]> source.dussan.org Git - rspamd.git/commitdiff
[Rework] Re-add files
authorVsevolod Stakhov <vsevolod@highsecure.ru>
Fri, 15 Feb 2019 16:41:46 +0000 (16:41 +0000)
committerVsevolod Stakhov <vsevolod@highsecure.ru>
Fri, 15 Feb 2019 16:41:46 +0000 (16:41 +0000)
src/libutil/http_connection.c [new file with mode: 0644]
src/libutil/http_connection.h [new file with mode: 0644]

diff --git a/src/libutil/http_connection.c b/src/libutil/http_connection.c
new file mode 100644 (file)
index 0000000..a82fc24
--- /dev/null
@@ -0,0 +1,3971 @@
+/*-
+ * Copyright 2016 Vsevolod Stakhov
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+#include "config.h"
+#include "../../contrib/mumhash/mum.h"
+#include "http_private.h"
+#include "utlist.h"
+#include "util.h"
+#include "printf.h"
+#include "logger.h"
+#include "ref.h"
+#include "ottery.h"
+#include "keypair_private.h"
+#include "cryptobox.h"
+#include "unix-std.h"
+#include "libutil/ssl_util.h"
+#include "libutil/regexp.h"
+#include "libserver/url.h"
+
+#include <openssl/err.h>
+
+#define ENCRYPTED_VERSION " HTTP/1.0"
+
+struct _rspamd_http_privbuf {
+       rspamd_fstring_t *data;
+       const gchar *zc_buf;
+       gsize zc_remain;
+       ref_entry_t ref;
+};
+
+enum rspamd_http_priv_flags {
+       RSPAMD_HTTP_CONN_FLAG_ENCRYPTED = 1 << 0,
+       RSPAMD_HTTP_CONN_FLAG_NEW_HEADER = 1 << 1,
+       RSPAMD_HTTP_CONN_FLAG_RESETED = 1 << 2,
+       RSPAMD_HTTP_CONN_FLAG_TOO_LARGE = 1 << 3,
+       RSPAMD_HTTP_CONN_FLAG_ENCRYPTION_NEEDED = 1 << 4,
+};
+
+#define IS_CONN_ENCRYPTED(c) ((c)->flags & RSPAMD_HTTP_CONN_FLAG_ENCRYPTED)
+#define IS_CONN_RESETED(c) ((c)->flags & RSPAMD_HTTP_CONN_FLAG_RESETED)
+
+struct rspamd_http_connection_private {
+       gpointer ssl_ctx;
+       struct rspamd_ssl_connection *ssl;
+       struct _rspamd_http_privbuf *buf;
+       struct rspamd_cryptobox_pubkey *peer_key;
+       struct rspamd_cryptobox_keypair *local_key;
+       struct rspamd_http_header *header;
+       struct http_parser parser;
+       struct http_parser_settings parser_cb;
+       struct event ev;
+       struct timeval tv;
+       struct timeval *ptv;
+       struct rspamd_http_message *msg;
+       struct iovec *out;
+       guint outlen;
+       enum rspamd_http_priv_flags flags;
+       gsize wr_pos;
+       gsize wr_total;
+};
+
+enum http_magic_type {
+       HTTP_MAGIC_PLAIN = 0,
+       HTTP_MAGIC_HTML,
+       HTTP_MAGIC_CSS,
+       HTTP_MAGIC_JS,
+       HTTP_MAGIC_PNG,
+       HTTP_MAGIC_JPG
+};
+
+static const struct _rspamd_http_magic {
+       const gchar *ext;
+       const gchar *ct;
+} http_file_types[] = {
+       [HTTP_MAGIC_PLAIN] = { "txt", "text/plain" },
+       [HTTP_MAGIC_HTML] = { "html", "text/html" },
+       [HTTP_MAGIC_CSS] = { "css", "text/css" },
+       [HTTP_MAGIC_JS] = { "js", "application/javascript" },
+       [HTTP_MAGIC_PNG] = { "png", "image/png" },
+       [HTTP_MAGIC_JPG] = { "jpg", "image/jpeg" },
+};
+
+static const gchar *http_week[] = { "Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat" };
+static const gchar *http_month[] = { "Jan", "Feb", "Mar", "Apr", "May", "Jun",
+                                                          "Jul", "Aug", "Sep", "Oct", "Nov", "Dec" };
+static const rspamd_ftok_t key_header = {
+               .begin = "Key",
+               .len = 3
+};
+static const rspamd_ftok_t date_header = {
+               .begin = "Date",
+               .len = 4
+};
+static const rspamd_ftok_t last_modified_header = {
+               .begin = "Last-Modified",
+               .len = 13
+};
+
+static void rspamd_http_message_storage_cleanup (struct rspamd_http_message *msg);
+static gboolean rspamd_http_message_grow_body (struct rspamd_http_message *msg,
+               gsize len);
+
+#define HTTP_ERROR http_error_quark ()
+GQuark
+http_error_quark (void)
+{
+       return g_quark_from_static_string ("http-error-quark");
+}
+
+static void
+rspamd_http_privbuf_dtor (gpointer ud)
+{
+       struct _rspamd_http_privbuf *p = (struct _rspamd_http_privbuf *)ud;
+
+       if (p->data) {
+               rspamd_fstring_free (p->data);
+       }
+
+       g_free (p);
+}
+
+static const gchar *
+rspamd_http_code_to_str (gint code)
+{
+       if (code == 200) {
+               return "OK";
+       }
+       else if (code == 404) {
+               return "Not found";
+       }
+       else if (code == 403 || code == 401) {
+               return "Not authorized";
+       }
+       else if (code >= 400 && code < 500) {
+               return "Bad request";
+       }
+       else if (code >= 300 && code < 400) {
+               return "See Other";
+       }
+       else if (code >= 500 && code < 600) {
+               return "Internal server error";
+       }
+
+       return "Unknown error";
+}
+
+/*
+ * Obtained from nginx
+ * Copyright (C) Igor Sysoev
+ */
+static guint mday[] = { 31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31 };
+
+time_t
+rspamd_http_parse_date (const gchar *header, gsize len)
+{
+       const gchar *p, *end;
+       gint month;
+       guint day, year, hour, min, sec;
+       guint64 time;
+       enum {
+               no = 0, rfc822, /* Tue, 10 Nov 2002 23:50:13   */
+               rfc850, /* Tuesday, 10-Dec-02 23:50:13 */
+               isoc /* Tue Dec 10 23:50:13 2002    */
+       } fmt;
+
+       fmt = 0;
+       if (len > 0) {
+               end = header + len;
+       }
+       else {
+               end = header + strlen (header);
+       }
+
+       day = 32;
+       year = 2038;
+
+       for (p = header; p < end; p++) {
+               if (*p == ',') {
+                       break;
+               }
+
+               if (*p == ' ') {
+                       fmt = isoc;
+                       break;
+               }
+       }
+
+       for (p++; p < end; p++)
+               if (*p != ' ') {
+                       break;
+               }
+
+       if (end - p < 18) {
+               return (time_t)-1;
+       }
+
+       if (fmt != isoc) {
+               if (*p < '0' || *p > '9' || *(p + 1) < '0' || *(p + 1) > '9') {
+                       return (time_t)-1;
+               }
+
+               day = (*p - '0') * 10 + *(p + 1) - '0';
+               p += 2;
+
+               if (*p == ' ') {
+                       if (end - p < 18) {
+                               return (time_t)-1;
+                       }
+                       fmt = rfc822;
+
+               }
+               else if (*p == '-') {
+                       fmt = rfc850;
+
+               }
+               else {
+                       return (time_t)-1;
+               }
+
+               p++;
+       }
+
+       switch (*p) {
+
+       case 'J':
+               month = *(p + 1) == 'a' ? 0 : *(p + 2) == 'n' ? 5 : 6;
+               break;
+
+       case 'F':
+               month = 1;
+               break;
+
+       case 'M':
+               month = *(p + 2) == 'r' ? 2 : 4;
+               break;
+
+       case 'A':
+               month = *(p + 1) == 'p' ? 3 : 7;
+               break;
+
+       case 'S':
+               month = 8;
+               break;
+
+       case 'O':
+               month = 9;
+               break;
+
+       case 'N':
+               month = 10;
+               break;
+
+       case 'D':
+               month = 11;
+               break;
+
+       default:
+               return (time_t)-1;
+       }
+
+       p += 3;
+
+       if ((fmt == rfc822 && *p != ' ') || (fmt == rfc850 && *p != '-')) {
+               return (time_t)-1;
+       }
+
+       p++;
+
+       if (fmt == rfc822) {
+               if (*p < '0' || *p > '9' || *(p + 1) < '0' || *(p + 1) > '9'
+                       || *(p + 2) < '0' || *(p + 2) > '9' || *(p + 3) < '0'
+                       || *(p + 3) > '9') {
+                       return (time_t)-1;
+               }
+
+               year = (*p - '0') * 1000 + (*(p + 1) - '0') * 100
+                       + (*(p + 2) - '0') * 10 + *(p + 3) - '0';
+               p += 4;
+
+       }
+       else if (fmt == rfc850) {
+               if (*p < '0' || *p > '9' || *(p + 1) < '0' || *(p + 1) > '9') {
+                       return (time_t)-1;
+               }
+
+               year = (*p - '0') * 10 + *(p + 1) - '0';
+               year += (year < 70) ? 2000 : 1900;
+               p += 2;
+       }
+
+       if (fmt == isoc) {
+               if (*p == ' ') {
+                       p++;
+               }
+
+               if (*p < '0' || *p > '9') {
+                       return (time_t)-1;
+               }
+
+               day = *p++ - '0';
+
+               if (*p != ' ') {
+                       if (*p < '0' || *p > '9') {
+                               return (time_t)-1;
+                       }
+
+                       day = day * 10 + *p++ - '0';
+               }
+
+               if (end - p < 14) {
+                       return (time_t)-1;
+               }
+       }
+
+       if (*p++ != ' ') {
+               return (time_t)-1;
+       }
+
+       if (*p < '0' || *p > '9' || *(p + 1) < '0' || *(p + 1) > '9') {
+               return (time_t)-1;
+       }
+
+       hour = (*p - '0') * 10 + *(p + 1) - '0';
+       p += 2;
+
+       if (*p++ != ':') {
+               return (time_t)-1;
+       }
+
+       if (*p < '0' || *p > '9' || *(p + 1) < '0' || *(p + 1) > '9') {
+               return (time_t)-1;
+       }
+
+       min = (*p - '0') * 10 + *(p + 1) - '0';
+       p += 2;
+
+       if (*p++ != ':') {
+               return (time_t)-1;
+       }
+
+       if (*p < '0' || *p > '9' || *(p + 1) < '0' || *(p + 1) > '9') {
+               return (time_t)-1;
+       }
+
+       sec = (*p - '0') * 10 + *(p + 1) - '0';
+
+       if (fmt == isoc) {
+               p += 2;
+
+               if (*p++ != ' ') {
+                       return (time_t)-1;
+               }
+
+               if (*p < '0' || *p > '9' || *(p + 1) < '0' || *(p + 1) > '9'
+                       || *(p + 2) < '0' || *(p + 2) > '9' || *(p + 3) < '0'
+                       || *(p + 3) > '9') {
+                       return (time_t)-1;
+               }
+
+               year = (*p - '0') * 1000 + (*(p + 1) - '0') * 100
+                       + (*(p + 2) - '0') * 10 + *(p + 3) - '0';
+       }
+
+       if (hour > 23 || min > 59 || sec > 59) {
+               return (time_t)-1;
+       }
+
+       if (day == 29 && month == 1) {
+               if ((year & 3) || ((year % 100 == 0) && (year % 400) != 0)) {
+                       return (time_t)-1;
+               }
+
+       }
+       else if (day > mday[month]) {
+               return (time_t)-1;
+       }
+
+       /*
+        * shift new year to March 1 and start months from 1 (not 0),
+        * it is needed for Gauss' formula
+        */
+
+       if (--month <= 0) {
+               month += 12;
+               year -= 1;
+       }
+
+       /* Gauss' formula for Gregorian days since March 1, 1 BC */
+
+       time = (guint64) (
+           /* days in years including leap years since March 1, 1 BC */
+
+               365 * year + year / 4 - year / 100 + year / 400
+
+           /* days before the month */
+
+               + 367 * month / 12 - 30
+
+           /* days before the day */
+
+               + day - 1
+
+           /*
+            * 719527 days were between March 1, 1 BC and March 1, 1970,
+            * 31 and 28 days were in January and February 1970
+            */
+
+               - 719527 + 31 + 28) * 86400 + hour * 3600 + min * 60 + sec;
+
+       return (time_t) time;
+}
+
+static void
+rspamd_http_parse_key (rspamd_ftok_t *data, struct rspamd_http_connection *conn,
+               struct rspamd_http_connection_private *priv)
+{
+       guchar *decoded_id;
+       const gchar *eq_pos;
+       gsize id_len;
+       struct rspamd_cryptobox_pubkey *pk;
+
+       if (priv->local_key == NULL) {
+               /* In this case we cannot do anything, e.g. we cannot decrypt payload */
+               priv->flags &= ~RSPAMD_HTTP_CONN_FLAG_ENCRYPTED;
+       }
+       else {
+               /* Check sanity of what we have */
+               eq_pos = memchr (data->begin, '=', data->len);
+               if (eq_pos != NULL) {
+                       decoded_id = rspamd_decode_base32 (data->begin, eq_pos - data->begin,
+                                       &id_len);
+
+                       if (decoded_id != NULL && id_len >= RSPAMD_KEYPAIR_SHORT_ID_LEN) {
+                               pk = rspamd_pubkey_from_base32 (eq_pos + 1,
+                                               data->begin + data->len - eq_pos - 1,
+                                               RSPAMD_KEYPAIR_KEX,
+                                               RSPAMD_CRYPTOBOX_MODE_25519);
+                               if (pk != NULL) {
+                                       if (memcmp (rspamd_keypair_get_id (priv->local_key),
+                                                       decoded_id,
+                                                       RSPAMD_KEYPAIR_SHORT_ID_LEN) == 0) {
+                                               priv->msg->peer_key = pk;
+
+                                               if (conn->cache && priv->msg->peer_key) {
+                                                       rspamd_keypair_cache_process (conn->cache,
+                                                                       priv->local_key, priv->msg->peer_key);
+                                               }
+                                       }
+                                       else {
+                                               rspamd_pubkey_unref (pk);
+                                       }
+                               }
+                       }
+
+                       priv->flags |= RSPAMD_HTTP_CONN_FLAG_ENCRYPTED;
+                       g_free (decoded_id);
+               }
+       }
+}
+
+static inline void
+rspamd_http_check_special_header (struct rspamd_http_connection *conn,
+               struct rspamd_http_connection_private *priv)
+{
+       if (rspamd_ftok_casecmp (&priv->header->name, &date_header) == 0) {
+               priv->msg->date = rspamd_http_parse_date (priv->header->value.begin,
+                               priv->header->value.len);
+       }
+       else if (rspamd_ftok_casecmp (&priv->header->name, &key_header) == 0) {
+               rspamd_http_parse_key (&priv->header->value, conn, priv);
+       }
+       else if (rspamd_ftok_casecmp (&priv->header->name, &last_modified_header) == 0) {
+               priv->msg->last_modified = rspamd_http_parse_date (
+                               priv->header->value.begin,
+                               priv->header->value.len);
+       }
+}
+
+static gint
+rspamd_http_on_url (http_parser * parser, const gchar *at, size_t length)
+{
+       struct rspamd_http_connection *conn =
+               (struct rspamd_http_connection *)parser->data;
+       struct rspamd_http_connection_private *priv;
+
+       priv = conn->priv;
+
+       priv->msg->url = rspamd_fstring_append (priv->msg->url, at, length);
+
+       return 0;
+}
+
+static gint
+rspamd_http_on_status (http_parser * parser, const gchar *at, size_t length)
+{
+       struct rspamd_http_connection *conn =
+               (struct rspamd_http_connection *)parser->data;
+       struct rspamd_http_connection_private *priv;
+
+       priv = conn->priv;
+
+       if (parser->status_code != 200) {
+               if (priv->msg->status == NULL) {
+                       priv->msg->status = rspamd_fstring_new ();
+               }
+
+               priv->msg->status = rspamd_fstring_append (priv->msg->status, at, length);
+       }
+
+       return 0;
+}
+
+static void
+rspamd_http_finish_header (struct rspamd_http_connection *conn,
+               struct rspamd_http_connection_private *priv)
+{
+       struct rspamd_http_header *hdr;
+
+       priv->header->combined = rspamd_fstring_append (priv->header->combined,
+                       "\r\n", 2);
+       priv->header->value.len = priv->header->combined->len -
+                       priv->header->name.len - 4;
+       priv->header->value.begin = priv->header->combined->str +
+                       priv->header->name.len + 2;
+       priv->header->name.begin = priv->header->combined->str;
+
+       HASH_FIND (hh, priv->msg->headers, priv->header->name.begin,
+                       priv->header->name.len, hdr);
+
+       if (hdr == NULL) {
+               HASH_ADD_KEYPTR (hh, priv->msg->headers, priv->header->name.begin,
+                               priv->header->name.len, priv->header);
+       }
+
+       DL_APPEND (hdr, priv->header);
+
+       rspamd_http_check_special_header (conn, priv);
+}
+
+static void
+rspamd_http_init_header (struct rspamd_http_connection_private *priv)
+{
+       priv->header = g_malloc0 (sizeof (struct rspamd_http_header));
+       priv->header->combined = rspamd_fstring_new ();
+}
+
+static gint
+rspamd_http_on_header_field (http_parser * parser,
+       const gchar *at,
+       size_t length)
+{
+       struct rspamd_http_connection *conn =
+               (struct rspamd_http_connection *)parser->data;
+       struct rspamd_http_connection_private *priv;
+
+       priv = conn->priv;
+
+       if (priv->header == NULL) {
+               rspamd_http_init_header (priv);
+       }
+       else if (priv->flags & RSPAMD_HTTP_CONN_FLAG_NEW_HEADER) {
+               rspamd_http_finish_header (conn, priv);
+               rspamd_http_init_header (priv);
+       }
+
+       priv->flags &= ~RSPAMD_HTTP_CONN_FLAG_NEW_HEADER;
+       priv->header->combined = rspamd_fstring_append (priv->header->combined,
+                       at, length);
+
+       return 0;
+}
+
+static gint
+rspamd_http_on_header_value (http_parser * parser,
+       const gchar *at,
+       size_t length)
+{
+       struct rspamd_http_connection *conn =
+               (struct rspamd_http_connection *)parser->data;
+       struct rspamd_http_connection_private *priv;
+
+       priv = conn->priv;
+
+       if (priv->header == NULL) {
+               /* Should not happen */
+               return -1;
+       }
+
+       if (!(priv->flags & RSPAMD_HTTP_CONN_FLAG_NEW_HEADER)) {
+               priv->flags |= RSPAMD_HTTP_CONN_FLAG_NEW_HEADER;
+               priv->header->combined = rspamd_fstring_append (priv->header->combined,
+                               ": ", 2);
+               priv->header->name.len = priv->header->combined->len - 2;
+       }
+
+       priv->header->combined = rspamd_fstring_append (priv->header->combined,
+                       at, length);
+
+       return 0;
+}
+
+static int
+rspamd_http_on_headers_complete (http_parser * parser)
+{
+       struct rspamd_http_connection *conn =
+               (struct rspamd_http_connection *)parser->data;
+       struct rspamd_http_connection_private *priv;
+       struct rspamd_http_message *msg;
+       int ret;
+
+       priv = conn->priv;
+       msg = priv->msg;
+
+       if (priv->header != NULL) {
+               rspamd_http_finish_header (conn, priv);
+
+               priv->header = NULL;
+               priv->flags &= ~RSPAMD_HTTP_CONN_FLAG_NEW_HEADER;
+       }
+
+       if (msg->method == HTTP_HEAD) {
+               /* We don't care about the rest */
+               if (rspamd_event_pending (&priv->ev, EV_READ)) {
+                       event_del (&priv->ev);
+               }
+
+               msg->code = parser->status_code;
+               rspamd_http_connection_ref (conn);
+               ret = conn->finish_handler (conn, msg);
+               conn->finished = TRUE;
+               rspamd_http_connection_unref (conn);
+
+               return ret;
+       }
+
+       /*
+        * HTTP parser sets content length to (-1) when it doesn't know the real
+        * length, for example, in case of chunked encoding.
