Important changes to repositories hosted on mbed.com
Mbed hosted mercurial repositories are deprecated and are due to be permanently deleted in July 2026.
To keep a copy of this software download the repository Zip archive or clone locally using Mercurial.
It is also possible to export all your personal repositories from the account settings page.
Dependencies: CyaSSL
Dependents: MTS-Socket MTS-Socket
HTTPClient.cpp@39:d7c5541a9124, 2015-01-19 (annotated)
- Committer:
- Vanger
- Date:
- Mon Jan 19 21:55:15 2015 +0000
- Revision:
- 39:d7c5541a9124
- Parent:
- 38:a4ccad70be9d
- Child:
- 40:6d9725c3eb6f
Pulling in the newest CyaSSL lib (3.3.0).; Tweaked code to be more robust.
Who changed what in which revision?
| User | Revision | Line number | New contents of line | 
|---|---|---|---|
| donatien | 0:2ccb9960a044 | 1 | /* HTTPClient.cpp */ | 
| donatien | 10:e1351de84c16 | 2 | /* Copyright (C) 2012 mbed.org, MIT License | 
| donatien | 10:e1351de84c16 | 3 | * | 
| donatien | 10:e1351de84c16 | 4 | * Permission is hereby granted, free of charge, to any person obtaining a copy of this software | 
| donatien | 10:e1351de84c16 | 5 | * and associated documentation files (the "Software"), to deal in the Software without restriction, | 
| donatien | 10:e1351de84c16 | 6 | * including without limitation the rights to use, copy, modify, merge, publish, distribute, | 
| donatien | 10:e1351de84c16 | 7 | * sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is | 
| donatien | 10:e1351de84c16 | 8 | * furnished to do so, subject to the following conditions: | 
| donatien | 10:e1351de84c16 | 9 | * | 
| donatien | 10:e1351de84c16 | 10 | * The above copyright notice and this permission notice shall be included in all copies or | 
| donatien | 10:e1351de84c16 | 11 | * substantial portions of the Software. | 
| donatien | 10:e1351de84c16 | 12 | * | 
| donatien | 10:e1351de84c16 | 13 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING | 
| donatien | 10:e1351de84c16 | 14 | * BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND | 
| donatien | 10:e1351de84c16 | 15 | * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, | 
| donatien | 10:e1351de84c16 | 16 | * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | 
| donatien | 10:e1351de84c16 | 17 | * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. | 
| donatien | 10:e1351de84c16 | 18 | */ | 
| ansond | 29:2d96cc752d19 | 19 | |
| ansond | 29:2d96cc752d19 | 20 | // DMA: Added tunable to adapt size of larger input URLs | 
| ansond | 29:2d96cc752d19 | 21 | #define MAX_URL_HOSTNAME_LENGTH 128 | 
| ansond | 29:2d96cc752d19 | 22 | #define MAX_URL_PATH_LENGTH 128 | 
| donatien | 0:2ccb9960a044 | 23 | |
| donatien | 7:4e39864f7b15 | 24 | //Debug is disabled by default | 
| Vanger | 39:d7c5541a9124 | 25 | #if 1 | 
| donatien | 12:89d09a6db00a | 26 | //Enable debug | 
| donatien | 11:390362de8c3f | 27 | #include <cstdio> | 
| wolfSSL | 18:d89df40b4cf3 | 28 | #define DBG(x, ...) std::printf("[HTTPClient : DBG]"x"\r\n", ##__VA_ARGS__); | 
