1/*
2 * lws-minimal-secure-streams-avs
3 *
4 * Written in 2019-2020 by Andy Green <andy@warmcat.com>
5 *
6 * This file is made available under the Creative Commons CC0 1.0
7 * Universal Public Domain Dedication.
8 */
9
10#include <libwebsockets.h>
11#include <string.h>
12#include <signal.h>
13
14extern int
15avs_example_start(struct lws_context *context);
16
17int interrupted, bad = 1;
18static lws_state_notify_link_t nl;
19static const char * const default_ss_policy =
20	"{"
21	  "\"release\":"			"\"01234567\","
22	  "\"product\":"			"\"myproduct\","
23	  "\"schema-version\":"			"1,"
24//	  "\"via-socks5\":"                     "\"127.0.0.1:1080\","
25	  "\"retry\": ["	/* named backoff / retry strategies */
26		"{\"default\": {"
27			"\"backoff\": ["	 "1000,"
28						 "2000,"
29						 "3000,"
30						 "5000,"
31						"10000"
32				"],"
33			"\"conceal\":"		"5,"
34			"\"jitterpc\":"		"20,"
35			"\"svalidping\":"	"60,"
36			"\"svalidhup\":"	"64"
37		"}}"
38	  "],"
39	  "\"certs\": [" /* named individual certificates in BASE64 DER */
40		"{\"digicert_global_root_g2\": \"" /* api.amazon.com 2038-01 */
41	"MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh"
42	"MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3"
43	"d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH"
44	"MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT"
45	"MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j"
46	"b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG"
47	"9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI"
48	"2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx"
49	"1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ"
50	"q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz"
51	"tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ"
52	"vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP"
53	"BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV"
54	"5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY"
55	"1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4"
56	"NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG"
57	"Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91"
58	"8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe"
59	"pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl"
60	"MrY="
61		"\"},"
62		"{\"digicert_global_ca_g2\": \"" /* api.amazon.com 2028-08 */
63	"MIIEizCCA3OgAwIBAgIQDI7gyQ1qiRWIBAYe4kH5rzANBgkqhkiG9w0BAQsFADBh"
64	"MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3"
65	"d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH"
66	"MjAeFw0xMzA4MDExMjAwMDBaFw0yODA4MDExMjAwMDBaMEQxCzAJBgNVBAYTAlVT"
67	"MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxHjAcBgNVBAMTFURpZ2lDZXJ0IEdsb2Jh"
68	"bCBDQSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANNIfL7zBYZd"
69	"W9UvhU5L4IatFaxhz1uvPmoKR/uadpFgC4przc/cV35gmAvkVNlW7SHMArZagV+X"
70	"au4CLyMnuG3UsOcGAngLH1ypmTb+u6wbBfpXzYEQQGfWMItYNdSWYb7QjHqXnxr5"
71	"IuYUL6nG6AEfq/gmD6yOTSwyOR2Bm40cZbIc22GoiS9g5+vCShjEbyrpEJIJ7RfR"