+        *
+        * Hence, we skip body setup here
+        */
+       if (parser->content_length != ULLONG_MAX && parser->content_length != 0) {
+               if (conn->max_size > 0 &&
+                               parser->content_length > conn->max_size) {
+                       /* Too large message */
+                       priv->flags |= RSPAMD_HTTP_CONN_FLAG_TOO_LARGE;
+                       return -1;
+               }
+
+               if (!rspamd_http_message_set_body (msg, NULL, parser->content_length)) {
+                       return -1;
+               }
+       }
+
+       if (parser->flags & F_SPAMC) {
+               msg->flags |= RSPAMD_HTTP_FLAG_SPAMC;
+       }
+
+
+       msg->method = parser->method;
+       msg->code = parser->status_code;
+
+       return 0;
+}
+
+static void
+rspamd_http_switch_zc (struct _rspamd_http_privbuf *pbuf,
+               struct rspamd_http_message *msg)
+{
+       pbuf->zc_buf = msg->body_buf.begin + msg->body_buf.len;
+       pbuf->zc_remain = msg->body_buf.allocated_len - msg->body_buf.len;
+}
+
+static int
+rspamd_http_on_body (http_parser * parser, const gchar *at, size_t length)
+{
+       struct rspamd_http_connection *conn =
+               (struct rspamd_http_connection *)parser->data;
+       struct rspamd_http_connection_private *priv;
+       struct rspamd_http_message *msg;
+       struct _rspamd_http_privbuf *pbuf;
+       const gchar *p;
+
+       priv = conn->priv;
+       msg = priv->msg;
+       pbuf = priv->buf;
+       p = at;
+
+       if (!(msg->flags & RSPAMD_HTTP_FLAG_HAS_BODY)) {
+               if (!rspamd_http_message_set_body (msg, NULL, parser->content_length)) {
+                       return -1;
+               }
+       }
+
+       if (conn->finished) {
+               return 0;
+       }
+
+       if (conn->max_size > 0 &&
+                       msg->body_buf.len + length > conn->max_size) {
+               /* Body length overflow */
+               priv->flags |= RSPAMD_HTTP_CONN_FLAG_TOO_LARGE;
+               return -1;
+       }
+
+       if (!pbuf->zc_buf) {
+               if (!rspamd_http_message_append_body (msg, at, length)) {
+                       return -1;
+               }
+
+               /* We might have some leftover in our private buffer */
+               if (pbuf->data->len == length) {
+                       /* Switch to zero-copy mode */
+                       rspamd_http_switch_zc (pbuf, msg);
+               }
+       }
+       else {
+               if (msg->body_buf.begin + msg->body_buf.len != at) {
+                       /* Likely chunked encoding */
+                       memmove ((gchar *)msg->body_buf.begin + msg->body_buf.len, at, length);
+                       p = msg->body_buf.begin + msg->body_buf.len;
+               }
+
+               /* Adjust zero-copy buf */
+               msg->body_buf.len += length;
+
+               if (!(msg->flags & RSPAMD_HTTP_FLAG_SHMEM)) {
+                       msg->body_buf.c.normal->len += length;
+               }
+
+               pbuf->zc_buf = msg->body_buf.begin + msg->body_buf.len;
+               pbuf->zc_remain = msg->body_buf.allocated_len - msg->body_buf.len;
+       }
+
+       if ((conn->opts & RSPAMD_HTTP_BODY_PARTIAL) && !IS_CONN_ENCRYPTED (priv)) {
+               /* Incremental update is impossible for encrypted requests so far */
+               return (conn->body_handler (conn, msg, p, length));
+       }
+
+       return 0;
+}
+
+static int
+rspamd_http_on_body_decrypted (http_parser * parser, const gchar *at, size_t length)
+{
+       struct rspamd_http_connection *conn =
+               (struct rspamd_http_connection *)parser->data;
+       struct rspamd_http_connection_private *priv;
+
+       priv = conn->priv;
+
+       if (priv->header != NULL) {
+               rspamd_http_finish_header (conn, priv);
+               priv->header = NULL;
+       }
+
+       if (conn->finished) {
+               return 0;
+       }
+
+       if (priv->msg->body_buf.len == 0) {
+
+               priv->msg->body_buf.begin = at;
+               priv->msg->method = parser->method;
+               priv->msg->code = parser->status_code;
+       }
+
+       priv->msg->body_buf.len += length;
+
+       return 0;
+}
+
+static int
+rspamd_http_on_headers_complete_decrypted (http_parser *parser)
+{
+       struct rspamd_http_connection *conn =
+                       (struct rspamd_http_connection *) parser->data;
+       struct rspamd_http_connection_private *priv;
+       struct rspamd_http_message *msg;
+       int ret;
+
+       priv = conn->priv;
+       msg = priv->msg;
+
+       if (priv->header != NULL) {
+               rspamd_http_finish_header (conn, priv);
+
+               priv->header = NULL;
+               priv->flags &= ~RSPAMD_HTTP_CONN_FLAG_NEW_HEADER;
+       }
+
+       if (parser->flags & F_SPAMC) {
+               priv->msg->flags |= RSPAMD_HTTP_FLAG_SPAMC;
+       }
+
+       if (msg->method == HTTP_HEAD) {
+               /* We don't care about the rest */
+               if (rspamd_event_pending (&priv->ev, EV_READ)) {
+                       event_del (&priv->ev);
+               }
+
+               msg->code = parser->status_code;
+               rspamd_http_connection_ref (conn);
+               ret = conn->finish_handler (conn, msg);
+               conn->finished = TRUE;
+               rspamd_http_connection_unref (conn);
+
+               return ret;
+       }
+
+       priv->msg->method = parser->method;
+       priv->msg->code = parser->status_code;
+
+       return 0;
+}
+
+static int
+rspamd_http_decrypt_message (struct rspamd_http_connection *conn,
+               struct rspamd_http_connection_private *priv,
+               struct rspamd_cryptobox_pubkey *peer_key)
+{
+       guchar *nonce, *m;
+       const guchar *nm;
+       gsize dec_len;
+       struct rspamd_http_message *msg = priv->msg;
+       struct rspamd_http_header *hdr, *hdrtmp, *hcur, *hcurtmp;
+       struct http_parser decrypted_parser;
+       struct http_parser_settings decrypted_cb;
+       enum rspamd_cryptobox_mode mode;
+
+       mode = rspamd_keypair_alg (priv->local_key);
+       nonce = msg->body_buf.str;
+       m = msg->body_buf.str + rspamd_cryptobox_nonce_bytes (mode) +
+                       rspamd_cryptobox_mac_bytes (mode);
+       dec_len = msg->body_buf.len - rspamd_cryptobox_nonce_bytes (mode) -
+                       rspamd_cryptobox_mac_bytes (mode);
+
+       if ((nm = rspamd_pubkey_get_nm (peer_key, priv->local_key)) == NULL) {
+               nm = rspamd_pubkey_calculate_nm (peer_key, priv->local_key);
+       }
+
+       if (!rspamd_cryptobox_decrypt_nm_inplace (m, dec_len, nonce,
+                       nm, m - rspamd_cryptobox_mac_bytes (mode), mode)) {
+               msg_err ("cannot verify encrypted message, first bytes of the input: %*xs",
+                               (gint)MIN(msg->body_buf.len, 64), msg->body_buf.begin);
+               return -1;
+       }
+
+       /* Cleanup message */
+       HASH_ITER (hh, msg->headers, hdr, hdrtmp) {
+               HASH_DELETE (hh, msg->headers, hdr);
+
+               DL_FOREACH_SAFE (hdr, hcur, hcurtmp) {
+                       rspamd_fstring_free (hcur->combined);
+                       g_free (hcur);
+               }
+       }
+
+       msg->headers = NULL;
+
+       if (msg->url != NULL) {
+               msg->url = rspamd_fstring_assign (msg->url, "", 0);
+       }
+
+       msg->body_buf.len = 0;
+
+       memset (&decrypted_parser, 0, sizeof (decrypted_parser));
+       http_parser_init (&decrypted_parser,
+                       conn->type == RSPAMD_HTTP_SERVER ? HTTP_REQUEST : HTTP_RESPONSE);
+
+       memset (&decrypted_cb, 0, sizeof (decrypted_cb));
+       decrypted_cb.on_url = rspamd_http_on_url;
+       decrypted_cb.on_status = rspamd_http_on_status;
+       decrypted_cb.on_header_field = rspamd_http_on_header_field;
+       decrypted_cb.on_header_value = rspamd_http_on_header_value;
+       decrypted_cb.on_headers_complete = rspamd_http_on_headers_complete_decrypted;
+       decrypted_cb.on_body = rspamd_http_on_body_decrypted;
+       decrypted_parser.data = conn;
+       decrypted_parser.content_length = dec_len;
+
+       if (http_parser_execute (&decrypted_parser, &decrypted_cb, m,
+                       dec_len) != (size_t)dec_len) {
+               msg_err ("HTTP parser error: %s when parsing encrypted request",
+                               http_errno_description (decrypted_parser.http_errno));
+               return -1;
+       }
+
+       return 0;
+}
+
+static int
+rspamd_http_on_message_complete (http_parser * parser)
+{
+       struct rspamd_http_connection *conn =
+               (struct rspamd_http_connection *)parser->data;
+       struct rspamd_http_connection_private *priv;
+       int ret = 0;
+       enum rspamd_cryptobox_mode mode;
+
+       if (conn->finished) {
+               return 0;
+       }
+
+       priv = conn->priv;
+
+       if ((conn->opts & RSPAMD_HTTP_REQUIRE_ENCRYPTION) && !IS_CONN_ENCRYPTED (priv)) {
+               priv->flags |= RSPAMD_HTTP_CONN_FLAG_ENCRYPTION_NEEDED;
+               msg_err ("unencrypted connection when encryption has been requested");
+               return -1;
+       }
+
+       if ((conn->opts & RSPAMD_HTTP_BODY_PARTIAL) == 0 && IS_CONN_ENCRYPTED (priv)) {
+               mode = rspamd_keypair_alg (priv->local_key);
+
+               if (priv->local_key == NULL || priv->msg->peer_key == NULL ||
+                               priv->msg->body_buf.len < rspamd_cryptobox_nonce_bytes (mode) +
+                               rspamd_cryptobox_mac_bytes (mode)) {
+                       msg_err ("cannot decrypt message");
+                       return -1;
+               }
+
+               /* We have keys, so we can decrypt message */
+               ret = rspamd_http_decrypt_message (conn, priv, priv->msg->peer_key);
+
+               if (ret != 0) {
+                       return ret;
+               }
+
+               if (conn->body_handler != NULL) {
+                       rspamd_http_connection_ref (conn);
+                       ret = conn->body_handler (conn,
+                                       priv->msg,
+                                       priv->msg->body_buf.begin,
+                                       priv->msg->body_buf.len);
+                       rspamd_http_connection_unref (conn);
+               }
+       }
+       else if ((conn->opts & RSPAMD_HTTP_BODY_PARTIAL) == 0 && conn->body_handler) {
+               g_assert (conn->body_handler != NULL);
+               rspamd_http_connection_ref (conn);
+               ret = conn->body_handler (conn,
+                               priv->msg,
+                               priv->msg->body_buf.begin,
+                               priv->msg->body_buf.len);
+               rspamd_http_connection_unref (conn);
+       }
+
+       if (ret == 0) {
+               if (rspamd_event_pending (&priv->ev, EV_READ)) {
+                       event_del (&priv->ev);
+               }
+
+               rspamd_http_connection_ref (conn);
+               ret = conn->finish_handler (conn, priv->msg);
+               conn->finished = TRUE;
+               rspamd_http_connection_unref (conn);
+       }
+
+       return ret;
+}
+
+static void
+rspamd_http_simple_client_helper (struct rspamd_http_connection *conn)
+{
+       struct event_base *base;
+       struct rspamd_http_connection_private *priv;
+       gpointer ssl;
+       gint request_method;
+
+       priv = conn->priv;
+       base = conn->priv->ev.ev_base;
+       ssl = priv->ssl;
+       priv->ssl = NULL;
+       request_method = priv->msg->method;
+       rspamd_http_connection_reset (conn);
+       priv->ssl = ssl;
+       /* Plan read message */
+
+       if (conn->opts & RSPAMD_HTTP_CLIENT_SHARED) {
+               rspamd_http_connection_read_message_shared (conn, conn->ud, conn->fd,
+                               conn->priv->ptv, base);
+       }
+       else {
+               rspamd_http_connection_read_message (conn, conn->ud, conn->fd,
+                               conn->priv->ptv, base);
+       }
+
+       priv->msg->method = request_method;
+}
+
+static void
+rspamd_http_write_helper (struct rspamd_http_connection *conn)
+{
+       struct rspamd_http_connection_private *priv;
+       struct iovec *start;
+       guint niov, i;
+       gint flags = 0;
+       gsize remain;
+       gssize r;
+       GError *err;
+       struct iovec *cur_iov;
+       struct msghdr msg;
+
+       priv = conn->priv;
+
+       if (priv->wr_pos == priv->wr_total) {
+               goto call_finish_handler;
+       }
+
+       start = &priv->out[0];
+       niov = priv->outlen;
+       remain = priv->wr_pos;
+       /* We know that niov is small enough for that */
+       cur_iov = alloca (niov * sizeof (struct iovec));
+       memcpy (cur_iov, priv->out, niov * sizeof (struct iovec));
+       for (i = 0; i < priv->outlen && remain > 0; i++) {
+               /* Find out the first iov required */
+               start = &cur_iov[i];
+               if (start->iov_len <= remain) {
+                       remain -= start->iov_len;
+                       start = &cur_iov[i + 1];
+                       niov--;
+               }
+               else {
+                       start->iov_base = (void *)((char *)start->iov_base + remain);
+                       start->iov_len -= remain;
+                       remain = 0;
+               }
+       }
+
+       memset (&msg, 0, sizeof (msg));
+       msg.msg_iov = start;
+       msg.msg_iovlen = MIN (IOV_MAX, niov);
+       g_assert (niov > 0);
+#ifdef MSG_NOSIGNAL
+       flags = MSG_NOSIGNAL;
+#endif
+
+       if (priv->ssl) {
+               r = rspamd_ssl_writev (priv->ssl, msg.msg_iov, msg.msg_iovlen);
+       }
+       else {
+               r = sendmsg (conn->fd, &msg, flags);
+       }
+
+       if (r == -1) {
+               if (!priv->ssl) {
+                       err = g_error_new (HTTP_ERROR, errno, "IO write error: %s", strerror (errno));
+                       rspamd_http_connection_ref (conn);
+                       conn->error_handler (conn, err);
+                       rspamd_http_connection_unref (conn);
+                       g_error_free (err);
+               }
+
+               return;
+       }
+       else {
+               priv->wr_pos += r;
+       }
+
+       if (priv->wr_pos >= priv->wr_total) {
+               goto call_finish_handler;
+       }
+       else {
+               /* Want to write more */
+               priv->flags &= ~RSPAMD_HTTP_CONN_FLAG_RESETED;
+               event_add (&priv->ev, priv->ptv);
+       }
+
+       return;
+
+call_finish_handler:
+       if ((conn->opts & RSPAMD_HTTP_CLIENT_SIMPLE) == 0) {
+               rspamd_http_connection_ref (conn);
+               conn->finished = TRUE;
+               conn->finish_handler (conn, priv->msg);
+               rspamd_http_connection_unref (conn);
+       }
+       else {
+               /* Plan read message */
+               rspamd_http_simple_client_helper (conn);
+       }
+}
+
+static gssize
+rspamd_http_try_read (gint fd,
+               struct rspamd_http_connection *conn,
+               struct rspamd_http_connection_private *priv,
+               struct _rspamd_http_privbuf *pbuf,
+               const gchar **buf_ptr)
+{
+       gssize r;
+       gchar *data;
+       gsize len;
+       struct rspamd_http_message *msg;
+
+       msg = priv->msg;
+
+       if (pbuf->zc_buf == NULL) {
+               data = priv->buf->data->str;
+               len = priv->buf->data->allocated;
+       }
+       else {
+               data = (gchar *)pbuf->zc_buf;
+               len = pbuf->zc_remain;
+
+               if (len == 0) {
+                       rspamd_http_message_grow_body (priv->msg, priv->buf->data->allocated);
+                       rspamd_http_switch_zc (pbuf, msg);
+                       data = (gchar *)pbuf->zc_buf;
+                       len = pbuf->zc_remain;
+               }
+       }
+
+       if (priv->ssl) {
+               r = rspamd_ssl_read (priv->ssl, data, len);
+       }
+       else {
+               r = read (fd, data, len);
+       }
+
+       if (r <= 0) {
+               return r;
+       }
+       else {
+               if (pbuf->zc_buf == NULL) {
+                       priv->buf->data->len = r;
+               }
+               else {
+                       pbuf->zc_remain -= r;
+                       pbuf->zc_buf += r;
+               }
+       }
+
+       if (buf_ptr) {
+               *buf_ptr = data;
+       }
+
+       return r;
+}
+
+static void
+rspamd_http_ssl_err_handler (gpointer ud, GError *err)
+{
+       struct rspamd_http_connection *conn = (struct rspamd_http_connection *)ud;
+
+       rspamd_http_connection_ref (conn);
+       conn->error_handler (conn, err);
+       rspamd_http_connection_unref (conn);
+}
+
+static void
+rspamd_http_event_handler (int fd, short what, gpointer ud)
+{
+       struct rspamd_http_connection *conn = (struct rspamd_http_connection *)ud;
+       struct rspamd_http_connection_private *priv;
+       struct _rspamd_http_privbuf *pbuf;
+       const gchar *d;
+       gssize r;
+       GError *err;
+
+       priv = conn->priv;
+       pbuf = priv->buf;
+       REF_RETAIN (pbuf);
+       rspamd_http_connection_ref (conn);
+
+       if (what == EV_READ) {
+               r = rspamd_http_try_read (fd, conn, priv, pbuf, &d);
+
+               if (r > 0) {
+                       if (http_parser_execute (&priv->parser, &priv->parser_cb,
+                                       d, r) != (size_t)r || priv->parser.http_errno != 0) {
+                               if (priv->flags & RSPAMD_HTTP_CONN_FLAG_TOO_LARGE) {
+                                       err = g_error_new (HTTP_ERROR, 413,
+                                                       "Request entity too large: %zu",
+                                                       (size_t)priv->parser.content_length);
+                               }
+                               else if (priv->flags & RSPAMD_HTTP_CONN_FLAG_ENCRYPTION_NEEDED) {
+                                       err = g_error_new (HTTP_ERROR, 400,
+                                                       "Encryption required");
+                               }
+                               else {
+                                       err = g_error_new (HTTP_ERROR, 500 + priv->parser.http_errno,
+                                                       "HTTP parser error: %s",
+                                                       http_errno_description (priv->parser.http_errno));
+                               }
+
+                               if (!conn->finished) {
+                                       conn->error_handler (conn, err);
+                               }
+                               else {
+                                       msg_err ("got error after HTTP request is finished: %e", err);
+                               }
+
+                               g_error_free (err);
+
+                               REF_RELEASE (pbuf);
+                               rspamd_http_connection_unref (conn);
+
+                               return;
+                       }
+               }
+               else if (r == 0) {
+                       /* We can still call http parser */
+                       http_parser_execute (&priv->parser, &priv->parser_cb, d, r);
+
+                       if (!conn->finished) {
+                               err = g_error_new (HTTP_ERROR,
+                                               errno,
+                                               "IO read error: unexpected EOF");
+                               conn->error_handler (conn, err);
+                               g_error_free (err);
+                       }
+                       REF_RELEASE (pbuf);
+                       rspamd_http_connection_unref (conn);
+
+                       return;
+               }
+               else {
+                       if (!priv->ssl) {
+                               err = g_error_new (HTTP_ERROR,
+                                               errno,
+                                               "IO read error: %s",
+                                               strerror (errno));
+                               conn->error_handler (conn, err);
+                               g_error_free (err);
+                       }
+
+                       REF_RELEASE (pbuf);
+                       rspamd_http_connection_unref (conn);
+
+                       return;
+               }
+       }
+       else if (what == EV_TIMEOUT) {
+               /* Let's try to read from the socket first */
+               r = rspamd_http_try_read (fd, conn, priv, pbuf, &d);
