session, spdy_proto_version, &callbacks, &connection); if(rv != 0) { diec("spdylay_session_client_new", rv); } /* Submit the HTTP request to the outbound queue. */ submit_request(&connection, &req); pollfds[0].fd = fd; ctl_poll(pollfds, &connection); /* Event loop */ while(spdylay_session_want_read(connection.session) || spdylay_session_want_write(connection.session)) { int nfds = poll(pollfds, npollfds, -1); if(nfds == -1) { dief("poll", strerror(errno)); } if(pollfds[0].revents & (POLLIN | POLLOUT)) { exec_io(&connection); } if((pollfds[0].revents & POLLHUP) || (pollfds[0].revents & POLLERR)) { die("Connection error"); } ctl_poll(pollfds, &connection); } /* Resource cleanup */ spdylay_session_del(connection.session); SSL_shutdown(ssl); SSL_free(ssl); SSL_CTX_free(ssl_ctx); shutdown(fd, SHUT_WR); close(fd); request_free(&req); } static int parse_uri(struct URI *res, const char *uri) { /* We only interested in https */ size_t len, i, offset; memset(res, 0, sizeof(struct URI)); len = strlen(uri); if(len < 9 || memcmp("https://", uri, 8) != 0) { return -1; } offset = 8; res->host = res->hostport = &uri[offset]; res->hostlen = 0; if(uri[offset] == '[') { /* IPv6 literal address */ ++offset; ++res->host; for(i = offset; i < len; ++i) { if(uri[i] == ']') { res->hostlen = i-offset; offset = i+1; break; } } } else { const char delims[] = ":/?#"; for(i = offset; i < len; ++i) { if(strchr(delims, uri[i]) != NULL) { break; } } res->hostlen = i-offset; offset = i; } if(res->hostlen == 0) { return -1; } /* Assuming https */ res->port = 443; if(offset < len) { if(uri[offset] == ':') { /* port */ const char delims[] = "/?#"; int port = 0; ++offset; for(i = offset; i < len; ++i) { if(strchr(delims, uri[i]) != NULL) { break; } if('0' <= uri[i] && uri[i] <= '9') { port *= 10; port += uri[i]-'0'; if(port > 65535) { return -1; } } else { return -1; } } if(port == 0) { return -1; } offset = i; res->port = port; } } res->hostportlen = uri+offset-res->host; for(i = offset; i < len; ++i) { if(uri[i] == '#') { break; } } if(i-offset == 0) { res->path = "/"; res->pathlen = 1; } else { res->path = &uri[offset]; res->pathlen = i-offset; } return 0; } /***** * end of code needed to utilize spdylay */ /***** * start of code needed to utilize microspdy */ void new_session_callback (void *cls, struct SPDY_Session * session) { char ipstr[1024]; struct sockaddr *addr; socklen_t addr_len = SPDY_get_remote_addr(session, &addr); if(!addr_len) { printf("SPDY_get_remote_addr"); abort(); } if(strcmp(CLS,cls)!=0) { killchild(child,"wrong cls"); } if(AF_INET == addr->sa_family) { struct sockaddr_in * addr4 = (struct sockaddr_in *) addr; if(NULL == inet_ntop(AF_INET, &(addr4->sin_addr), ipstr, sizeof(ipstr))) { killchild(child,"inet_ntop"); } printf("New connection from: %s:%i\n", ipstr, ntohs(addr4->sin_port)); loop = 0; } #if HAVE_INET6 else if(AF_INET6 == addr->sa_family) { struct sockaddr_in6 * addr6 = (struct sockaddr_in6 *) addr; if(NULL == inet_ntop(AF_INET6, &(addr6->sin6_addr), ipstr, sizeof(ipstr))) { killchild(child,"inet_ntop"); } printf("New connection from: %s:%i\n", ipstr, ntohs(addr6->sin6_port)); loop = 0; } #endif else { killchild(child,"wrong family"); } } /***** * end of code needed to utilize microspdy */ //child process void childproc(int parent) { struct URI uri; struct sigaction act; int rv; char *uristr; memset(&act, 0, sizeof(struct sigaction)); act.sa_handler = SIG_IGN; sigaction(SIGPIPE, &act, 0); asprintf(&uristr, "https://127.0.0.1:%i/",port); SSL_load_error_strings(); SSL_library_init(); rv = parse_uri(&uri, uristr); if(rv != 0) { killparent(parent,"parse_uri failed"); } fetch_uri(&uri); } //parent proc int parentproc(int child) { int childstatus = 0; unsigned long long timeoutlong=0; struct timeval timeout; int ret; fd_set read_fd_set; fd_set write_fd_set; fd_set except_fd_set; int maxfd = -1; struct SPDY_Daemon *daemon; SPDY_init(); daemon = SPDY_start_daemon(port, DATA_DIR "cert-and-key.pem", DATA_DIR "cert-and-key.pem", &new_session_callback,NULL,NULL,NULL,CLS,SPDY_DAEMON_OPTION_END); if(NULL==daemon){ printf("no daemon\n"); return 1; } do { FD_ZERO(&read_fd_set); FD_ZERO(&write_fd_set); FD_ZERO(&except_fd_set); ret = SPDY_get_timeout(daemon, &timeoutlong); if(SPDY_NO == ret || timeoutlong > 1000) { timeout.tv_sec = 1; timeout.tv_usec = 0; } else { timeout.tv_sec = timeoutlong / 1000; timeout.tv_usec = (timeoutlong % 1000) * 1000; } maxfd = SPDY_get_fdset (daemon, &read_fd_set, &write_fd_set, &except_fd_set); ret = select(maxfd+1, &read_fd_set, &write_fd_set, &except_fd_set, &timeout); switch(ret) { case -1: printf("select error: %i\n", errno); killchild(child, "select error"); break; case 0: break; default: SPDY_run(daemon); break; } } while(loop && waitpid(child,&childstatus,WNOHANG) != child); SPDY_stop_daemon(daemon); SPDY_deinit(); if(loop) return WEXITSTATUS(childstatus); if(waitpid(child,&childstatus,WNOHANG) == child) return WEXITSTATUS(childstatus); kill(child,SIGKILL); waitpid(child,&childstatus,0); return 0; } int main() { port = get_port(14123); parent = getpid(); child = fork(); if (child == -1) { fprintf(stderr, "can't fork, error %d\n", errno); exit(EXIT_FAILURE); } if (child == 0) { childproc(parent); _exit(0); } else { int ret = parentproc(child); exit(ret); } return 1; }