72	"ACvmfe8EiRROM6GyD5eHn7OgzS+8LOy4g2gxPR/VSpAQGQuBldYpdlH5NnbQtwl6"
73	"OErXb4y/E3w57bqukPyV93t4CTZedJMeJfD/1K2uaGvG/w/VNfFVbkhJ+Pi474j4"
74	"8V4Rd6rfArMCAwEAAaOCAVowggFWMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0P"
75	"AQH/BAQDAgGGMDQGCCsGAQUFBwEBBCgwJjAkBggrBgEFBQcwAYYYaHR0cDovL29j"
76	"c3AuZGlnaWNlcnQuY29tMHsGA1UdHwR0MHIwN6A1oDOGMWh0dHA6Ly9jcmw0LmRp"
77	"Z2ljZXJ0LmNvbS9EaWdpQ2VydEdsb2JhbFJvb3RHMi5jcmwwN6A1oDOGMWh0dHA6"
78	"Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEdsb2JhbFJvb3RHMi5jcmwwPQYD"
79	"VR0gBDYwNDAyBgRVHSAAMCowKAYIKwYBBQUHAgEWHGh0dHBzOi8vd3d3LmRpZ2lj"
80	"ZXJ0LmNvbS9DUFMwHQYDVR0OBBYEFCRuKy3QapJRUSVpAaqaR6aJ50AgMB8GA1Ud"
81	"IwQYMBaAFE4iVCAYlebjbuYP+vq5Eu0GF485MA0GCSqGSIb3DQEBCwUAA4IBAQAL"
82	"OYSR+ZfrqoGvhOlaOJL84mxZvzbIRacxAxHhBsCsMsdaVSnaT0AC9aHesO3ewPj2"
83	"dZ12uYf+QYB6z13jAMZbAuabeGLJ3LhimnftiQjXS8X9Q9ViIyfEBFltcT8jW+rZ"
84	"8uckJ2/0lYDblizkVIvP6hnZf1WZUXoOLRg9eFhSvGNoVwvdRLNXSmDmyHBwW4co"
85	"atc7TlJFGa8kBpJIERqLrqwYElesA8u49L3KJg6nwd3jM+/AVTANlVlOnAM2BvjA"
86	"jxSZnE0qnsHhfTuvcqdFuhOWKU4Z0BqYBvQ3lBetoxi6PrABDJXWKTUgNX31EGDk"
87	"92hiHuwZ4STyhxGs6QiA"
88		"\"},"
89		"{\"starfield_services_root_ca\": \""
90	"MIID7zCCAtegAwIBAgIBADANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UEBhMCVVMx"
91	"EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT"
92	"HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xOzA5BgNVBAMTMlN0YXJmaWVs"
93	"ZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5"
94	"MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgZgxCzAJBgNVBAYTAlVTMRAwDgYD"
95	"VQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFy"
96	"ZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTswOQYDVQQDEzJTdGFyZmllbGQgU2Vy"
97	"dmljZXMgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZI"
98	"hvcNAQEBBQADggEPADCCAQoCggEBANUMOsQq+U7i9b4Zl1+OiFOxHz/Lz58gE20p"
99	"OsgPfTz3a3Y4Y9k2YKibXlwAgLIvWX/2h/klQ4bnaRtSmpDhcePYLQ1Ob/bISdm2"
100	"8xpWriu2dBTrz/sm4xq6HZYuajtYlIlHVv8loJNwU4PahHQUw2eeBGg6345AWh1K"
101	"Ts9DkTvnVtYAcMtS7nt9rjrnvDH5RfbCYM8TWQIrgMw0R9+53pBlbQLPLJGmpufe"
102	"hRhJfGZOozptqbXuNC66DQO4M99H67FrjSXZm86B0UVGMpZwh94CDklDhbZsc7tk"
103	"6mFBrMnUVN+HL8cisibMn1lUaJ/8viovxFUcdUBgF4UCVTmLfwUCAwEAAaNCMEAw"
104	"DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+q"
105	"AdcwKziIorhtSpzyEZGDMA0GCSqGSIb3DQEBCwUAA4IBAQBLNqaEd2ndOxmfZyMI"
106	"bw5hyf2E3F/YNoHN2BtBLZ9g3ccaaNnRbobhiCPPE95Dz+I0swSdHynVv/heyNXB"
107	"ve6SbzJ08pGCL72CQnqtKrcgfU28elUSwhXqvfdqlS5sdJ/PHLTyxQGjhdByPq1z"
108	"qwubdQxtRbeOlKyWN7Wg0I8VRw7j6IPdj/3vQQF3zCepYoUz8jcI73HPdwbeyBkd"
109	"iEDPfUYd/x7H4c7/I9vG+o1VTqkC50cRRj70/b17KSa7qWFiNyi2LSr2EIZkyXCn"
110	"0q23KXB56jzaYyWf/Wi3MOxw+3WKt21gZ7IeyLnp2KhvAotnDU0mV3HaIPzBSlCN"
111	"sSi6"
112		"\"},"
113		"{\"starfield_class_2_ca\": \""
114	"MIIEDzCCAvegAwIBAgIBADANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJVUzEl"
115	"MCMGA1UEChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMp"
116	"U3RhcmZpZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQw"
117	"NjI5MTczOTE2WhcNMzQwNjI5MTczOTE2WjBoMQswCQYDVQQGEwJVUzElMCMGA1UE"