+
+               if (r > 0) {
+                       if (http_parser_execute (&priv->parser, &priv->parser_cb,
+                                       d, r) != (size_t)r || priv->parser.http_errno != 0) {
+                               err = g_error_new (HTTP_ERROR, priv->parser.http_errno,
+                                               "HTTP parser error: %s",
+                                               http_errno_description (priv->parser.http_errno));
+
+                               if (!conn->finished) {
+                                       conn->error_handler (conn, err);
+                               }
+                               else {
+                                       msg_err ("got error after HTTP request is finished: %e", err);
+                               }
+
+                               g_error_free (err);
+
+                               REF_RELEASE (pbuf);
+                               rspamd_http_connection_unref (conn);
+
+                               return;
+                       }
+               }
+               else if (r == 0) {
+                       if (!conn->finished) {
+                               err = g_error_new (HTTP_ERROR, ETIMEDOUT,
+                                               "IO timeout");
+                               conn->error_handler (conn, err);
+                               g_error_free (err);
+
+                       }
+                       REF_RELEASE (pbuf);
+                       rspamd_http_connection_unref (conn);
+
+                       return;
+               }
+               else {
+                       err = g_error_new (HTTP_ERROR, ETIMEDOUT,
+                                       "IO timeout");
+                       conn->error_handler (conn, err);
+                       g_error_free (err);
+
+                       REF_RELEASE (pbuf);
+                       rspamd_http_connection_unref (conn);
+
+                       return;
+               }
+       }
+       else if (what == EV_WRITE) {
+               rspamd_http_write_helper (conn);
+       }
+
+       REF_RELEASE (pbuf);
+       rspamd_http_connection_unref (conn);
+}
+
+static void
+rspamd_http_parser_reset (struct rspamd_http_connection *conn)
+{
+       struct rspamd_http_connection_private *priv = conn->priv;
+
+       http_parser_init (&priv->parser,
+               conn->type == RSPAMD_HTTP_SERVER ? HTTP_REQUEST : HTTP_RESPONSE);
+
+       priv->parser_cb.on_url = rspamd_http_on_url;
+       priv->parser_cb.on_status = rspamd_http_on_status;
+       priv->parser_cb.on_header_field = rspamd_http_on_header_field;
+       priv->parser_cb.on_header_value = rspamd_http_on_header_value;
+       priv->parser_cb.on_headers_complete = rspamd_http_on_headers_complete;
+       priv->parser_cb.on_body = rspamd_http_on_body;
+       priv->parser_cb.on_message_complete = rspamd_http_on_message_complete;
+}
+
+struct rspamd_http_connection *
+rspamd_http_connection_new (
+               rspamd_http_body_handler_t body_handler,
+               rspamd_http_error_handler_t error_handler,
+               rspamd_http_finish_handler_t finish_handler,
+               unsigned opts,
+               enum rspamd_http_connection_type type,
+               struct rspamd_keypair_cache *cache,
+               gpointer ssl_ctx)
+{
+       struct rspamd_http_connection *conn;
+       struct rspamd_http_connection_private *priv;
+
+       if (error_handler == NULL || finish_handler == NULL) {
+               return NULL;
+       }
+
+       conn = g_malloc0 (sizeof (struct rspamd_http_connection));
+       conn->opts = opts;
+       conn->type = type;
+       conn->body_handler = body_handler;
+       conn->error_handler = error_handler;
+       conn->finish_handler = finish_handler;
+       conn->fd = -1;
+       conn->ref = 1;
+       conn->finished = FALSE;
+       conn->cache = cache;
+
+       /* Init priv */
+       priv = g_malloc0 (sizeof (struct rspamd_http_connection_private));
+       conn->priv = priv;
+       priv->ssl_ctx = ssl_ctx;
+
+       rspamd_http_parser_reset (conn);
+       priv->parser.data = conn;
+
+       return conn;
+}
+
+void
+rspamd_http_connection_reset (struct rspamd_http_connection *conn)
+{
+       struct rspamd_http_connection_private *priv;
+       struct rspamd_http_message *msg;
+
+       priv = conn->priv;
+       msg = priv->msg;
+
+       /* Clear request */
+       if (msg != NULL) {
+               if (msg->peer_key) {
+                       priv->peer_key = msg->peer_key;
+                       msg->peer_key = NULL;
+               }
+               rspamd_http_message_unref (msg);
+               priv->msg = NULL;
+       }
+
+       conn->finished = FALSE;
+       /* Clear priv */
+
+       if (!(priv->flags & RSPAMD_HTTP_CONN_FLAG_RESETED)) {
+
+               if (rspamd_event_pending (&priv->ev, EV_READ|EV_WRITE|EV_TIMEOUT)) {
+                       event_del (&priv->ev);
+               }
+
+               rspamd_http_parser_reset (conn);
+       }
+
+       if (priv->buf != NULL) {
+               REF_RELEASE (priv->buf);
+               priv->buf = NULL;
+       }
+
+       if (priv->out != NULL) {
+               g_free (priv->out);
+               priv->out = NULL;
+       }
+
+       priv->flags |= RSPAMD_HTTP_CONN_FLAG_RESETED;
+}
+
+struct rspamd_http_message *
+rspamd_http_connection_steal_msg (struct rspamd_http_connection *conn)
+{
+       struct rspamd_http_connection_private *priv;
+       struct rspamd_http_message *msg;
+
+       priv = conn->priv;
+       msg = priv->msg;
+
+       /* Clear request */
+       if (msg != NULL) {
+               if (msg->peer_key) {
+                       priv->peer_key = msg->peer_key;
+                       msg->peer_key = NULL;
+               }
+               priv->msg = NULL;
+       }
+
+       return msg;
+}
+
+struct rspamd_http_message *
+rspamd_http_connection_copy_msg (struct rspamd_http_message *msg, GError **err)
+{
+       struct rspamd_http_message *new_msg;
+       struct rspamd_http_header *hdr, *nhdr, *nhdrs, *thdr, *hcur;
+       const gchar *old_body;
+       gsize old_len;
+       struct stat st;
+       union _rspamd_storage_u *storage;
+
+       new_msg = rspamd_http_new_message (msg->type);
+       new_msg->flags = msg->flags;
+
+       if (msg->body_buf.len > 0) {
+
+               if (msg->flags & RSPAMD_HTTP_FLAG_SHMEM) {
+                       /* Avoid copying by just maping a shared segment */
+                       new_msg->flags |= RSPAMD_HTTP_FLAG_SHMEM_IMMUTABLE;
+
+                       storage = &new_msg->body_buf.c;
+                       storage->shared.shm_fd = dup (msg->body_buf.c.shared.shm_fd);
+
+                       if (storage->shared.shm_fd == -1) {
+                               rspamd_http_message_unref (new_msg);
+                               g_set_error (err, http_error_quark (), errno,
+                                               "cannot dup shmem fd: %d: %s",
+                                               msg->body_buf.c.shared.shm_fd, strerror (errno));
+
+                               return NULL;
+                       }
+
+                       if (fstat (storage->shared.shm_fd, &st) == -1) {
+                               g_set_error (err, http_error_quark (), errno,
+                                               "cannot stat shmem fd: %d: %s",
+                                               storage->shared.shm_fd, strerror (errno));
+                               rspamd_http_message_unref (new_msg);
+
+                               return NULL;
+                       }
+
+                       /* We don't own segment, so do not try to touch it */
+
+                       if (msg->body_buf.c.shared.name) {
+                               storage->shared.name = msg->body_buf.c.shared.name;
+                               REF_RETAIN (storage->shared.name);
+                       }
+
+                       new_msg->body_buf.str = mmap (NULL, st.st_size,
+                                       PROT_READ, MAP_SHARED,
+                                       storage->shared.shm_fd, 0);
+
+                       if (new_msg->body_buf.str == MAP_FAILED) {
+                               g_set_error (err, http_error_quark (), errno,
+                                               "cannot mmap shmem fd: %d: %s",
+                                               storage->shared.shm_fd, strerror (errno));
+                               rspamd_http_message_unref (new_msg);
+
+                               return NULL;
+                       }
+
+                       new_msg->body_buf.begin = new_msg->body_buf.str;
+                       new_msg->body_buf.len = msg->body_buf.len;
+                       new_msg->body_buf.begin = new_msg->body_buf.str +
+                                       (msg->body_buf.begin - msg->body_buf.str);
+               }
+               else {
+                       old_body = rspamd_http_message_get_body (msg, &old_len);
+
+                       if (!rspamd_http_message_set_body (new_msg, old_body, old_len)) {
+                               g_set_error (err, http_error_quark (), errno,
+                                               "cannot set body for message, length: %zd",
+                                               old_len);
+                               rspamd_http_message_unref (new_msg);
+
+                               return NULL;
+                       }
+               }
+       }
+
+       if (msg->url) {
+               if (new_msg->url) {
+                       new_msg->url = rspamd_fstring_append (new_msg->url, msg->url->str,
+                                                               msg->url->len);
+               }
+               else {
+                       new_msg->url = rspamd_fstring_new_init (msg->url->str,
+                                       msg->url->len);
+               }
+       }
+
+       if (msg->host) {
+               new_msg->host = rspamd_fstring_new_init (msg->host->str,
+                               msg->host->len);
+       }
+
+       new_msg->method = msg->method;
+       new_msg->port = msg->port;
+       new_msg->date = msg->date;
+       new_msg->last_modified = msg->last_modified;
+
+       HASH_ITER (hh, msg->headers, hdr, thdr) {
+               nhdrs = NULL;
+
+               DL_FOREACH (hdr, hcur) {
+                       nhdr = g_malloc (sizeof (struct rspamd_http_header));
+
+                       nhdr->combined = rspamd_fstring_new_init (hcur->combined->str,
+                                       hcur->combined->len);
+                       nhdr->name.begin = nhdr->combined->str +
+                                       (hcur->name.begin - hcur->combined->str);
+                       nhdr->name.len = hcur->name.len;
+                       nhdr->value.begin = nhdr->combined->str +
+                                       (hcur->value.begin - hcur->combined->str);
+                       nhdr->value.len = hcur->value.len;
+                       DL_APPEND (nhdrs, nhdr);
+               }
+
+               HASH_ADD_KEYPTR (hh, new_msg->headers, nhdrs->name.begin,
+                               nhdrs->name.len, nhdrs);
+       }
+
+       return new_msg;
+}
+
+void
+rspamd_http_connection_free (struct rspamd_http_connection *conn)
+{
+       struct rspamd_http_connection_private *priv;
+
+       priv = conn->priv;
+
+       if (priv != NULL) {
+               rspamd_http_connection_reset (conn);
+
+               if (priv->ssl) {
+                       rspamd_ssl_connection_free (priv->ssl);
+                       priv->ssl = NULL;
+               }
+
+               if (priv->local_key) {
+                       rspamd_keypair_unref (priv->local_key);
+               }
+               if (priv->peer_key) {
+                       rspamd_pubkey_unref (priv->peer_key);
+               }
+
+               g_free (priv);
+       }
+
+       g_free (conn);
+}
+
+static void
+rspamd_http_connection_read_message_common (struct rspamd_http_connection *conn,
+               gpointer ud, gint fd, struct timeval *timeout, struct event_base *base,
+               gint flags)
+{
+       struct rspamd_http_connection_private *priv = conn->priv;
+       struct rspamd_http_message *req;
+
+       conn->fd = fd;
+       conn->ud = ud;
+       req = rspamd_http_new_message (
+               conn->type == RSPAMD_HTTP_SERVER ? HTTP_REQUEST : HTTP_RESPONSE);
+       priv->msg = req;
+       req->flags = flags;
+
+       if (flags & RSPAMD_HTTP_FLAG_SHMEM) {
+               req->body_buf.c.shared.shm_fd = -1;
+       }
+
+       if (priv->peer_key) {
+               priv->msg->peer_key = priv->peer_key;
+               priv->peer_key = NULL;
+               priv->flags |= RSPAMD_HTTP_CONN_FLAG_ENCRYPTED;
+       }
+
+       if (timeout == NULL) {
+               priv->ptv = NULL;
+       }
+       else if (&priv->tv != timeout) {
+               memcpy (&priv->tv, timeout, sizeof (struct timeval));
+               priv->ptv = &priv->tv;
+       }
+
+       priv->header = NULL;
+       priv->buf = g_malloc0 (sizeof (*priv->buf));
+       REF_INIT_RETAIN (priv->buf, rspamd_http_privbuf_dtor);
+       priv->buf->data = rspamd_fstring_sized_new (8192);
+       priv->flags |= RSPAMD_HTTP_CONN_FLAG_NEW_HEADER;
+
+       event_set (&priv->ev,
+               fd,
+               EV_READ | EV_PERSIST,
+               rspamd_http_event_handler,
+               conn);
+       if (base != NULL) {
+               event_base_set (base, &priv->ev);
+       }
+
+       priv->flags &= ~RSPAMD_HTTP_CONN_FLAG_RESETED;
+       event_add (&priv->ev, priv->ptv);
+}
+
+void
+rspamd_http_connection_read_message (struct rspamd_http_connection *conn,
+               gpointer ud, gint fd, struct timeval *timeout, struct event_base *base)
+{
+       rspamd_http_connection_read_message_common (conn, ud, fd, timeout, base, 0);
+}
+
+void
+rspamd_http_connection_read_message_shared (struct rspamd_http_connection *conn,
+               gpointer ud, gint fd, struct timeval *timeout, struct event_base *base)
+{
+       rspamd_http_connection_read_message_common (conn, ud, fd, timeout, base,
+                       RSPAMD_HTTP_FLAG_SHMEM);
+}
+
+static void
+rspamd_http_connection_encrypt_message (
+               struct rspamd_http_connection *conn,
+               struct rspamd_http_message *msg,
+               struct rspamd_http_connection_private *priv,
+               guchar *pbody,
+               guint bodylen,
+               guchar *pmethod,
+               guint methodlen,
+               guint preludelen,
+               gint hdrcount,
+               guchar *np,
+               guchar *mp,
+               struct rspamd_cryptobox_pubkey *peer_key)
+{
+       struct rspamd_cryptobox_segment *segments;
+       guchar *crlfp;
+       const guchar *nm;
+       gint i, cnt;
+       guint outlen;
+       struct rspamd_http_header *hdr, *htmp, *hcur;
+       enum rspamd_cryptobox_mode mode;
+
+       mode = rspamd_keypair_alg (priv->local_key);
+       crlfp = mp + rspamd_cryptobox_mac_bytes (mode);
+
+       outlen = priv->out[0].iov_len + priv->out[1].iov_len;
+       /*
+        * Create segments from the following:
+        * Method, [URL], CRLF, nheaders, CRLF, body
+        */
+       segments = g_new (struct rspamd_cryptobox_segment, hdrcount + 5);
+
+       segments[0].data = pmethod;
+       segments[0].len = methodlen;
+
+       if (conn->type != RSPAMD_HTTP_SERVER) {
+               segments[1].data = msg->url->str;
+               segments[1].len = msg->url->len;
+               /* space + HTTP version + crlf */
+               segments[2].data = crlfp;
+               segments[2].len = preludelen - 2;
+               crlfp += segments[2].len;
+               i = 3;
+       }
+       else {
+               /* Here we send just CRLF */
+               segments[1].data = crlfp;
+               segments[1].len = 2;
+               crlfp += segments[1].len;
+
+               i = 2;
+       }
+
+
+       HASH_ITER (hh, msg->headers, hdr, htmp) {
+               DL_FOREACH (hdr, hcur) {
+                       segments[i].data = hcur->combined->str;
+                       segments[i++].len = hcur->combined->len;
+               }
+       }
+
+       /* crlfp should point now at the second crlf */
+       segments[i].data = crlfp;
+       segments[i++].len = 2;
+
+       if (pbody) {
+               segments[i].data = pbody;
+               segments[i++].len = bodylen;
+       }
+
+       cnt = i;
+
+       if ((nm = rspamd_pubkey_get_nm (peer_key, priv->local_key)) == NULL) {
+               nm = rspamd_pubkey_calculate_nm (peer_key, priv->local_key);
+       }
+
+       rspamd_cryptobox_encryptv_nm_inplace (segments, cnt, np, nm, mp, mode);
+
+       /*
+        * iov[0] = base HTTP request
+        * iov[1] = CRLF
+        * iov[2] = nonce
+        * iov[3] = mac
+        * iov[4..i] = encrypted HTTP request/reply
+        */
+       priv->out[2].iov_base = np;
+       priv->out[2].iov_len = rspamd_cryptobox_nonce_bytes (mode);
+       priv->out[3].iov_base = mp;
+       priv->out[3].iov_len = rspamd_cryptobox_mac_bytes (mode);
+
+       outlen += rspamd_cryptobox_nonce_bytes (mode) +
+                       rspamd_cryptobox_mac_bytes (mode);
+
+       for (i = 0; i < cnt; i ++) {
+               priv->out[i + 4].iov_base = segments[i].data;
+               priv->out[i + 4].iov_len = segments[i].len;
+               outlen += segments[i].len;
+       }
+
+       priv->wr_total = outlen;
+
+       g_free (segments);
+}
+
+static void
+rspamd_http_detach_shared (struct rspamd_http_message *msg)
+{
+       rspamd_fstring_t *cpy_str;
+
+       cpy_str = rspamd_fstring_new_init (msg->body_buf.begin, msg->body_buf.len);
+       rspamd_http_message_set_body_from_fstring_steal (msg, cpy_str);
+}
+
+gint
+rspamd_http_message_write_header (const gchar* mime_type, gboolean encrypted,
+               gchar *repbuf, gsize replen, gsize bodylen, gsize enclen, const gchar* host,
+               struct rspamd_http_connection* conn, struct rspamd_http_message* msg,
+               rspamd_fstring_t** buf,
+               struct rspamd_http_connection_private* priv,
+               struct rspamd_cryptobox_pubkey* peer_key)
+{
+       gchar datebuf[64];
+       gint meth_len = 0;
+       struct tm t;
+
+       if (conn->type == RSPAMD_HTTP_SERVER) {
+               /* Format reply */
+               if (msg->method < HTTP_SYMBOLS) {
+                       rspamd_ftok_t status;
+
+                       rspamd_gmtime (msg->date, &t);
+                       rspamd_snprintf (datebuf, sizeof(datebuf),
+                                       "%s, %02d %s %4d %02d:%02d:%02d GMT", http_week[t.tm_wday],
+                                       t.tm_mday, http_month[t.tm_mon], t.tm_year + 1900,
+                                       t.tm_hour, t.tm_min, t.tm_sec);
+                       if (mime_type == NULL) {
+                               mime_type =
+                                               encrypted ? "application/octet-stream" : "text/plain";
+                       }
+
+                       if (msg->status == NULL || msg->status->len == 0) {
+                               if (msg->code == 200) {
+                                       RSPAMD_FTOK_ASSIGN (&status, "OK");
+                               }
+                               else if (msg->code == 404) {
+                                       RSPAMD_FTOK_ASSIGN (&status, "Not Found");
+                               }
+                               else if (msg->code == 403) {
+                                       RSPAMD_FTOK_ASSIGN (&status, "Forbidden");
+                               }
+                               else if (msg->code >= 500 && msg->code < 600) {
+                                       RSPAMD_FTOK_ASSIGN (&status, "Internal Server Error");
+                               }
+                               else {
+                                       RSPAMD_FTOK_ASSIGN (&status, "Undefined Error");
+                               }
+                       }
+                       else {
+                               status.begin = msg->status->str;
+                               status.len = msg->status->len;
+                       }
+
+                       if (encrypted) {
+                               /* Internal reply (encrypted) */
+                               if (mime_type) {
+                                       meth_len =
+                                                       rspamd_snprintf (repbuf, replen,
+                                                                       "HTTP/1.1 %d %T\r\n"
+                                                                                       "Connection: close\r\n"