118	"ChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMpU3RhcmZp"
119	"ZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggEgMA0GCSqGSIb3"
120	"DQEBAQUAA4IBDQAwggEIAoIBAQC3Msj+6XGmBIWtDBFk385N78gDGIc/oav7PKaf"
121	"8MOh2tTYbitTkPskpD6E8J7oX+zlJ0T1KKY/e97gKvDIr1MvnsoFAZMej2YcOadN"
122	"+lq2cwQlZut3f+dZxkqZJRRU6ybH838Z1TBwj6+wRir/resp7defqgSHo9T5iaU0"
123	"X9tDkYI22WY8sbi5gv2cOj4QyDvvBmVmepsZGD3/cVE8MC5fvj13c7JdBmzDI1aa"
124	"K4UmkhynArPkPw2vCHmCuDY96pzTNbO8acr1zJ3o/WSNF4Azbl5KXZnJHoe0nRrA"
125	"1W4TNSNe35tfPe/W93bC6j67eA0cQmdrBNj41tpvi/JEoAGrAgEDo4HFMIHCMB0G"
126	"A1UdDgQWBBS/X7fRzt0fhvRbVazc1xDCDqmI5zCBkgYDVR0jBIGKMIGHgBS/X7fR"
127	"zt0fhvRbVazc1xDCDqmI56FspGowaDELMAkGA1UEBhMCVVMxJTAjBgNVBAoTHFN0"
128	"YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAsTKVN0YXJmaWVsZCBD"
129	"bGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8w"
130	"DQYJKoZIhvcNAQEFBQADggEBAAWdP4id0ckaVaGsafPzWdqbAYcaT1epoXkJKtv3"
131	"L7IezMdeatiDh6GX70k1PncGQVhiv45YuApnP+yz3SFmH8lU+nLMPUxA2IGvd56D"
132	"eruix/U0F47ZEUD0/CwqTRV/p2JdLiXTAAsgGh1o+Re49L2L7ShZ3U0WixeDyLJl"
133	"xy16paq8U4Zt3VekyvggQQto8PT7dL5WXXp59fkdheMtlb71cZBDzI0fmgAKhynp"
134	"VSJYACPq4xJDKVtHCN2MQWplBqjlIapBtJUhlbl90TSrE9atvNziPTnNvT51cKEY"
135	"WQPJIrSPnNVeKtelttQKbfi3QBFGmh95DmK/D5fs4C8fF5Q="
136		"\"}"
137	  "],"
138	  "\"trust_stores\": [" /* named cert chains */
139		"{"  /* chain for alexa.na.gateway.devices.a2z.com */
140			"\"name\": \"avs_via_starfield\","
141			"\"stack\": ["
142				"\"starfield_class_2_ca\","
143				"\"starfield_services_root_ca\""
144			"]"
145		"},"
146		"{" /* chain for api.amazon.com */
147			"\"name\": \"api_amazon_com\","
148			"\"stack\": ["
149				"\"digicert_global_ca_g2\","
150				"\"digicert_global_root_g2\""
151			"]"
152		"}"
153	  "],"
154	  "\"auth\": [" /* available auth type bindings */
155		"{"
156		  "\"name\":"		"\"lwa\","
157		  "\"streamtype\":"	"\"api_amazon_com_lwa\","
158		  "\"blob\":"		"0"
159		"}"
160	  "],"
161	  "\"s\": [" /* the supported stream types */
162		"{\"api_amazon_com_lwa\": {"
163			"\"endpoint\":"			"\"api.amazon.com\","
164			"\"port\":"			"443,"
165			"\"protocol\":"			"\"h1\","
166			"\"http_method\":"		"\"POST\","
167			"\"http_url\":"			"\"auth/o2/token\","
168			"\"opportunistic\":"		"true,"
169			"\"tls\":"			"true,"
170			"\"h2q_oflow_txcr\":"		"true,"
171			"\"http_www_form_urlencoded\":"	"true,"
172			"\"http_no_content_length\":"	"true,"
173			"\"retry\":"			"\"default\","
174			"\"tls_trust_store\":"		"\"api_amazon_com\""
175		"}},"
176		"{\"avs_event\": {"
177			"\"endpoint\":"			"\"alexa.na.gateway.devices.a2z.com\","
178			"\"port\":"			"443,"
179			"\"protocol\":"			"\"h2\","
180			"\"http_method\":"		"\"GET\","
181			"\"http_url\":"			"\"v20160207/directives\","
182			"\"h2q_oflow_txcr\":"		"true,"
183			"\"http_auth_header\":"		"\"authorization:\","
184			"\"http_auth_preamble\":"	"\"Bearer \","
185			"\"use_auth\":"			"\"lwa\","
186			"\"nailed_up\":"		"true,"
187			"\"long_poll\":"		"true,"
188			"\"retry\":"			"\"default\","