+                                                                                       "Server: %s\r\n"
+                                                                                       "Date: %s\r\n"
+                                                                                       "Content-Length: %z\r\n"
+                                                                                       "Content-Type: %s", /* NO \r\n at the end ! */
+                                                                       msg->code, &status, "rspamd/" RVERSION,
+                                                                       datebuf,
+                                                                       bodylen, mime_type);
+                               }
+                               else {
+                                       meth_len =
+                                                       rspamd_snprintf (repbuf, replen,
+                                                                       "HTTP/1.1 %d %T\r\n"
+                                                                                       "Connection: close\r\n"
+                                                                                       "Server: %s\r\n"
+                                                                                       "Date: %s\r\n"
+                                                                                       "Content-Length: %z", /* NO \r\n at the end ! */
+                                                                       msg->code, &status, "rspamd/" RVERSION,
+                                                                       datebuf,
+                                                                       bodylen);
+                               }
+                               enclen += meth_len;
+                               /* External reply */
+                               rspamd_printf_fstring (buf,
+                                               "HTTP/1.1 200 OK\r\n"
+                                               "Connection: close\r\n"
+                                               "Server: rspamd\r\n"
+                                               "Date: %s\r\n"
+                                               "Content-Length: %z\r\n"
+                                               "Content-Type: application/octet-stream\r\n",
+                                               datebuf, enclen);
+                       }
+                       else {
+                               if (mime_type) {
+                                       meth_len =
+                                                       rspamd_printf_fstring (buf,
+                                                                       "HTTP/1.1 %d %T\r\n"
+                                                                                       "Connection: close\r\n"
+                                                                                       "Server: %s\r\n"
+                                                                                       "Date: %s\r\n"
+                                                                                       "Content-Length: %z\r\n"
+                                                                                       "Content-Type: %s\r\n",
+                                                                       msg->code, &status, "rspamd/" RVERSION,
+                                                                       datebuf,
+                                                                       bodylen, mime_type);
+                               }
+                               else {
+                                       meth_len =
+                                                       rspamd_printf_fstring (buf,
+                                                                       "HTTP/1.1 %d %T\r\n"
+                                                                                       "Connection: close\r\n"
+                                                                                       "Server: %s\r\n"
+                                                                                       "Date: %s\r\n"
+                                                                                       "Content-Length: %z\r\n",
+                                                                       msg->code, &status, "rspamd/" RVERSION,
+                                                                       datebuf,
+                                                                       bodylen);
+                               }
+                       }
+               }
+               else {
+                       /* Legacy spamd reply */
+                       if (msg->flags & RSPAMD_HTTP_FLAG_SPAMC) {
+                               gsize real_bodylen;
+                               goffset eoh_pos;
+                               GString tmp;
+
+                               /* Unfortunately, spamc protocol is deadly brain damaged */
+                               tmp.str = (gchar *)msg->body_buf.begin;
+                               tmp.len = msg->body_buf.len;
+
+                               if (rspamd_string_find_eoh (&tmp, &eoh_pos) != -1 &&
+                                               bodylen > eoh_pos) {
+                                       real_bodylen = bodylen - eoh_pos;
+                               }
+                               else {
+                                       real_bodylen = bodylen;
+                               }
+
+                               rspamd_printf_fstring (buf, "SPAMD/1.1 0 EX_OK\r\n"
+                                               "Content-length: %z\r\n",
+                                               real_bodylen);
+                       }
+                       else {
+                               rspamd_printf_fstring (buf, "RSPAMD/1.3 0 EX_OK\r\n");
+                       }
+               }
+       }
+       else {
+               /* Format request */
+               enclen += msg->url->len + strlen (http_method_str (msg->method)) + 1;
+
+               if (host == NULL && msg->host == NULL) {
+                       /* Fallback to HTTP/1.0 */
+                       if (encrypted) {
+                               rspamd_printf_fstring (buf,
+                                               "%s %s HTTP/1.0\r\n"
+                                               "Content-Length: %z\r\n"
+                                               "Content-Type: application/octet-stream\r\n",
+                                               "POST",
+                                               "/post", enclen);
+                       }
+                       else {
+                               rspamd_printf_fstring (buf,
+                                               "%s %V HTTP/1.0\r\n"
+                                               "Content-Length: %z\r\n",
+                                               http_method_str (msg->method), msg->url, bodylen);
+                               if (bodylen > 0) {
+                                       if (mime_type == NULL) {
+                                               mime_type = "text/plain";
+                                       }
+
+                                       rspamd_printf_fstring (buf,
+                                                       "Content-Type: %s\r\n",
+                                                       mime_type);
+                               }
+                       }
+               }
+               else {
+                       if (encrypted) {
+                               if (host != NULL) {
+                                       rspamd_printf_fstring (buf,
+                                                       "%s %s HTTP/1.1\r\n"
+                                                       "Connection: close\r\n"
+                                                       "Host: %s\r\n"
+                                                       "Content-Length: %z\r\n"
+                                                       "Content-Type: application/octet-stream\r\n",
+                                                       "POST", "/post", host, enclen);
+                               }
+                               else {
+                                       rspamd_printf_fstring (buf,
+                                                       "%s %s HTTP/1.1\r\n"
+                                                       "Connection: close\r\n"
+                                                       "Host: %V\r\n"
+                                                       "Content-Length: %z\r\n"
+                                                       "Content-Type: application/octet-stream\r\n",
+                                                       "POST", "/post", msg->host, enclen);
+                               }
+                       }
+                       else {
+                               if (host != NULL) {
+                                       rspamd_printf_fstring (buf,
+                                                       "%s %V HTTP/1.1\r\nConnection: close\r\n"
+                                                       "Host: %s\r\n"
+                                                       "Content-Length: %z\r\n",
+                                                       http_method_str (msg->method), msg->url, host,
+                                                       bodylen);
+                               }
+                               else {
+                                       rspamd_printf_fstring (buf,
+                                                       "%s %V HTTP/1.1\r\n"
+                                                       "Connection: close\r\n"
+                                                       "Host: %V\r\n"
+                                                       "Content-Length: %z\r\n",
+                                                       http_method_str (msg->method), msg->url, msg->host,
+                                                       bodylen);
+                               }
+
+                               if (bodylen > 0) {
+                                       if (mime_type != NULL) {
+                                               rspamd_printf_fstring (buf,
+                                                               "Content-Type: %s\r\n",
+                                                               mime_type);
+                                       }
+                               }
+                       }
+               }
+
+               if (encrypted) {
+                       GString *b32_key, *b32_id;
+
+                       b32_key = rspamd_keypair_print (priv->local_key,
+                                       RSPAMD_KEYPAIR_PUBKEY | RSPAMD_KEYPAIR_BASE32);
+                       b32_id = rspamd_pubkey_print (peer_key,
+                                       RSPAMD_KEYPAIR_ID_SHORT | RSPAMD_KEYPAIR_BASE32);
+                       /* XXX: add some fuzz here */
+                       rspamd_printf_fstring (&*buf, "Key: %v=%v\r\n", b32_id, b32_key);
+                       g_string_free (b32_key, TRUE);
+                       g_string_free (b32_id, TRUE);
+               }
+       }
+
+       return meth_len;
+}
+
+static void
+rspamd_http_connection_write_message_common (struct rspamd_http_connection *conn,
+               struct rspamd_http_message *msg, const gchar *host, const gchar *mime_type,
+               gpointer ud, gint fd, struct timeval *timeout, struct event_base *base,
+               gboolean allow_shared)
+{
+       struct rspamd_http_connection_private *priv = conn->priv;
+       struct rspamd_http_header *hdr, *htmp, *hcur;
+       gchar repbuf[512], *pbody;
+       gint i, hdrcount, meth_len = 0, preludelen = 0;
+       gsize bodylen, enclen = 0;
+       rspamd_fstring_t *buf;
+       gboolean encrypted = FALSE;
+       guchar nonce[rspamd_cryptobox_MAX_NONCEBYTES], mac[rspamd_cryptobox_MAX_MACBYTES];
+       guchar *np = NULL, *mp = NULL, *meth_pos = NULL;
+       struct rspamd_cryptobox_pubkey *peer_key = NULL;
+       enum rspamd_cryptobox_mode mode;
+       GError *err;
+
+       conn->fd = fd;
+       conn->ud = ud;
+       priv->msg = msg;
+
+       if (timeout == NULL) {
+               priv->ptv = NULL;
+       }
+       else if (timeout != &priv->tv) {
+               memcpy (&priv->tv, timeout, sizeof (struct timeval));
+               priv->ptv = &priv->tv;
+       }
+
+       priv->header = NULL;
+       priv->buf = g_malloc0 (sizeof (*priv->buf));
+       REF_INIT_RETAIN (priv->buf, rspamd_http_privbuf_dtor);
+       priv->buf->data = rspamd_fstring_sized_new (512);
+       buf = priv->buf->data;
+
+       if (priv->peer_key && priv->local_key) {
+               priv->msg->peer_key = priv->peer_key;
+               priv->peer_key = NULL;
+               priv->flags |= RSPAMD_HTTP_CONN_FLAG_ENCRYPTED;
+       }
+
+       if (msg->peer_key != NULL) {
+               if (priv->local_key == NULL) {
+                       /* Automatically generate a temporary keypair */
+                       priv->local_key = rspamd_keypair_new (RSPAMD_KEYPAIR_KEX,
+                                       RSPAMD_CRYPTOBOX_MODE_25519);
+               }
+
+               encrypted = TRUE;
+
+               if (conn->cache) {
+                       rspamd_keypair_cache_process (conn->cache,
+                                       priv->local_key, priv->msg->peer_key);
+               }
+       }
+
+       if (encrypted && (msg->flags &
+                       (RSPAMD_HTTP_FLAG_SHMEM_IMMUTABLE|RSPAMD_HTTP_FLAG_SHMEM))) {
+               /* We cannot use immutable body to encrypt message in place */
+               allow_shared = FALSE;
+               rspamd_http_detach_shared (msg);
+       }
+
+       if (allow_shared) {
+               gchar tmpbuf[64];
+
+               if (!(msg->flags & RSPAMD_HTTP_FLAG_SHMEM) ||
+                               msg->body_buf.c.shared.name == NULL) {
+                       allow_shared = FALSE;
+               }
+               else {
+                       /* Insert new headers */
+                       rspamd_http_message_add_header (msg, "Shm",
+                                       msg->body_buf.c.shared.name->shm_name);
+                       rspamd_snprintf (tmpbuf, sizeof (tmpbuf), "%d",
+                                       (int)(msg->body_buf.begin - msg->body_buf.str));
+                       rspamd_http_message_add_header (msg, "Shm-Offset",
+                                       tmpbuf);
+                       rspamd_snprintf (tmpbuf, sizeof (tmpbuf), "%z",
+                                       msg->body_buf.len);
+                       rspamd_http_message_add_header (msg, "Shm-Length",
+                                       tmpbuf);
+               }
+       }
+
+       if (encrypted) {
+               mode = rspamd_keypair_alg (priv->local_key);
+
+               if (msg->body_buf.len == 0) {
+                       pbody = NULL;
+                       bodylen = 0;
+                       msg->method = HTTP_GET;
+               }
+               else {
+                       pbody = (gchar *)msg->body_buf.begin;
+                       bodylen = msg->body_buf.len;
+                       msg->method = HTTP_POST;
+               }
+
+               if (conn->type == RSPAMD_HTTP_SERVER) {
+                       /*
+                        * iov[0] = base reply
+                        * iov[1] = CRLF
+                        * iov[2] = nonce
+                        * iov[3] = mac
+                        * iov[4] = encrypted reply
+                        * iov[6] = encrypted crlf
+                        * iov[7..n] = encrypted headers
+                        * iov[n + 1] = encrypted crlf
+                        * [iov[n + 2] = encrypted body]
+                        */
+                       priv->outlen = 7;
+                       enclen = rspamd_cryptobox_nonce_bytes (mode) +
+                                       rspamd_cryptobox_mac_bytes (mode) +
+                                       4 + /* 2 * CRLF */
+                                       bodylen;
+               }
+               else {
+                       /*
+                        * iov[0] = base request
+                        * iov[1] = CRLF
+                        * iov[2] = nonce
+                        * iov[3] = mac
+                        * iov[4] = encrypted method + space
+                        * iov[5] = encrypted url
+                        * iov[7] = encrypted prelude
+                        * iov[8..n] = encrypted headers
+                        * iov[n + 1] = encrypted crlf
+                        * [iov[n + 2] = encrypted body]
+                        */
+                       priv->outlen = 8;
+
+                       if (bodylen > 0) {
+                               if (mime_type != NULL) {
+                                       preludelen = rspamd_snprintf (repbuf, sizeof (repbuf), "%s\r\n"
+                                                                       "Content-Length: %z\r\n"
+                                                                       "Content-Type: %s\r\n"
+                                                                       "\r\n", ENCRYPTED_VERSION, bodylen,
+                                                       mime_type);
+                               }
+                               else {
+                                       preludelen = rspamd_snprintf (repbuf, sizeof (repbuf), "%s\r\n"
+                                                       "Content-Length: %z\r\n"
+                                                       ""
+                                                       "\r\n", ENCRYPTED_VERSION, bodylen);
+                               }
+
+                               preludelen = rspamd_snprintf (repbuf, sizeof (repbuf), "%s\r\n"
+                                               "Content-Length: %z\r\n"
+                                               "Content-Type: %s\r\n"
+                                               "\r\n", ENCRYPTED_VERSION, bodylen,
+                                               mime_type);
+                       }
+                       else {
+                               preludelen = rspamd_snprintf (repbuf, sizeof (repbuf),
+                                               "%s\r\n\r\n",
+                                               ENCRYPTED_VERSION);
+                       }
+
+                       enclen = rspamd_cryptobox_nonce_bytes (mode) +
+                                       rspamd_cryptobox_mac_bytes (mode) +
+                                       preludelen + /* version [content-length] + 2 * CRLF */
+                                       bodylen;
+               }
+
+               if (bodylen > 0) {
+                       priv->outlen ++;
+               }
+       }
+       else {
+               if (msg->method < HTTP_SYMBOLS) {
+                       if (msg->body_buf.len == 0 || allow_shared) {
+                               pbody = NULL;
+                               bodylen = 0;
+                               priv->outlen = 2;
+
+                               if (msg->method == HTTP_INVALID) {
+                                       msg->method = HTTP_GET;
+                               }
+                       }
+                       else {
+                               pbody = (gchar *)msg->body_buf.begin;
+                               bodylen = msg->body_buf.len;
+                               priv->outlen = 3;
+
+                               if (msg->method == HTTP_INVALID) {
+                                       msg->method = HTTP_POST;
+                               }
+                       }
+               }
+               else if (msg->body_buf.len > 0) {
+                       allow_shared = FALSE;
+                       pbody = (gchar *)msg->body_buf.begin;
+                       bodylen = msg->body_buf.len;
+                       priv->outlen = 2;
+               }
+               else {
+                       /* Invalid body for spamc method */
+                       abort ();
+               }
+       }
+
+       peer_key = msg->peer_key;
+
+       priv->wr_total = bodylen + 2;
+
+       hdrcount = 0;
+
+       if (msg->method < HTTP_SYMBOLS) {
+               HASH_ITER (hh, msg->headers, hdr, htmp) {
+                       DL_FOREACH (hdr, hcur) {
+                               /* <name: value\r\n> */
+                               priv->wr_total += hcur->combined->len;
+                               enclen += hcur->combined->len;
+                               priv->outlen ++;
+                               hdrcount ++;
+                       }
+               }
+       }
+
+       /* Allocate iov */
+       priv->out = g_malloc0 (sizeof (struct iovec) * priv->outlen);
+       priv->wr_pos = 0;
+
+       meth_len = rspamd_http_message_write_header (mime_type, encrypted,
+                       repbuf, sizeof (repbuf), bodylen, enclen,
+                       host, conn, msg,
+                       &buf, priv, peer_key);
+       priv->wr_total += buf->len;
+
+       /* Setup external request body */
+       priv->out[0].iov_base = buf->str;
+       priv->out[0].iov_len = buf->len;
+
+       /* Buf will be used eventually for encryption */
+       if (encrypted) {
+               gint meth_offset, nonce_offset, mac_offset;
+               mode = rspamd_keypair_alg (priv->local_key);
+
+               ottery_rand_bytes (nonce, rspamd_cryptobox_nonce_bytes (mode));
+               memset (mac, 0, rspamd_cryptobox_mac_bytes (mode));
+               meth_offset = buf->len;
+
+               if (conn->type == RSPAMD_HTTP_SERVER) {
+                       buf = rspamd_fstring_append (buf, repbuf, meth_len);
+               }
+               else {
+                       meth_len = strlen (http_method_str (msg->method)) + 1; /* + space */
+                       buf = rspamd_fstring_append (buf, http_method_str (msg->method),
+                                       meth_len - 1);
+                       buf = rspamd_fstring_append (buf, " ", 1);
+               }
+
+               nonce_offset = buf->len;
+               buf = rspamd_fstring_append (buf, nonce,
+                               rspamd_cryptobox_nonce_bytes (mode));
+               mac_offset = buf->len;
+               buf = rspamd_fstring_append (buf, mac,
+                               rspamd_cryptobox_mac_bytes (mode));
+
+               /* Need to be encrypted */
+               if (conn->type == RSPAMD_HTTP_SERVER) {
+                       buf = rspamd_fstring_append (buf, "\r\n\r\n", 4);
+               }
+               else {
+                       buf = rspamd_fstring_append (buf, repbuf, preludelen);
+               }
+
+               meth_pos = buf->str + meth_offset;
+               np = buf->str + nonce_offset;
+               mp = buf->str + mac_offset;
+       }
+
+       /* During previous writes, buf might be reallocated and changed */
+       priv->buf->data = buf;
+
+       if (encrypted) {
+               /* Finish external HTTP request */
+               priv->out[1].iov_base = "\r\n";
+               priv->out[1].iov_len = 2;
+               /* Encrypt the real request */
+               rspamd_http_connection_encrypt_message (conn, msg, priv, pbody, bodylen,
+                               meth_pos, meth_len, preludelen, hdrcount, np, mp, peer_key);
+       }
+       else {
+               i = 1;
+               if (msg->method < HTTP_SYMBOLS) {
+                       HASH_ITER (hh, msg->headers, hdr, htmp) {
+                               DL_FOREACH (hdr, hcur) {
+                                       priv->out[i].iov_base = hcur->combined->str;
+                                       priv->out[i++].iov_len = hcur->combined->len;
+                               }
+                       }
+
+                       priv->out[i].iov_base = "\r\n";
+                       priv->out[i++].iov_len = 2;
+               }
+               else {
+                       /* No CRLF for compatibility reply */
+                       priv->wr_total -= 2;
+               }
+
+               if (pbody != NULL) {
+                       priv->out[i].iov_base = pbody;
+                       priv->out[i++].iov_len = bodylen;
+               }
+       }
+
+       priv->flags &= ~RSPAMD_HTTP_CONN_FLAG_RESETED;
+
+       if (rspamd_event_pending (&priv->ev, EV_TIMEOUT|EV_WRITE|EV_READ)) {
+               event_del (&priv->ev);
+       }
+
+       if (msg->flags & RSPAMD_HTTP_FLAG_SSL) {
+               if (base != NULL) {
+                       event_base_set (base, &priv->ev);
+               }
+               if (!priv->ssl_ctx) {
+                       err = g_error_new (HTTP_ERROR, errno, "ssl message requested "
+                                       "with no ssl ctx");
+                       rspamd_http_connection_ref (conn);
+                       conn->error_handler (conn, err);
+                       rspamd_http_connection_unref (conn);
+                       g_error_free (err);
+                       return;
+               }
+               else {
+                       if (priv->ssl) {
+                               /* Cleanup the existing connection */
+                               rspamd_ssl_connection_free (priv->ssl);
+                       }
+
+                       priv->ssl = rspamd_ssl_connection_new (priv->ssl_ctx, base,
+                                       !(msg->flags & RSPAMD_HTTP_FLAG_SSL_NOVERIFY));
+                       g_assert (priv->ssl != NULL);
+
+                       if (!rspamd_ssl_connect_fd (priv->ssl, fd, host, &priv->ev,
+                                       priv->ptv, rspamd_http_event_handler,
+                                       rspamd_http_ssl_err_handler, conn)) {
+
+                               err = g_error_new (HTTP_ERROR, errno,
+                                               "ssl connection error: ssl error=%s, errno=%s",
+                                               ERR_error_string (ERR_get_error (), NULL),
+                                               strerror (errno));
+                               rspamd_http_connection_ref (conn);
+                               conn->error_handler (conn, err);
+                               rspamd_http_connection_unref (conn);
+                               g_error_free (err);
+                               return;
+                       }
+               }
+       }
+       else {
+               event_set (&priv->ev, fd, EV_WRITE, rspamd_http_event_handler, conn);
+
+               if (base != NULL) {
+                       event_base_set (base, &priv->ev);
+               }
+
+               event_add (&priv->ev, priv->ptv);
+       }
+}
+
+void
+rspamd_http_connection_write_message (struct rspamd_http_connection *conn,
+               struct rspamd_http_message *msg, const gchar *host, const gchar *mime_type,
+               gpointer ud, gint fd, struct timeval *timeout, struct event_base *base)
+{
+       rspamd_http_connection_write_message_common (conn, msg, host, mime_type,
+                       ud, fd, timeout, base, FALSE);
+}
+
+void
+rspamd_http_connection_write_message_shared (struct rspamd_http_connection *conn,
+               struct rspamd_http_message *msg, const gchar *host, const gchar *mime_type,
+               gpointer ud, gint fd, struct timeval *timeout, struct event_base *base)
+{
+       rspamd_http_connection_write_message_common (conn, msg, host, mime_type,
+                       ud, fd, timeout, base, TRUE);
+}
+
+struct rspamd_http_message *
+rspamd_http_new_message (enum http_parser_type type)
+{
+       struct rspamd_http_message *new;
+
+       new = g_malloc0 (sizeof (struct rspamd_http_message));
+
+       if (type == HTTP_REQUEST) {
+               new->url = rspamd_fstring_new ();
+       }
+       else {
+               new->url = NULL;
+               new->code = 200;
+       }
+
+       new->port = 80;
+       new->type = type;
+       new->method = HTTP_INVALID;
+
+       REF_INIT_RETAIN (new, rspamd_http_message_free);
+
+       return new;
+}
+
+struct rspamd_http_message*
+rspamd_http_message_from_url (const gchar *url)
+{
+       struct http_parser_url pu;
+       struct rspamd_http_message *msg;
+       const gchar *host, *path;
+       size_t pathlen, urllen;
+       guint flags = 0;
+
+       if (url == NULL) {
+               return NULL;
+       }
+
+       urllen = strlen (url);
+       memset (&pu, 0, sizeof (pu));
+
+       if (http_parser_parse_url (url, urllen, FALSE, &pu) != 0) {
+               msg_warn ("cannot parse URL: %s", url);
+               return NULL;
+       }
+
+       if ((pu.field_set & (1 << UF_HOST)) == 0) {
+               msg_warn ("no host argument in URL: %s", url);
+               return NULL;
+       }
+
+       if ((pu.field_set & (1 << UF_SCHEMA))) {
+               if (pu.field_data[UF_SCHEMA].len == sizeof ("https") - 1 &&
+                               memcmp (url + pu.field_data[UF_SCHEMA].off, "https", 5) == 0) {
+                       flags |= RSPAMD_HTTP_FLAG_SSL;
+               }
+       }
+
+       if ((pu.field_set & (1 << UF_PATH)) == 0) {
+               path = "/";
+               pathlen = 1;
+       }
+       else {
+               path = url + pu.field_data[UF_PATH].off;
+               pathlen = urllen - pu.field_data[UF_PATH].off;
+       }
+
+       msg = rspamd_http_new_message (HTTP_REQUEST);
+       host = url + pu.field_data[UF_HOST].off;
+       msg->flags = flags;
+
+       if ((pu.field_set & (1 << UF_PORT)) != 0) {
+               msg->port = pu.port;
+       }
+       else {
+               /* XXX: magic constant */
+               if (flags & RSPAMD_HTTP_FLAG_SSL) {
+                       msg->port = 443;
+               }
+               else {
+                       msg->port = 80;
+               }
+       }
+
+       msg->host = rspamd_fstring_new_init (host, pu.field_data[UF_HOST].len);
+       msg->url = rspamd_fstring_append (msg->url, path, pathlen);
+
+       REF_INIT_RETAIN (msg, rspamd_http_message_free);
+
+       return msg;
+}
+
+const gchar *
+rspamd_http_message_get_body (struct rspamd_http_message *msg,
+               gsize *blen)
+{
+       const gchar *ret = NULL;
+
+       if (msg->body_buf.len > 0) {
+               ret = msg->body_buf.begin;
+       }
+
+       if (blen) {
+               *blen = msg->body_buf.len;
+       }
+
+       return ret;
+}
+
+static void
+rspamd_http_shname_dtor (void *p)
+{
+       struct rspamd_storage_shmem *n = p;
+
+#ifdef HAVE_SANE_SHMEM
+       shm_unlink (n->shm_name);
+#else
+       unlink (n->shm_name);
+#endif
+       g_free (n->shm_name);
+       g_free (n);
+}
+
+struct rspamd_storage_shmem *
+rspamd_http_message_shmem_ref (struct rspamd_http_message *msg)
+{
+       if ((msg->flags & RSPAMD_HTTP_FLAG_SHMEM) && msg->body_buf.c.shared.name) {
+               REF_RETAIN (msg->body_buf.c.shared.name);
+               return msg->body_buf.c.shared.name;
+       }
+
+       return NULL;
+}
+
+guint
+rspamd_http_message_get_flags (struct rspamd_http_message *msg)
+{
+       return msg->flags;
+}
+
+void
+rspamd_http_message_shmem_unref (struct rspamd_storage_shmem *p)
+{
+       REF_RELEASE (p);
+}
+
+gboolean
+rspamd_http_message_set_body (struct rspamd_http_message *msg,
+               const gchar *data, gsize len)
+{
+       union _rspamd_storage_u *storage;
+       storage = &msg->body_buf.c;
+
+       rspamd_http_message_storage_cleanup (msg);
+
+       if (msg->flags & RSPAMD_HTTP_FLAG_SHMEM) {
+               storage->shared.name = g_malloc (sizeof (*storage->shared.name));
+               REF_INIT_RETAIN (storage->shared.name, rspamd_http_shname_dtor);
+#ifdef HAVE_SANE_SHMEM
+#if defined(__DragonFly__)
+               // DragonFly uses regular files for shm. User rspamd is not allowed to create
+               // files in the root.
+               storage->shared.name->shm_name = g_strdup ("/tmp/rhm.XXXXXXXXXXXXXXXXXXXX");
+#else
+               storage->shared.name->shm_name = g_strdup ("/rhm.XXXXXXXXXXXXXXXXXXXX");
+#endif
+               storage->shared.shm_fd = rspamd_shmem_mkstemp (storage->shared.name->shm_name);
+#else
+               /* XXX: assume that tempdir is /tmp */
+               storage->shared.name->shm_name = g_strdup ("/tmp/rhm.XXXXXXXXXXXXXXXXXXXX");
+               storage->shared.shm_fd = mkstemp (storage->shared.name->shm_name);
+#endif
+
+               if (storage->shared.shm_fd == -1) {
+                       return FALSE;
+               }
+
+               if (len != 0 && len != ULLONG_MAX) {
+                       if (ftruncate (storage->shared.shm_fd, len) == -1) {
+                               return FALSE;
+                       }
+
+                       msg->body_buf.str = mmap (NULL, len,
+                                       PROT_WRITE|PROT_READ, MAP_SHARED,
+                                       storage->shared.shm_fd, 0);
+
+                       if (msg->body_buf.str == MAP_FAILED) {
+                               return FALSE;
+                       }
+
+                       msg->body_buf.begin = msg->body_buf.str;
+                       msg->body_buf.allocated_len = len;
+
+                       if (data != NULL) {
+                               memcpy (msg->body_buf.str, data, len);
+                               msg->body_buf.len = len;
+                       }
+               }
+               else {
+                       msg->body_buf.len = 0;
+                       msg->body_buf.begin = NULL;
+                       msg->body_buf.str = NULL;
+                       msg->body_buf.allocated_len = 0;
+               }
+       }
+       else {
+               if (len != 0 && len != ULLONG_MAX) {
+                       if (data == NULL) {
+                               storage->normal = rspamd_fstring_sized_new (len);
+                               msg->body_buf.len = 0;
+                       }
+                       else {
+                               storage->normal = rspamd_fstring_new_init (data, len);
+                               msg->body_buf.len = len;
+                       }
+               }
+               else {
+                       storage->normal = rspamd_fstring_new ();
+               }
+
+               msg->body_buf.begin = storage->normal->str;
+               msg->body_buf.str = storage->normal->str;
+               msg->body_buf.allocated_len = storage->normal->allocated;
+       }
+
+       msg->flags |= RSPAMD_HTTP_FLAG_HAS_BODY;
+
+       return TRUE;
+}
+
+void
+rspamd_http_message_set_method (struct rspamd_http_message *msg,
+               const gchar *method)
+{
+       gint i;
+
+       /* Linear search: not very efficient method */
+       for (i = 0; i < HTTP_METHOD_MAX; i ++) {
+               if (g_ascii_strcasecmp (method, http_method_str (i)) == 0) {
+                       msg->method = i;
+               }
+       }
+}
+
+gboolean
+rspamd_http_message_set_body_from_fd (struct rspamd_http_message *msg,
+               gint fd)
+{
+       union _rspamd_storage_u *storage;
+       struct stat st;
+
+       rspamd_http_message_storage_cleanup (msg);
+
+       storage = &msg->body_buf.c;
+       msg->flags |= RSPAMD_HTTP_FLAG_SHMEM|RSPAMD_HTTP_FLAG_SHMEM_IMMUTABLE;
+
+       storage->shared.shm_fd = dup (fd);
+       msg->body_buf.str = MAP_FAILED;
+
+       if (storage->shared.shm_fd == -1) {
+               return FALSE;
+       }
+
+       if (fstat (storage->shared.shm_fd, &st) == -1) {
+               return FALSE;
+       }
+
+       msg->body_buf.str = mmap (NULL, st.st_size,
+                       PROT_READ, MAP_SHARED,
+                       storage->shared.shm_fd, 0);
+
+       if (msg->body_buf.str == MAP_FAILED) {
+               return FALSE;
+       }
+
+       msg->body_buf.begin = msg->body_buf.str;
+       msg->body_buf.len = st.st_size;
+       msg->body_buf.allocated_len = st.st_size;
+
+       return TRUE;
+}
+
+gboolean
+rspamd_http_message_set_body_from_fstring_steal (struct rspamd_http_message *msg,
+               rspamd_fstring_t *fstr)
+{
+       union _rspamd_storage_u *storage;
+
+       rspamd_http_message_storage_cleanup (msg);
+
+       storage = &msg->body_buf.c;
+       msg->flags &= ~(RSPAMD_HTTP_FLAG_SHMEM|RSPAMD_HTTP_FLAG_SHMEM_IMMUTABLE);
+
+       storage->normal = fstr;
+       msg->body_buf.str = fstr->str;
+       msg->body_buf.begin = msg->body_buf.str;
+       msg->body_buf.len = fstr->len;
+       msg->body_buf.allocated_len = fstr->allocated;
+
+       return TRUE;
+}
+
+gboolean
+rspamd_http_message_set_body_from_fstring_copy (struct rspamd_http_message *msg,
+               const rspamd_fstring_t *fstr)
+{
+       union _rspamd_storage_u *storage;
+
+       rspamd_http_message_storage_cleanup (msg);
+
+       storage = &msg->body_buf.c;
+       msg->flags &= ~(RSPAMD_HTTP_FLAG_SHMEM|RSPAMD_HTTP_FLAG_SHMEM_IMMUTABLE);
+
+       storage->normal = rspamd_fstring_new_init (fstr->str, fstr->len);
+       msg->body_buf.str = storage->normal->str;
+       msg->body_buf.begin = msg->body_buf.str;
+       msg->body_buf.len = storage->normal->len;
+       msg->body_buf.allocated_len = storage->normal->allocated;
+
+       return TRUE;
+}
+
+
+static gboolean
+rspamd_http_message_grow_body (struct rspamd_http_message *msg, gsize len)
+{
+       struct stat st;
+       union _rspamd_storage_u *storage;
+       gsize newlen;
+
+       storage = &msg->body_buf.c;
+
+       if (msg->flags & RSPAMD_HTTP_FLAG_SHMEM) {
+               if (storage->shared.shm_fd == -1) {
+                       return FALSE;
+               }
+
+               if (fstat (storage->shared.shm_fd, &st) == -1) {
+                       return FALSE;
+               }
+
+               /* Check if we need to grow */
+               if ((gsize)st.st_size < msg->body_buf.len + len) {
+                       /* Need to grow */
+                       newlen = rspamd_fstring_suggest_size (msg->body_buf.len, st.st_size,
+                                       len);
+                       /* Unmap as we need another size of segment */
+                       if (msg->body_buf.str != MAP_FAILED) {
+                               munmap (msg->body_buf.str, st.st_size);
+                       }
+
+                       if (ftruncate (storage->shared.shm_fd, newlen) == -1) {
+                               return FALSE;
+                       }
+
+                       msg->body_buf.str = mmap (NULL, newlen,
+                                       PROT_WRITE|PROT_READ, MAP_SHARED,
+                                       storage->shared.shm_fd, 0);
+                       if (msg->body_buf.str == MAP_FAILED) {
+                               return FALSE;
+                       }
+
+                       msg->body_buf.begin = msg->body_buf.str;
+                       msg->body_buf.allocated_len = newlen;
+               }
+       }
+       else {
+               storage->normal = rspamd_fstring_grow (storage->normal, len);
+
+               /* Append might cause realloc */
+               msg->body_buf.begin = storage->normal->str;
+               msg->body_buf.len = storage->normal->len;
+               msg->body_buf.str = storage->normal->str;
+               msg->body_buf.allocated_len = storage->normal->allocated;
+       }
+
+       return TRUE;
+}
+
+gboolean
+rspamd_http_message_append_body (struct rspamd_http_message *msg,
+               const gchar *data, gsize len)
+{
+       union _rspamd_storage_u *storage;
+
+       storage = &msg->body_buf.c;
+
+       if (msg->flags & RSPAMD_HTTP_FLAG_SHMEM) {
+               if (!rspamd_http_message_grow_body (msg, len)) {
+                       return FALSE;
+               }
+
+               memcpy (msg->body_buf.str + msg->body_buf.len, data, len);
+               msg->body_buf.len += len;
+       }
+       else {
+               storage->normal = rspamd_fstring_append (storage->normal, data, len);
+
+               /* Append might cause realloc */
+               msg->body_buf.begin = storage->normal->str;
+               msg->body_buf.len = storage->normal->len;
+               msg->body_buf.str = storage->normal->str;
+               msg->body_buf.allocated_len = storage->normal->allocated;
+       }
+
+       return TRUE;
+}
+
+static void
+rspamd_http_message_storage_cleanup (struct rspamd_http_message *msg)
+{
+       union _rspamd_storage_u *storage;
+       struct stat st;
+
+       if (msg->flags & RSPAMD_HTTP_FLAG_SHMEM) {
+               storage = &msg->body_buf.c;
+
+               if (storage->shared.shm_fd > 0) {
+                       g_assert (fstat (storage->shared.shm_fd, &st) != -1);
+
+                       if (msg->body_buf.str != MAP_FAILED) {
+                               munmap (msg->body_buf.str, st.st_size);
+                       }
+
+                       close (storage->shared.shm_fd);
+               }
+
+               if (storage->shared.name != NULL) {
+                       REF_RELEASE (storage->shared.name);
+               }
+
+               storage->shared.shm_fd = -1;
+               msg->body_buf.str = MAP_FAILED;
+       }
+       else {
+               if (msg->body_buf.c.normal) {
+                       rspamd_fstring_free (msg->body_buf.c.normal);