189			"\"tls\":"			"true,"
190			"\"tls_trust_store\":"		"\"avs_via_starfield\""
191		"}},"
192		"{\"avs_metadata\": {"
193			"\"endpoint\":"			"\"alexa.na.gateway.devices.a2z.com\","
194			"\"port\":"			"443,"
195			"\"protocol\":"			"\"h2\","
196			"\"http_method\":"		"\"POST\","
197			"\"http_url\":"			"\"v20160207/events\","
198			"\"http_no_content_length\":"	"true,"
199			"\"h2q_oflow_txcr\":"		"true,"
200			"\"use_auth\":"			"\"lwa\","
201			"\"http_auth_header\":"		"\"authorization:\","
202			"\"http_auth_preamble\":"	"\"Bearer \","
203			"\"http_multipart_name\":"	"\"metadata\","
204			"\"http_mime_content_type\":"	"\"application/json; charset=UTF-8\","
205#if 1
206			"\"http_multipart_ss_in\":"	"true,"
207#endif
208			"\"rideshare\":"		"\"avs_audio\","
209			"\"retry\":"			"\"default\","
210			"\"tls\":"			"true,"
211			"\"tls_trust_store\":"		"\"avs_via_starfield\""
212		"}},"
213		"{\"avs_audio\": {"
214			"\"endpoint\":"			"\"alexa.na.gateway.devices.a2z.com\","
215			"\"port\":"			"443,"
216			"\"protocol\":"			"\"h2\","
217			"\"http_method\":"		"\"POST\","
218			"\"http_url\":"			"\"v20160207/events\","
219			"\"http_no_content_length\":"	"true,"
220			"\"tls\":"			"true,"
221			"\"h2q_oflow_txcr\":"		"true,"
222#if 1
223			"\"http_multipart_ss_in\":"	"true,"
224#endif
225			"\"use_auth\":"			"\"lwa\","
226			"\"http_auth_header\":"		"\"authorization:\","
227			"\"http_auth_preamble\":"	"\"Bearer \","
228			"\"http_multipart_name\":"	"\"audio\","
229			"\"http_mime_content_type\":"	"\"application/octet-stream\","
230			"\"retry\":"			"\"default\","
231			"\"tls_trust_store\":"		"\"avs_via_starfield\""
232		"}}"
233	  "]"
234	"}"
235;
236
237static const char *canned_root_token_payload =
238	"grant_type=refresh_token"
239	"&refresh_token=Atzr|IwEBIJedGXjDqsU_vMxykqOMg"
240	"SHfYe3CPcedueWEMWSDMaDnEmiW8RlR1Kns7Cb4B-TOSnqp7ifVsY4BMY2B8tpHfO39XP"
241	"zfu9HapGjTR458IyHX44FE71pWJkGZ79uVBpljP4sazJuk8XS3Oe_yLnm_DIO6fU1nU3Y"
242	"0flYmsOiOAQE_gRk_pdlmEtHnpMA-9rLw3mkY5L89Ty9kUygBsiFaYatouROhbsTn8-jW"
243	"k1zZLUDpT6ICtBXSnrCIg0pUbZevPFhTwdXd6eX-u4rq0W-XaDvPWFO7au-iPb4Zk5eZE"
244	"iX6sissYrtNmuEXc2uHu7MnQO1hHCaTdIO2CANVumf-PHSD8xseamyh04sLV5JgFzY45S"
245	"KvKMajiUZuLkMokOx86rjC2Hdkx5DO7G-dbG1ufBDG-N79pFMSs7Ck5pc283IdLoJkCQc"
246	"AGvTX8o8I29QqkcGou-9TKhOJmpX8As94T61ok0UqqEKPJ7RhfQHHYdCtsdwxgvfVr9qI"
247	"xL_hDCcTho8opCVX-6QhJHl6SQFlTw13"
248	"&client_id="
249		"amzn1.application-oa2-client.4823334c434b4190a2b5a42c07938a2d";
250
251static int
252app_system_state_nf(lws_state_manager_t *mgr, lws_state_notify_link_t *link,
253		    int current, int target)
254{
255	struct lws_context *context = lws_system_context_from_system_mgr(mgr);
256	lws_system_blob_t *ab = lws_system_get_blob(context,
257				LWS_SYSBLOB_TYPE_AUTH, 1 /* AUTH_IDX_ROOT */);
258	size_t size;
259
260	/*
261	 * For the things we care about, let's notice if we are trying to get
262	 * past them when we haven't solved them yet, and make the system
263	 * state wait while we trigger the dependent action.