+               }
+
+               msg->body_buf.c.normal = NULL;
+       }
+
+       msg->body_buf.len = 0;
+}
+
+void
+rspamd_http_connection_set_max_size (struct rspamd_http_connection *conn,
+               gsize sz)
+{
+       conn->max_size = sz;
+}
+
+void
+rspamd_http_message_free (struct rspamd_http_message *msg)
+{
+       struct rspamd_http_header *hdr, *htmp, *hcur, *hcurtmp;
+
+
+       HASH_ITER (hh, msg->headers, hdr, htmp) {
+               HASH_DEL (msg->headers, hdr);
+
+               DL_FOREACH_SAFE (hdr, hcur, hcurtmp) {
+                       rspamd_fstring_free (hcur->combined);
+                       g_free (hcur);
+               }
+       }
+
+
+       rspamd_http_message_storage_cleanup (msg);
+
+       if (msg->url != NULL) {
+               rspamd_fstring_free (msg->url);
+       }
+       if (msg->status != NULL) {
+               rspamd_fstring_free (msg->status);
+       }
+       if (msg->host != NULL) {
+               rspamd_fstring_free (msg->host);
+       }
+       if (msg->peer_key != NULL) {
+               rspamd_pubkey_unref (msg->peer_key);
+       }
+
+       g_free (msg);
+}
+
+void
+rspamd_http_message_set_peer_key (struct rspamd_http_message *msg,
+               struct rspamd_cryptobox_pubkey *pk)
+{
+       if (msg->peer_key != NULL) {
+               rspamd_pubkey_unref (msg->peer_key);
+       }
+
+       if (pk) {
+               msg->peer_key = rspamd_pubkey_ref (pk);
+       }
+       else {
+               msg->peer_key = NULL;
+       }
+}
+
+void
+rspamd_http_message_add_header_len (struct rspamd_http_message *msg,
+       const gchar *name,
+       const gchar *value,
+       gsize len)
+{
+       struct rspamd_http_header *hdr, *found = NULL;
+       guint nlen, vlen;
+
+       if (msg != NULL && name != NULL && value != NULL) {
+               hdr = g_malloc0 (sizeof (struct rspamd_http_header));
+               nlen = strlen (name);
+               vlen = len;
+               hdr->combined = rspamd_fstring_sized_new (nlen + vlen + 4);
+               rspamd_printf_fstring (&hdr->combined, "%s: %*s\r\n", name, (gint)vlen,
+                               value);
+               hdr->name.begin = hdr->combined->str;
+               hdr->name.len = nlen;
+               hdr->value.begin = hdr->combined->str + nlen + 2;
+               hdr->value.len = vlen;
+
+               HASH_FIND (hh, msg->headers, hdr->name.begin,
+                               hdr->name.len, found);
+
+               if (found == NULL) {
+                       HASH_ADD_KEYPTR (hh, msg->headers, hdr->name.begin,
+                                       hdr->name.len, hdr);
+               }
+
+               DL_APPEND (found, hdr);
+       }
+}
+
+void
+rspamd_http_message_add_header (struct rspamd_http_message *msg,
+               const gchar *name,
+               const gchar *value)
+{
+       if (value) {
+               rspamd_http_message_add_header_len (msg, name, value, strlen (value));
+       }
+}
+
+void
+rspamd_http_message_add_header_fstr (struct rspamd_http_message *msg,
+               const gchar *name,
+               rspamd_fstring_t *value)
+{
+       struct rspamd_http_header *hdr, *found = NULL;
+       guint nlen, vlen;
+
+       if (msg != NULL && name != NULL && value != NULL) {
+               hdr = g_malloc0 (sizeof (struct rspamd_http_header));
+               nlen = strlen (name);
+               vlen = value->len;
+               hdr->combined = rspamd_fstring_sized_new (nlen + vlen + 4);
+               rspamd_printf_fstring (&hdr->combined, "%s: %V\r\n", name, value);
+               hdr->name.begin = hdr->combined->str;
+               hdr->name.len = nlen;
+               hdr->value.begin = hdr->combined->str + nlen + 2;
+               hdr->value.len = vlen;
+
+               HASH_FIND (hh, msg->headers, hdr->name.begin,
+                               hdr->name.len, found);
+
+               if (found == NULL) {
+                       HASH_ADD_KEYPTR (hh, msg->headers, hdr->name.begin,
+                                       hdr->name.len, hdr);
+               }
+
+               DL_APPEND (found, hdr);
+       }
+}
+
+const rspamd_ftok_t *
+rspamd_http_message_find_header (struct rspamd_http_message *msg,
+       const gchar *name)
+{
+       struct rspamd_http_header *hdr;
+       const rspamd_ftok_t *res = NULL;
+       guint slen = strlen (name);
+
+       if (msg != NULL) {
+               HASH_FIND (hh, msg->headers, name, slen, hdr);
+
+               if (hdr) {
+                       res = &hdr->value;
+               }
+       }
+
+       return res;
+}
+
+GPtrArray*
+rspamd_http_message_find_header_multiple (
+               struct rspamd_http_message *msg,
+               const gchar *name)
+{
+       GPtrArray *res = NULL;
+       struct rspamd_http_header *hdr, *cur;
+
+       guint slen = strlen (name);
+
+       if (msg != NULL) {
+               HASH_FIND (hh, msg->headers, name, slen, hdr);
+
+               if (hdr) {
+                       res = g_ptr_array_sized_new (4);
+
+                       LL_FOREACH (hdr, cur) {
+                               g_ptr_array_add (res, &cur->value);
+                       }
+               }
+       }
+
+
+       return res;
+}
+
+
+gboolean
+rspamd_http_message_remove_header (struct rspamd_http_message *msg,
+       const gchar *name)
+{
+       struct rspamd_http_header *hdr, *hcur, *hcurtmp;
+       gboolean res = FALSE;
+       guint slen = strlen (name);
+
+       if (msg != NULL) {
+               HASH_FIND (hh, msg->headers, name, slen, hdr);
+
+               if (hdr) {
+                       HASH_DEL (msg->headers, hdr);
+                       res = TRUE;
+
+                       DL_FOREACH_SAFE (hdr, hcur, hcurtmp) {
+                               rspamd_fstring_free (hcur->combined);
+                               g_free (hcur);
+                       }
+               }
+       }
+
+       return res;
+}
+
+/*
+ * HTTP router functions
+ */
+
+static void
+rspamd_http_entry_free (struct rspamd_http_connection_entry *entry)
+{
+       if (entry != NULL) {
+               close (entry->conn->fd);
+               rspamd_http_connection_unref (entry->conn);
+               if (entry->rt->finish_handler) {
+                       entry->rt->finish_handler (entry);
+               }
+
+               DL_DELETE (entry->rt->conns, entry);
+               g_free (entry);
+       }
+}
+
+static void
+rspamd_http_router_error_handler (struct rspamd_http_connection *conn,
+       GError *err)
+{
+       struct rspamd_http_connection_entry *entry = conn->ud;
+       struct rspamd_http_message *msg;
+
+       if (entry->is_reply) {
+               /* At this point we need to finish this session and close owned socket */
+               if (entry->rt->error_handler != NULL) {
+                       entry->rt->error_handler (entry, err);
+               }
+               rspamd_http_entry_free (entry);
+       }
+       else {
+               /* Here we can write a reply to a client */
+               if (entry->rt->error_handler != NULL) {
+                       entry->rt->error_handler (entry, err);
+               }
+               msg = rspamd_http_new_message (HTTP_RESPONSE);
+               msg->date = time (NULL);
+               msg->code = err->code;
+               rspamd_http_message_set_body (msg, err->message, strlen (err->message));
+               rspamd_http_connection_reset (entry->conn);
+               rspamd_http_connection_write_message (entry->conn,
+                       msg,
+                       NULL,
+                       "text/plain",
+                       entry,
+                       entry->conn->fd,
+                       entry->rt->ptv,
+                       entry->rt->ev_base);
+               entry->is_reply = TRUE;
+       }
+}
+
+static const gchar *
+rspamd_http_router_detect_ct (const gchar *path)
+{
+       const gchar *dot;
+       guint i;
+
+       dot = strrchr (path, '.');
+       if (dot == NULL) {
+               return http_file_types[HTTP_MAGIC_PLAIN].ct;
+       }
+       dot++;
+
+       for (i = 0; i < G_N_ELEMENTS (http_file_types); i++) {
+               if (strcmp (http_file_types[i].ext, dot) == 0) {
+                       return http_file_types[i].ct;
+               }
+       }
+
+       return http_file_types[HTTP_MAGIC_PLAIN].ct;
+}
+
+static gboolean
+rspamd_http_router_is_subdir (const gchar *parent, const gchar *sub)
+{
+       if (parent == NULL || sub == NULL || *parent == '\0') {
+               return FALSE;
+       }
+
+       while (*parent != '\0') {
+               if (*sub != *parent) {
+                       return FALSE;
+               }
+               parent++;
+               sub++;
+       }
+
+       parent--;
+       if (*parent == G_DIR_SEPARATOR) {
+               return TRUE;
+       }
+
+       return (*sub == G_DIR_SEPARATOR || *sub == '\0');
+}
+
+static gboolean
+rspamd_http_router_try_file (struct rspamd_http_connection_entry *entry,
+       rspamd_ftok_t *lookup, gboolean expand_path)
+{
+       struct stat st;
+       gint fd;
+       gchar filebuf[PATH_MAX], realbuf[PATH_MAX], *dir;
+       struct rspamd_http_message *reply_msg;
+
+       rspamd_snprintf (filebuf, sizeof (filebuf), "%s%c%T",
+               entry->rt->default_fs_path, G_DIR_SEPARATOR, lookup);
+
+       if (realpath (filebuf, realbuf) == NULL ||
+               lstat (realbuf, &st) == -1) {
+               return FALSE;
+       }
+
+       if (S_ISDIR (st.st_mode) && expand_path) {
+               /* Try to append 'index.html' to the url */
+               rspamd_fstring_t *nlookup;
+               rspamd_ftok_t tok;
+               gboolean ret;
+
+               nlookup = rspamd_fstring_sized_new (lookup->len + sizeof ("index.html"));
+               rspamd_printf_fstring (&nlookup, "%T%c%s", lookup, G_DIR_SEPARATOR,
+                               "index.html");
+               tok.begin = nlookup->str;
+               tok.len = nlookup->len;
+               ret = rspamd_http_router_try_file (entry, &tok, FALSE);
+               rspamd_fstring_free (nlookup);
+
+               return ret;
+       }
+       else if (!S_ISREG (st.st_mode)) {
+               return FALSE;
+       }
+
+       /* We also need to ensure that file is inside the defined dir */
+       rspamd_strlcpy (filebuf, realbuf, sizeof (filebuf));
+       dir = dirname (filebuf);
+
+       if (dir == NULL ||
+               !rspamd_http_router_is_subdir (entry->rt->default_fs_path,
+               dir)) {
+               return FALSE;
+       }
+
+       fd = open (realbuf, O_RDONLY);
+       if (fd == -1) {
+               return FALSE;
+       }
+
+       reply_msg = rspamd_http_new_message (HTTP_RESPONSE);
+       reply_msg->date = time (NULL);
+       reply_msg->code = 200;
+       rspamd_http_router_insert_headers (entry->rt, reply_msg);
+
+       if (!rspamd_http_message_set_body_from_fd (reply_msg, fd)) {
+               close (fd);
+               return FALSE;
+       }
+
+       close (fd);
+
+       rspamd_http_connection_reset (entry->conn);
+
+       msg_debug ("requested file %s", realbuf);
+       rspamd_http_connection_write_message (entry->conn, reply_msg, NULL,
+               rspamd_http_router_detect_ct (realbuf), entry, entry->conn->fd,
+               entry->rt->ptv, entry->rt->ev_base);
+
+       return TRUE;
+}
+
+static void
+rspamd_http_router_send_error (GError *err,
+               struct rspamd_http_connection_entry *entry)
+{
+       struct rspamd_http_message *err_msg;
+
+       err_msg = rspamd_http_new_message (HTTP_RESPONSE);
+       err_msg->date = time (NULL);
+       err_msg->code = err->code;
+       rspamd_http_message_set_body (err_msg, err->message,
+                       strlen (err->message));
+       entry->is_reply = TRUE;
+       err_msg->status = rspamd_fstring_new_init (err->message, strlen (err->message));
+       rspamd_http_router_insert_headers (entry->rt, err_msg);
+       rspamd_http_connection_reset (entry->conn);
+       rspamd_http_connection_write_message (entry->conn,
+                       err_msg,
+                       NULL,
+                       "text/plain",
+                       entry,
+                       entry->conn->fd,
+                       entry->rt->ptv,
+                       entry->rt->ev_base);
+}
+
+
+static int
+rspamd_http_router_finish_handler (struct rspamd_http_connection *conn,
+       struct rspamd_http_message *msg)
+{
+       struct rspamd_http_connection_entry *entry = conn->ud;
+       rspamd_http_router_handler_t handler = NULL;
+       gpointer found;
+
+       GError *err;
+       rspamd_ftok_t lookup;
+       const rspamd_ftok_t *encoding;
+       struct http_parser_url u;
+       guint i;
+       rspamd_regexp_t *re;
+       struct rspamd_http_connection_router *router;
+
+       G_STATIC_ASSERT (sizeof (rspamd_http_router_handler_t) ==
+               sizeof (gpointer));
+
+       memset (&lookup, 0, sizeof (lookup));
+       router = entry->rt;
+
+       if (entry->is_reply) {
+               /* Request is finished, it is safe to free a connection */
+               rspamd_http_entry_free (entry);
+       }
+       else {
+               if (G_UNLIKELY (msg->method != HTTP_GET && msg->method != HTTP_POST)) {
+                       if (router->unknown_method_handler) {
+                               return router->unknown_method_handler (entry, msg);
+                       }
+                       else {
+                               err = g_error_new (HTTP_ERROR, 500,
+                                               "Invalid method");
+                               if (entry->rt->error_handler != NULL) {
+                                       entry->rt->error_handler (entry, err);
+                               }
+
+                               rspamd_http_router_send_error (err, entry);
+                               g_error_free (err);
+
+                               return 0;
+                       }
+               }
+
+               /* Search for path */
+               if (msg->url != NULL && msg->url->len != 0) {
+
+                       http_parser_parse_url (msg->url->str, msg->url->len, TRUE, &u);
+
+                       if (u.field_set & (1 << UF_PATH)) {
+                               guint unnorm_len;
+                               lookup.begin = msg->url->str + u.field_data[UF_PATH].off;
+                               lookup.len = u.field_data[UF_PATH].len;
+
+                               rspamd_http_normalize_path_inplace ((gchar *)lookup.begin,
+                                               lookup.len,
+                                               &unnorm_len);
+                               lookup.len = unnorm_len;
+                       }
+                       else {
+                               lookup.begin = msg->url->str;
+                               lookup.len = msg->url->len;
+                       }
+
+                       found = g_hash_table_lookup (entry->rt->paths, &lookup);
+                       memcpy (&handler, &found, sizeof (found));
+                       msg_debug ("requested known path: %T", &lookup);
+               }
+               else {
+                       err = g_error_new (HTTP_ERROR, 404,
+                                       "Empty path requested");
+                       if (entry->rt->error_handler != NULL) {
+                               entry->rt->error_handler (entry, err);
+                       }
+
+                       rspamd_http_router_send_error (err, entry);
+                       g_error_free (err);
+
+                       return 0;
+               }
+
+               entry->is_reply = TRUE;
+
+               encoding = rspamd_http_message_find_header (msg, "Accept-Encoding");
+
+               if (encoding && rspamd_substring_search (encoding->begin, encoding->len,
+                               "gzip", 4) != -1) {
+                       entry->support_gzip = TRUE;
+               }
+
+               if (handler != NULL) {
+                       return handler (entry, msg);
+               }
+               else {
+                       /* Try regexps */
+                       for (i = 0; i < router->regexps->len; i ++) {
+                               re = g_ptr_array_index (router->regexps, i);
+                               if (rspamd_regexp_match (re, lookup.begin, lookup.len,
+                                               TRUE)) {
+                                       found = rspamd_regexp_get_ud (re);
+                                       memcpy (&handler, &found, sizeof (found));
+
+                                       return handler (entry, msg);
+                               }
+                       }
+
+                       /* Now try plain file */
+                       if (entry->rt->default_fs_path == NULL || lookup.len == 0 ||
+                                       !rspamd_http_router_try_file (entry, &lookup, TRUE)) {
+
+                               err = g_error_new (HTTP_ERROR, 404,
+                                               "Not found");
+                               if (entry->rt->error_handler != NULL) {
+                                       entry->rt->error_handler (entry, err);
+                               }
+
+                               msg_info ("path: %T not found", &lookup);
+                               rspamd_http_router_send_error (err, entry);
+                               g_error_free (err);
+                       }
+               }
+       }
+
+       return 0;
+}
+
+struct rspamd_http_connection_router *
+rspamd_http_router_new (rspamd_http_router_error_handler_t eh,
+       rspamd_http_router_finish_handler_t fh,
+       struct timeval *timeout, struct event_base *base,
+       const char *default_fs_path,
+       struct rspamd_keypair_cache *cache)
+{
+       struct rspamd_http_connection_router * new;
+       struct stat st;
+
+       new = g_malloc0 (sizeof (struct rspamd_http_connection_router));
+       new->paths = g_hash_table_new_full (rspamd_ftok_icase_hash,
+                       rspamd_ftok_icase_equal, rspamd_fstring_mapped_ftok_free, NULL);
+       new->regexps = g_ptr_array_new ();
+       new->conns = NULL;
+       new->error_handler = eh;
+       new->finish_handler = fh;
+       new->ev_base = base;
+       new->response_headers = g_hash_table_new_full (rspamd_strcase_hash,
+                       rspamd_strcase_equal, g_free, g_free);
+
+       if (timeout) {
+               new->tv = *timeout;
+               new->ptv = &new->tv;
+       }
+       else {
+               new->ptv = NULL;
+       }
+
+       new->default_fs_path = NULL;
+
+       if (default_fs_path != NULL) {
+               if (stat (default_fs_path, &st) == -1) {
+                       msg_err ("cannot stat %s", default_fs_path);
+               }
+               else {
+                       if (!S_ISDIR (st.st_mode)) {
+                               msg_err ("path %s is not a directory", default_fs_path);
+                       }
+                       else {
+                               new->default_fs_path = realpath (default_fs_path, NULL);
+                       }
+               }
+       }
+
+       new->cache = cache;
+
+       return new;
+}
+
+void
+rspamd_http_router_set_key (struct rspamd_http_connection_router *router,
+               struct rspamd_cryptobox_keypair *key)
+{
+       g_assert (key != NULL);
+
+       router->key = rspamd_keypair_ref (key);
+}
+
+void
+rspamd_http_router_add_path (struct rspamd_http_connection_router *router,
+       const gchar *path, rspamd_http_router_handler_t handler)
+{
+       gpointer ptr;
+       rspamd_ftok_t *key;
+       rspamd_fstring_t *storage;
+       G_STATIC_ASSERT (sizeof (rspamd_http_router_handler_t) ==
+               sizeof (gpointer));
+
+       if (path != NULL && handler != NULL && router != NULL) {
+               memcpy (&ptr, &handler, sizeof (ptr));
+               storage = rspamd_fstring_new_init (path, strlen (path));
+               key = g_malloc0 (sizeof (*key));
+               key->begin = storage->str;
+               key->len = storage->len;
+               g_hash_table_insert (router->paths, key, ptr);
+       }
+}
+
+void
+rspamd_http_router_set_unknown_handler (struct rspamd_http_connection_router *router,
+               rspamd_http_router_handler_t handler)
+{
+       if (router != NULL) {
+               router->unknown_method_handler = handler;
+       }
+}
+
+void
+rspamd_http_router_add_header (struct rspamd_http_connection_router *router,
+               const gchar *name, const gchar *value)
+{
+       if (name != NULL && value != NULL && router != NULL) {
+               g_hash_table_replace (router->response_headers, g_strdup (name),