264	 */
265	switch (target) {
266	case LWS_SYSTATE_REGISTERED:
267		size = lws_system_blob_get_size(ab);
268		if (size)
269			break;
270
271		/* let's register our canned root token so auth can use it */
272		lws_system_blob_direct_set(ab,
273				(const uint8_t *)canned_root_token_payload,
274				strlen(canned_root_token_payload));
275		break;
276	case LWS_SYSTATE_OPERATIONAL:
277		if (current == LWS_SYSTATE_OPERATIONAL)
278			avs_example_start(context);
279		break;
280	case LWS_SYSTATE_POLICY_INVALID:
281		/*
282		 * This is a NOP since we used direct set... but in a real
283		 * system this could easily change to be done on the heap, then
284		 * this would be important
285		 */
286		lws_system_blob_destroy(lws_system_get_blob(context,
287					LWS_SYSBLOB_TYPE_AUTH,
288					1 /* AUTH_IDX_ROOT */));
289		break;
290	}
291
292	return 0;
293}
294
295static void
296sigint_handler(int sig)
297{
298	interrupted = 1;
299}
300
301static lws_state_notify_link_t * const app_notifier_list[] = {
302	&nl, NULL
303};
304
305int main(int argc, const char **argv)
306{
307	struct lws_context_creation_info info;
308	struct lws_context *context;
309	int n = 0;
310
311	signal(SIGINT, sigint_handler);
312	memset(&info, 0, sizeof info); /* otherwise uninitialized garbage */
313	lws_cmdline_option_handle_builtin(argc, argv, &info);
314
315	lwsl_user("LWS secure streams - AVS test [-d<verb>]\n");
316
317	info.options = LWS_SERVER_OPTION_EXPLICIT_VHOSTS |
318		       LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT;
319	info.fd_limit_per_thread = 1 + 6 + 1;
320	info.pss_policies_json = default_ss_policy;
321	info.port = CONTEXT_PORT_NO_LISTEN;
322
323#if defined(LWS_SS_USE_SSPC)
324	{
325		const char *p;
326
327		/* connect to ssproxy via UDS by default, else via
328		 * tcp connection to this port */
329		if ((p = lws_cmdline_option(argc, argv, "-p")))
330			info.ss_proxy_port = atoi(p);
331
332		/* UDS "proxy.ss.lws" in abstract namespace, else this socket
333		 * path; when -p given this can specify the network interface
334		 * to bind to */
335		if ((p = lws_cmdline_option(argc, argv, "-i")))
336			info.ss_proxy_bind = p;
337
338		/* if -p given, -a specifies the proxy address to connect to */
339		if ((p = lws_cmdline_option(argc, argv, "-a")))
340			info.ss_proxy_address = p;
341	}
342#endif
343
344	/* integrate us with lws system state management when context created */
345	nl.name = "app";
346	nl.notify_cb = app_system_state_nf;
347	info.register_notifier_list = app_notifier_list;
348
349	puts(default_ss_policy);
350
351	context = lws_create_context(&info);
352	if (!context) {
353		lwsl_err("lws init failed\n");
354		return 1;
355	}
356
357	/* the event loop */
358
359	while (n >= 0 && !interrupted)
360		n = lws_service(context, 0);
361
362	lws_context_destroy(context);
363	lwsl_user("Completed: %s\n", bad ? "failed" : "OK");
364
365	return bad;
366}
367