+                               g_strdup (value));
+       }
+}
+
+void
+rspamd_http_router_insert_headers (struct rspamd_http_connection_router *router,
+               struct rspamd_http_message *msg)
+{
+       GHashTableIter it;
+       gpointer k, v;
+
+       if (router && msg) {
+               g_hash_table_iter_init (&it, router->response_headers);
+
+               while (g_hash_table_iter_next (&it, &k, &v)) {
+                       rspamd_http_message_add_header (msg, k, v);
+               }
+       }
+}
+
+void
+rspamd_http_router_add_regexp (struct rspamd_http_connection_router *router,
+               struct rspamd_regexp_s *re, rspamd_http_router_handler_t handler)
+{
+       gpointer ptr;
+       G_STATIC_ASSERT (sizeof (rspamd_http_router_handler_t) ==
+                       sizeof (gpointer));
+
+       if (re != NULL && handler != NULL && router != NULL) {
+               memcpy (&ptr, &handler, sizeof (ptr));
+               rspamd_regexp_set_ud (re, ptr);
+               g_ptr_array_add (router->regexps, rspamd_regexp_ref (re));
+       }
+}
+
+void
+rspamd_http_router_handle_socket (struct rspamd_http_connection_router *router,
+       gint fd, gpointer ud)
+{
+       struct rspamd_http_connection_entry *conn;
+
+       conn = g_malloc0 (sizeof (struct rspamd_http_connection_entry));
+       conn->rt = router;
+       conn->ud = ud;
+       conn->is_reply = FALSE;
+
+       conn->conn = rspamd_http_connection_new (NULL,
+                       rspamd_http_router_error_handler,
+                       rspamd_http_router_finish_handler,
+                       0,
+                       RSPAMD_HTTP_SERVER,
+                       router->cache,
+                       NULL);
+
+       if (router->key) {
+               rspamd_http_connection_set_key (conn->conn, router->key);
+       }
+
+       rspamd_http_connection_read_message (conn->conn, conn, fd, router->ptv,
+               router->ev_base);
+       DL_PREPEND (router->conns, conn);
+}
+
+void
+rspamd_http_router_free (struct rspamd_http_connection_router *router)
+{
+       struct rspamd_http_connection_entry *conn, *tmp;
+       rspamd_regexp_t *re;
+       guint i;
+
+       if (router) {
+               DL_FOREACH_SAFE (router->conns, conn, tmp) {
+                       rspamd_http_entry_free (conn);
+               }
+
+               if (router->key) {
+                       rspamd_keypair_unref (router->key);
+               }
+
+               if (router->cache) {
+                       rspamd_keypair_cache_destroy (router->cache);
+               }
+
+               if (router->default_fs_path != NULL) {
+                       g_free (router->default_fs_path);
+               }
+
+               for (i = 0; i < router->regexps->len; i ++) {
+                       re = g_ptr_array_index (router->regexps, i);
+                       rspamd_regexp_unref (re);
+               }
+
+               g_ptr_array_free (router->regexps, TRUE);
+               g_hash_table_unref (router->paths);
+               g_hash_table_unref (router->response_headers);
+               g_free (router);
+       }
+}
+
+void
+rspamd_http_connection_set_key (struct rspamd_http_connection *conn,
+               struct rspamd_cryptobox_keypair *key)
+{
+       struct rspamd_http_connection_private *priv = conn->priv;
+
+       g_assert (key != NULL);
+       priv->local_key = rspamd_keypair_ref (key);
+}
+
+const struct rspamd_cryptobox_pubkey*
+rspamd_http_connection_get_peer_key (struct rspamd_http_connection *conn)
+{
+       struct rspamd_http_connection_private *priv = conn->priv;
+
+       if (priv->peer_key) {
+               return priv->peer_key;
+       }
+       else if (priv->msg) {
+               return priv->msg->peer_key;
+       }
+
+       return NULL;
+}
+
+gboolean
+rspamd_http_connection_is_encrypted (struct rspamd_http_connection *conn)
+{
+       struct rspamd_http_connection_private *priv = conn->priv;
+
+       if (priv->peer_key != NULL) {
+               return TRUE;
+       }
+       else if (priv->msg) {
+               return priv->msg->peer_key != NULL;
+       }
+
+       return FALSE;
+}
+
+GHashTable *
+rspamd_http_message_parse_query (struct rspamd_http_message *msg)
+{
+       GHashTable *res;
+       rspamd_fstring_t *key = NULL, *value = NULL;
+       rspamd_ftok_t *key_tok = NULL, *value_tok = NULL;
+       const gchar *p, *c, *end;
+       struct http_parser_url u;
+       enum {
+               parse_key,
+               parse_eqsign,
+               parse_value,
+               parse_ampersand
+       } state = parse_key;
+
+       res = g_hash_table_new_full (rspamd_ftok_icase_hash,
+                       rspamd_ftok_icase_equal,
+                       rspamd_fstring_mapped_ftok_free,
+                       rspamd_fstring_mapped_ftok_free);
+
+       if (msg->url && msg->url->len > 0) {
+               http_parser_parse_url (msg->url->str, msg->url->len, TRUE, &u);
+
+               if (u.field_set & (1 << UF_QUERY)) {
+                       p = msg->url->str + u.field_data[UF_QUERY].off;
+                       c = p;
+                       end = p + u.field_data[UF_QUERY].len;
+
+                       while (p <= end) {
+                               switch (state) {
+                               case parse_key:
+                                       if ((p == end || *p == '&') && p > c) {
+                                               /* We have a single parameter without a value */
+                                               key = rspamd_fstring_new_init (c, p - c);
+                                               key_tok = rspamd_ftok_map (key);
+                                               key_tok->len = rspamd_url_decode (key->str, key->str,
+                                                               key->len);
+
+                                               value = rspamd_fstring_new_init ("", 0);
+                                               value_tok = rspamd_ftok_map (value);
+
+                                               g_hash_table_replace (res, key_tok, value_tok);
+                                               state = parse_ampersand;
+                                       }
+                                       else if (*p == '=' && p > c) {
+                                               /* We have something like key=value */
+                                               key = rspamd_fstring_new_init (c, p - c);
+                                               key_tok = rspamd_ftok_map (key);
+                                               key_tok->len = rspamd_url_decode (key->str, key->str,
+                                                               key->len);
+
+                                               state = parse_eqsign;
+                                       }
+                                       else {
+                                               p ++;
+                                       }
+                                       break;
+
+                               case parse_eqsign:
+                                       if (*p != '=') {
+                                               c = p;
+                                               state = parse_value;
+                                       }
+                                       else {
+                                               p ++;
+                                       }
+                                       break;
+
+                               case parse_value:
+                                       if ((p == end || *p == '&') && p >= c) {
+                                               g_assert (key != NULL);
+                                               if (p > c) {
+                                                       value = rspamd_fstring_new_init (c, p - c);
+                                                       value_tok = rspamd_ftok_map (value);
+                                                       value_tok->len = rspamd_url_decode (value->str,
+                                                                       value->str,
+                                                                       value->len);
+                                                       /* Detect quotes for value */
+                                                       if (value_tok->begin[0] == '"') {
+                                                               memmove (value->str, value->str + 1,
+                                                                               value_tok->len - 1);
+                                                               value_tok->len --;
+                                                       }
+                                                       if (value_tok->begin[value_tok->len - 1] == '"') {
+                                                               value_tok->len --;
+                                                       }
+                                               }
+                                               else {
+                                                       value = rspamd_fstring_new_init ("", 0);
+                                                       value_tok = rspamd_ftok_map (value);
+                                               }
+
+                                               g_hash_table_replace (res, key_tok, value_tok);
+                                               key = value = NULL;
+                                               key_tok = value_tok = NULL;
+                                               state = parse_ampersand;
+                                       }
+                                       else {
+                                               p ++;
+                                       }
+                                       break;
+
+                               case parse_ampersand:
+                                       if (p != end && *p != '&') {
+                                               c = p;
+                                               state = parse_key;
+                                       }
+                                       else {
+                                               p ++;
+                                       }
+                                       break;
+                               }
+                       }
+               }
+
+               if (state != parse_ampersand && key != NULL) {
+                       rspamd_fstring_free (key);
+               }
+       }
+
+       return res;
+}
+
+
+glong
+rspamd_http_date_format (gchar *buf, gsize len, time_t time)
+{
+       struct tm tms;
+
+       rspamd_gmtime (time, &tms);
+
+       return rspamd_snprintf (buf, len, "%s, %02d %s %4d %02d:%02d:%02d GMT",
+                       http_week[tms.tm_wday], tms.tm_mday,
+                       http_month[tms.tm_mon], tms.tm_year + 1900,
+                       tms.tm_hour, tms.tm_min, tms.tm_sec);
+}
+
+struct rspamd_http_message *
+rspamd_http_message_ref (struct rspamd_http_message *msg)
+{
+       REF_RETAIN (msg);
+
+       return msg;
+}
+
+void
+rspamd_http_message_unref (struct rspamd_http_message *msg)
+{
+       REF_RELEASE (msg);
+}
+
+
+void
+rspamd_http_normalize_path_inplace (gchar *path, guint len, guint *nlen)
+{
+       const gchar *p, *end, *slash = NULL, *dot = NULL;
+       gchar *o;
+       enum {
+               st_normal = 0,
+               st_got_dot,
+               st_got_dot_dot,
+               st_got_slash,
+               st_got_slash_slash,
+       } state = st_normal;
+
+       p = path;
+       end = path + len;
+       o = path;
+
+       while (p < end) {
+               switch (state) {
+               case st_normal:
+                       if (G_UNLIKELY (*p == '/')) {
+                               state = st_got_slash;
+                               slash = p;
+                       }
+                       else if (G_UNLIKELY (*p == '.')) {
+                               state = st_got_dot;
+                               dot = p;
+                       }
+                       else {
+                               *o++ = *p;
+                       }
+                       p ++;
+                       break;
+               case st_got_slash:
+                       if (G_UNLIKELY (*p == '/')) {
+                               /* Ignore double slash */
+                               *o++ = *p;
+                               state = st_got_slash_slash;
+                       }
+                       else if (G_UNLIKELY (*p == '.')) {
+                               dot = p;
+                               state = st_got_dot;
+                       }
+                       else {
+                               *o++ = '/';
+                               *o++ = *p;
+                               slash = NULL;
+                               dot = NULL;
+                               state = st_normal;
+                       }
+                       p ++;
+                       break;
+               case st_got_slash_slash:
+                       if (G_LIKELY (*p != '/')) {
+                               slash = p - 1;
+                               dot = NULL;
+                               state = st_normal;
+                               continue;
+                       }
+                       p ++;
+                       break;
+               case st_got_dot:
+                       if (G_UNLIKELY (*p == '/')) {
+                               /* Remove any /./ or ./ paths */
+                               if (((o > path && *(o - 1) != '/') || (o == path)) && slash) {
+                                       /* Preserve one slash */
+                                       *o++ = '/';
+                               }
+
+                               slash = p;
+                               dot = NULL;
+                               /* Ignore last slash */
+                               state = st_normal;
+                       }
+                       else if (*p == '.') {
+                               /* Double dot character */
+                               state = st_got_dot_dot;
+                       }
+                       else {
+                               /* We have something like .some or /.some */
+                               if (dot && p > dot) {
+                                       if (slash == dot - 1 && (o > path && *(o - 1) != '/')) {
+                                               /* /.blah */
+                                               memmove (o, slash, p - slash);
+                                               o += p - slash;
+                                       }
+                                       else {
+                                               memmove (o, dot, p - dot);
+                                               o += p - dot;
+                                       }
+                               }
+
+                               slash = NULL;
+                               dot = NULL;
+                               state = st_normal;
+                               continue;
+                       }
+
+                       p ++;
+                       break;
+               case st_got_dot_dot:
+                       if (*p == '/') {
+                               /* We have something like /../ or ../ */
+                               if (slash) {
+                                       /* We need to remove the last component from o if it is there */
+                                       if (o > path + 2 && *(o - 1) == '/') {
+                                               slash = rspamd_memrchr (path, '/', o - path - 2);
+                                       }
+                                       else if (o > path + 1) {
+                                               slash = rspamd_memrchr (path, '/', o - path - 1);
+                                       }
+                                       else {
+                                               slash = NULL;
+                                       }
+
+                                       if (slash) {
+                                               o = (gchar *)slash;
+                                       }
+                                       /* Otherwise we keep these dots */
+                                       slash = p;
+                                       state = st_got_slash;
+                               }
+                               else {
+                                       /* We have something like bla../, so we need to copy it as is */
+                                       if (o > path && dot && p > dot) {
+                                               memmove (o, dot, p - dot);
+                                               o += p - dot;
+                                       }
+
+                                       slash = NULL;
+                                       dot = NULL;
+                                       state = st_normal;
+                                       continue;
+                               }
+                       }
+                       else {
+                               /* We have something like ..bla or ... */
+                               if (slash) {
+                                       *o ++ = '/';
+                               }
+
+                               if (dot && p > dot) {
+                                       memmove (o, dot, p - dot);
+                                       o += p - dot;
+                               }
+
+                               slash = NULL;
+                               dot = NULL;
+                               state = st_normal;
+                               continue;
+                       }
+
+                       p ++;
+                       break;
+               }
+       }
+
+       /* Leftover */
+       switch (state) {
+       case st_got_dot_dot:
+               /* Trailing .. */
+               if (slash) {
+                       /* We need to remove the last component from o if it is there */
+                       if (o > path + 2 && *(o - 1) == '/') {
+                               slash = rspamd_memrchr (path, '/', o - path - 2);
+                       }
+                       else if (o > path + 1) {
+                               slash = rspamd_memrchr (path, '/', o - path - 1);
+                       }
+                       else {
+                               if (o == path) {
+                                       /* Corner case */
+                                       *o++ = '/';
+                               }
+
+                               slash = NULL;
+                       }
+
+                       if (slash) {
+                               /* Remove last / */
+                               o = (gchar *)slash;
+                       }
+               }
+               else {
+                       /* Corner case */
+                       if (o == path) {
+                               *o++ = '/';
+                       }
+                       else {
+                               if (dot && p > dot) {
+                                       memmove (o, dot, p - dot);
+                                       o += p - dot;
+                               }
+                       }
+               }
+               break;
+       case st_got_slash:
+               *o++ = '/';
+               break;
+       default:
+               if (o > path + 1 && *(o - 1) == '/') {
+                       o --;
+               }
+               break;
+       }
+
+       if (nlen) {
+               *nlen = (o - path);
+       }
+}
+
+void
+rspamd_http_connection_disable_encryption (struct rspamd_http_connection *conn)
+{
+       struct rspamd_http_connection_private *priv;
+
+       priv = conn->priv;
+
+       if (priv) {
+               if (priv->local_key) {
+                       rspamd_keypair_unref (priv->local_key);
+               }
+               if (priv->peer_key) {
+                       rspamd_pubkey_unref (priv->peer_key);
+               }
+
+               priv->local_key = NULL;
+               priv->peer_key = NULL;
+               priv->flags &= ~RSPAMD_HTTP_CONN_FLAG_ENCRYPTED;
+       }
+}
\ No newline at end of file
diff --git a/src/libutil/http_connection.h b/src/libutil/http_connection.h
new file mode 100644 (file)
index 0000000..64a05bf
--- /dev/null
@@ -0,0 +1,578 @@
+/*-
+ * Copyright 2016 Vsevolod Stakhov
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+#ifndef HTTP_H_
+#define HTTP_H_
+
+/**
+ * @file http.h
+ *
+ * This is an interface for HTTP client and conn.
+ * This code uses HTTP parser written by Joyent Inc based on nginx code.
+ */
+
+#include "config.h"
+#include "http_parser.h"
+#include "keypair.h"
+#include "keypairs_cache.h"
+#include "fstring.h"
+#include "ref.h"
+
+enum rspamd_http_connection_type {
+       RSPAMD_HTTP_SERVER,
+       RSPAMD_HTTP_CLIENT
+};
+
+struct rspamd_http_header;
+struct rspamd_http_message;
+struct rspamd_http_connection_private;
+struct rspamd_http_connection;
+struct rspamd_http_connection_router;
+struct rspamd_http_connection_entry;
+
+struct rspamd_storage_shmem {
+       gchar *shm_name;
+       ref_entry_t ref;
+};
+
+/**
+ * Legacy spamc protocol
+ */
+#define RSPAMD_HTTP_FLAG_SPAMC (1 << 0)
+/**
+ * Store body of the message in a shared memory segment
+ */
+#define RSPAMD_HTTP_FLAG_SHMEM (1 << 2)
+/**
+ * Store body of the message in an immutable shared memory segment
+ */
+#define RSPAMD_HTTP_FLAG_SHMEM_IMMUTABLE (1 << 3)
+/**
+ * Use tls for this message
+ */
+#define RSPAMD_HTTP_FLAG_SSL (1 << 4)
+/**
+ * Body has been set for a message
+ */
+#define RSPAMD_HTTP_FLAG_HAS_BODY (1 << 5)
+/**
+ * Do not verify server's certificate
+ */
+#define RSPAMD_HTTP_FLAG_SSL_NOVERIFY (1 << 6)
+/**
+ * Options for HTTP connection
+ */
+enum rspamd_http_options {
+       RSPAMD_HTTP_BODY_PARTIAL = 0x1, /**< Call body handler on all body data portions *///!< RSPAMD_HTTP_BODY_PARTIAL
+       RSPAMD_HTTP_CLIENT_SIMPLE = 0x1u << 1, /**< Read HTTP client reply automatically */      //!< RSPAMD_HTTP_CLIENT_SIMPLE
+       RSPAMD_HTTP_CLIENT_ENCRYPTED = 0x1u << 2, /**< Encrypt data for client */                //!< RSPAMD_HTTP_CLIENT_ENCRYPTED
+       RSPAMD_HTTP_CLIENT_SHARED = 0x1u << 3, /**< Store reply in shared memory */              //!< RSPAMD_HTTP_CLIENT_SHARED
+       RSPAMD_HTTP_REQUIRE_ENCRYPTION = 0x1u << 4
+};
+
+typedef int (*rspamd_http_body_handler_t) (struct rspamd_http_connection *conn,
+               struct rspamd_http_message *msg,
+               const gchar *chunk,
+               gsize len);
+
+typedef void (*rspamd_http_error_handler_t) (struct rspamd_http_connection *conn,
+               GError *err);
+
+typedef int (*rspamd_http_finish_handler_t) (struct rspamd_http_connection *conn,
+               struct rspamd_http_message *msg);
+
+typedef int (*rspamd_http_router_handler_t) (struct rspamd_http_connection_entry
+               *conn_ent,
+               struct rspamd_http_message *msg);
+typedef void (*rspamd_http_router_error_handler_t) (struct
+               rspamd_http_connection_entry *conn_ent,
+               GError *err);
+typedef void (*rspamd_http_router_finish_handler_t) (struct
+               rspamd_http_connection_entry *conn_ent);
+
+/**
+ * HTTP connection structure
+ */
+struct rspamd_http_connection {
+       struct rspamd_http_connection_private *priv;
+       rspamd_http_body_handler_t body_handler;
+       rspamd_http_error_handler_t error_handler;
+       rspamd_http_finish_handler_t finish_handler;
+       struct rspamd_keypair_cache *cache;
+       gpointer ud;
+       gsize max_size;
+       unsigned opts;
+       enum rspamd_http_connection_type type;
+       gboolean finished;
+       gint fd;
+       gint ref;
+};
+
+struct rspamd_http_connection_entry {
+       struct rspamd_http_connection_router *rt;
+       struct rspamd_http_connection *conn;
+       gpointer ud;
+       gboolean is_reply;
+       gboolean support_gzip;
+       struct rspamd_http_connection_entry *prev, *next;
+};
+
+struct rspamd_http_connection_router {
+       struct rspamd_http_connection_entry *conns;
+       GHashTable *paths;
+       GHashTable *response_headers;
+       GPtrArray *regexps;
+       struct timeval tv;
+       struct timeval *ptv;
+       struct event_base *ev_base;
+       struct rspamd_keypair_cache *cache;
+       gchar *default_fs_path;
+       rspamd_http_router_handler_t unknown_method_handler;
+       struct rspamd_cryptobox_keypair *key;
+       rspamd_http_router_error_handler_t error_handler;
+       rspamd_http_router_finish_handler_t finish_handler;
+};
+
+/**
+ * Create new http connection
+ * @param handler_t handler_t for body
+ * @param opts options
+ * @return new connection structure
+ */
+struct rspamd_http_connection *rspamd_http_connection_new (
+               rspamd_http_body_handler_t body_handler,
+               rspamd_http_error_handler_t error_handler,
+               rspamd_http_finish_handler_t finish_handler,
+               unsigned opts,
+               enum rspamd_http_connection_type type,
+               struct rspamd_keypair_cache *cache,
+               gpointer ssl_ctx);
+
+
+/**
+ * Set key pointed by an opaque pointer
+ * @param conn connection structure
+ * @param key opaque key structure
+ */
+void rspamd_http_connection_set_key (struct rspamd_http_connection *conn,
+               struct rspamd_cryptobox_keypair *key);
+
+/**
+ * Get peer's public key
+ * @param conn connection structure
+ * @return pubkey structure or NULL
+ */
+const struct rspamd_cryptobox_pubkey* rspamd_http_connection_get_peer_key (
+               struct rspamd_http_connection *conn);
+
+/**
+ * Returns TRUE if a connection is encrypted
+ * @param conn
+ * @return
+ */
+gboolean rspamd_http_connection_is_encrypted (struct rspamd_http_connection *conn);
+
+/**
+ * Handle a request using socket fd and user data ud
+ * @param conn connection structure
+ * @param ud opaque user data
+ * @param fd fd to read/write
+ */
+void rspamd_http_connection_read_message (
+               struct rspamd_http_connection *conn,
+               gpointer ud,
+               gint fd,
+               struct timeval *timeout,
+               struct event_base *base);
+
+void rspamd_http_connection_read_message_shared (
+               struct rspamd_http_connection *conn,
+               gpointer ud,
+               gint fd,
+               struct timeval *timeout,
+               struct event_base *base);
+
+/**
+ * Send reply using initialised connection
+ * @param conn connection structure
+ * @param msg HTTP message
+ * @param ud opaque user data
+ * @param fd fd to read/write
+ */
+void rspamd_http_connection_write_message (
+               struct rspamd_http_connection *conn,
+               struct rspamd_http_message *msg,
+               const gchar *host,
+               const gchar *mime_type,
+               gpointer ud,
+               gint fd,
+               struct timeval *timeout,
+               struct event_base *base);
+
+void rspamd_http_connection_write_message_shared (
+               struct rspamd_http_connection *conn,
+               struct rspamd_http_message *msg,
+               const gchar *host,
+               const gchar *mime_type,
+               gpointer ud,
+               gint fd,
+               struct timeval *timeout,
+               struct event_base *base);
+
+/**
+ * Free connection structure
+ * @param conn
+ */
+void rspamd_http_connection_free (struct rspamd_http_connection *conn);
+
+/**
+ * Increase refcount for a connection
+ * @param conn
+ * @return
+ */
+static inline struct rspamd_http_connection *
+rspamd_http_connection_ref (struct rspamd_http_connection *conn)
+{
+       conn->ref++;
+       return conn;
+}
+
+/**
+ * Decrease a refcount for a connection and free it if refcount is equal to zero
+ * @param conn
+ */
+static void
+rspamd_http_connection_unref (struct rspamd_http_connection *conn)
+{
+       if (--conn->ref <= 0) {
+               rspamd_http_connection_free (conn);
+       }
+}
+
+/**
+ * Reset connection for a new request
+ * @param conn
+ */
+void rspamd_http_connection_reset (struct rspamd_http_connection *conn);
+
+/**
+ * Extract the current message from a connection to deal with separately
+ * @param conn
+ * @return
+ */
+struct rspamd_http_message * rspamd_http_connection_steal_msg (
+               struct rspamd_http_connection *conn);
+
+/**
+ * Copy the current message from a connection to deal with separately
+ * @param conn
+ * @return
+ */
+struct rspamd_http_message * rspamd_http_connection_copy_msg (
+               struct rspamd_http_message *msg, GError **err);
+
+/**
+ * Create new HTTP message
+ * @param type request or response
+ * @return new http message
+ */
+struct rspamd_http_message * rspamd_http_new_message (enum http_parser_type type);
+
+/**
+ * Increase refcount number for an HTTP message
+ * @param msg message to use
+ * @return
+ */
+struct rspamd_http_message * rspamd_http_message_ref (struct rspamd_http_message *msg);
+/**
+ * Decrease number of refcounts for http message
+ * @param msg
+ */
+void rspamd_http_message_unref (struct rspamd_http_message *msg);
+
+/**
+ * Sets a key for peer
+ * @param msg
+ * @param pk
+ */
+void rspamd_http_message_set_peer_key (struct rspamd_http_message *msg,
+               struct rspamd_cryptobox_pubkey *pk);
+/**
+ * Create HTTP message from URL
+ * @param url
+ * @return new message or NULL
+ */
+struct rspamd_http_message* rspamd_http_message_from_url (const gchar *url);
+
+/**
+ * Returns body for a message
+ * @param msg
+ * @param blen pointer where to save body length
+ * @return pointer to body start
+ */
+const gchar *rspamd_http_message_get_body (struct rspamd_http_message *msg,
+               gsize *blen);
+
+/**
+ * Set message's body from the string
+ * @param msg
+ * @param data
+ * @param len
+ * @return TRUE if a message's body has been set
+ */
+gboolean rspamd_http_message_set_body (struct rspamd_http_message *msg,
+               const gchar *data, gsize len);
+
+/**
+ * Set message's method by name
+ * @param msg
+ * @param method
+ */
+void rspamd_http_message_set_method (struct rspamd_http_message *msg,
+               const gchar *method);
+/**
+ * Maps fd as message's body
+ * @param msg
+ * @param fd
+ * @return TRUE if a message's body has been set
+ */
+gboolean rspamd_http_message_set_body_from_fd (struct rspamd_http_message *msg,
+               gint fd);
+
+/**
+ * Uses rspamd_fstring_t as message's body, string is consumed by this operation
+ * @param msg
+ * @param fstr
+ * @return TRUE if a message's body has been set
+ */
+gboolean rspamd_http_message_set_body_from_fstring_steal (struct rspamd_http_message *msg,
+               rspamd_fstring_t *fstr);
+
+/**
+ * Uses rspamd_fstring_t as message's body, string is copied by this operation
+ * @param msg
+ * @param fstr
+ * @return TRUE if a message's body has been set
+ */
+gboolean rspamd_http_message_set_body_from_fstring_copy (struct rspamd_http_message *msg,
+               const rspamd_fstring_t *fstr);
+
+/**
+ * Appends data to message's body
+ * @param msg
+ * @param data
+ * @param len
+ * @return TRUE if a message's body has been set
+ */
+gboolean rspamd_http_message_append_body (struct rspamd_http_message *msg,
+               const gchar *data, gsize len);
+
+/**
+ * Append a header to http message
+ * @param rep
+ * @param name
+ * @param value
+ */
+void rspamd_http_message_add_header (struct rspamd_http_message *msg,
+               const gchar *name,
+               const gchar *value);
+
+void rspamd_http_message_add_header_len (struct rspamd_http_message *msg,
+               const gchar *name,
+               const gchar *value,
+               gsize len);
+
+void rspamd_http_message_add_header_fstr (struct rspamd_http_message *msg,
+               const gchar *name,
+               rspamd_fstring_t *value);
+
+/**
+ * Search for a specified header in message
+ * @param msg message
+ * @param name name of header
+ */
+const rspamd_ftok_t * rspamd_http_message_find_header (
+               struct rspamd_http_message *msg,
+               const gchar *name);
+
+/**
+ * Search for a header that has multiple values
+ * @param msg
+ * @param name
+ * @return list of rspamd_ftok_t * with values
+ */
+GPtrArray* rspamd_http_message_find_header_multiple (
+               struct rspamd_http_message *msg,
+               const gchar *name);
+
+/**
+ * Remove specific header from a message
+ * @param msg
+ * @param name
+ * @return
+ */
+gboolean rspamd_http_message_remove_header (struct rspamd_http_message *msg,
+               const gchar *name);
+
+/**
+ * Free HTTP message
+ * @param msg
+ */
+void rspamd_http_message_free (struct rspamd_http_message *msg);
+
+/**
+ * Sets global maximum size for HTTP message being processed
+ * @param sz
+ */
+void rspamd_http_connection_set_max_size (struct rspamd_http_connection *conn,
+               gsize sz);
+
+void rspamd_http_connection_disable_encryption (struct rspamd_http_connection *conn);
+
+/**
+ * Increase refcount for shared file (if any) to prevent early memory unlinking
+ * @param msg
+ */
+struct rspamd_storage_shmem* rspamd_http_message_shmem_ref (struct rspamd_http_message *msg);
+/**
+ * Decrease external ref for shmem segment associated with a message
+ * @param msg
+ */
+void rspamd_http_message_shmem_unref (struct rspamd_storage_shmem *p);
+
+/**
+ * Returns message's flags
+ * @param msg
+ * @return
+ */
+guint rspamd_http_message_get_flags (struct rspamd_http_message *msg);
+
+/**
+ * Parse HTTP date header and return it as time_t
+ * @param header HTTP date header
+ * @param len length of header
+ * @return time_t or (time_t)-1 in case of error
+ */
+time_t rspamd_http_parse_date (const gchar *header, gsize len);
+
+/**
+ * Create new http connection router and the associated HTTP connection
+ * @param eh error handler callback
+ * @param fh finish handler callback
+ * @param default_fs_path if not NULL try to serve static files from
+ * the specified directory
+ * @return
+ */
+struct rspamd_http_connection_router * rspamd_http_router_new (
+               rspamd_http_router_error_handler_t eh,
+               rspamd_http_router_finish_handler_t fh,
+               struct timeval *timeout,
+               struct event_base *base,
+               const char *default_fs_path,
+               struct rspamd_keypair_cache *cache);
+
+/**
+ * Set encryption key for the HTTP router
+ * @param router router structure
+ * @param key opaque key structure
+ */
+void rspamd_http_router_set_key (struct rspamd_http_connection_router *router,
+               struct rspamd_cryptobox_keypair *key);
+
+/**
+ * Add new path to the router
+ */
+void rspamd_http_router_add_path (struct rspamd_http_connection_router *router,
+               const gchar *path, rspamd_http_router_handler_t handler);
+
+/**
+ * Add custom header to append to router replies
+ * @param router
+ * @param name
+ * @param value
+ */
+void rspamd_http_router_add_header (struct rspamd_http_connection_router *router,
+               const gchar *name, const gchar *value);
+
+/**
+ * Sets method to handle unknown request methods
+ * @param router
+ * @param handler
+ */
+void rspamd_http_router_set_unknown_handler (struct rspamd_http_connection_router *router,
+               rspamd_http_router_handler_t handler);
+
+/**
+ * Inserts router headers to the outbound message
+ * @param router
+ * @param msg
+ */
+void rspamd_http_router_insert_headers (struct rspamd_http_connection_router *router,
+               struct rspamd_http_message *msg);
+
+struct rspamd_regexp_s;
+/**
+ * Adds new pattern to router, regexp object is refcounted by this function
+ * @param router
+ * @param re
+ * @param handler
+ */
+void rspamd_http_router_add_regexp (struct rspamd_http_connection_router *router,
+               struct rspamd_regexp_s *re, rspamd_http_router_handler_t handler);
+/**
+ * Handle new accepted socket
+ * @param router router object
+ * @param fd server socket
+ * @param ud opaque userdata
+ */
+void rspamd_http_router_handle_socket (
+               struct rspamd_http_connection_router *router,
+               gint fd,
+               gpointer ud);
+
+/**
+ * Free router and all connections associated
+ * @param router
+ */
+void rspamd_http_router_free (struct rspamd_http_connection_router *router);
+
+/**
+ * Extract arguments from a message's URI contained inside query string decoding
+ * them if needed
+ * @param msg HTTP request message
+ * @return new GHashTable which maps rspamd_ftok_t* to rspamd_ftok_t*
+ * (table must be freed by a caller)
+ */
+GHashTable* rspamd_http_message_parse_query (struct rspamd_http_message *msg);
+
+/**
+ * Prints HTTP date from `time` to `buf` using standard HTTP date format
+ * @param buf date buffer
+ * @param len length of buffer
+ * @param time time in unix seconds
+ * @return number of bytes written
+ */
+glong rspamd_http_date_format (gchar *buf, gsize len, time_t time);
+
+/**
+ * Normalize HTTP path removing dot sequences and repeating '/' symbols as
+ * per rfc3986#section-5.2
+ * @param path
+ * @param len
+ * @param nlen
+ */
+void rspamd_http_normalize_path_inplace (gchar *path, guint len, guint *nlen);
+
+#endif /* HTTP_H_ */