| wolfSSL | 18:d89df40b4cf3 | 29 | #define WARN(x, ...) std::printf("[HTTPClient : WARN]"x"\r\n", ##__VA_ARGS__); | 
| wolfSSL | 18:d89df40b4cf3 | 30 | #define ERR(x, ...) std::printf("[HTTPClient : ERR]"x"\r\n", ##__VA_ARGS__); | 
| donatien | 12:89d09a6db00a | 31 | |
| donatien | 12:89d09a6db00a | 32 | #else | 
| donatien | 12:89d09a6db00a | 33 | //Disable debug | 
| wolfSSL | 18:d89df40b4cf3 | 34 | #define DBG(x, ...) | 
| donatien | 12:89d09a6db00a | 35 | #define WARN(x, ...) | 
| wolfSSL | 18:d89df40b4cf3 | 36 | #define ERR(x, ...) | 
| donatien | 12:89d09a6db00a | 37 | |
| donatien | 7:4e39864f7b15 | 38 | #endif | 
| donatien | 0:2ccb9960a044 | 39 | |
| donatien | 0:2ccb9960a044 | 40 | #define HTTP_PORT 80 | 
| wolfSSL | 17:c73d8e61d391 | 41 | #define HTTPS_PORT 443 | 
| donatien | 0:2ccb9960a044 | 42 | |
| donatien | 11:390362de8c3f | 43 | #define OK 0 | 
| donatien | 11:390362de8c3f | 44 | |
| donatien | 11:390362de8c3f | 45 | #define MIN(x,y) (((x)<(y))?(x):(y)) | 
| donatien | 11:390362de8c3f | 46 | #define MAX(x,y) (((x)>(y))?(x):(y)) | 
| donatien | 11:390362de8c3f | 47 | |
| wolfSSL | 17:c73d8e61d391 | 48 | #include <cstring> | 
| donatien | 0:2ccb9960a044 | 49 | |
| wolfSSL | 17:c73d8e61d391 | 50 | #include <../CyaSSL/cyassl/ctaocrypt/settings.h> | 
| wolfSSL | 17:c73d8e61d391 | 51 | #include <../CyaSSL/cyassl/ctaocrypt/types.h> | 
| wolfSSL | 17:c73d8e61d391 | 52 | #include <../CyaSSL/cyassl/internal.h> | 
| wolfSSL | 17:c73d8e61d391 | 53 | #include <../CyaSSL/cyassl/ssl.h> | 
| donatien | 0:2ccb9960a044 | 54 | |
| donatien | 11:390362de8c3f | 55 | #include "HTTPClient.h" | 
| wolfSSL | 17:c73d8e61d391 | 56 | |
| Vanger | 33:3b2809748a9e | 57 | static TCPSocketConnection* m_sock; | 
| wolfSSL | 17:c73d8e61d391 | 58 | #define CHUNK_SIZE 256 | 
| ansond | 32:d9db238bb8a3 | 59 | #define SEND_BUF_SIZE 1024 | 
| wolfSSL | 17:c73d8e61d391 | 60 | static char send_buf[SEND_BUF_SIZE] ; | 
| ansond | 32:d9db238bb8a3 | 61 | static char *send_buf_p = NULL; | 
| wolfSSL | 17:c73d8e61d391 | 62 | |
| wolfSSL | 17:c73d8e61d391 | 63 | static int SocketReceive(CYASSL* ssl, char *buf, int sz, void *ctx) | 
| wolfSSL | 17:c73d8e61d391 | 64 | { | 
| wolfSSL | 17:c73d8e61d391 | 65 | int n ; | 
| wolfSSL | 17:c73d8e61d391 | 66 | int i ; | 
| wolfSSL | 18:d89df40b4cf3 | 67 | #define RECV_RETRY 3 | 
| wolfSSL | 22:4b9a4151cc73 | 68 | |
| wolfSSL | 17:c73d8e61d391 | 69 | for(i=0; i<RECV_RETRY; i++) { | 
| Vanger | 33:3b2809748a9e | 70 | n = m_sock->receive(buf, sz) ; | 
| wolfSSL | 17:c73d8e61d391 | 71 | if(n >= 0)return n ; | 
| wolfSSL | 22:4b9a4151cc73 | 72 | wait(0.2) ; | 
| wolfSSL | 17:c73d8e61d391 | 73 | } | 
| wolfSSL | 17:c73d8e61d391 | 74 | ERR("SocketReceive:%d/%d\n", n, sz) ; | 
| wolfSSL | 17:c73d8e61d391 | 75 | return n ; | 
| wolfSSL | 17:c73d8e61d391 | 76 | } | 
| wolfSSL | 17:c73d8e61d391 | 77 | |
| wolfSSL | 17:c73d8e61d391 | 78 | static int SocketSend(CYASSL* ssl, char *buf, int sz, void *ctx) | 
| wolfSSL | 17:c73d8e61d391 | 79 | { | 
| wolfSSL | 17:c73d8e61d391 | 80 | int n ; | 
| Vanger | 34:13920d48893d | 81 | |
| Vanger | 34:13920d48893d | 82 | wait(0.1); | 
| Vanger | 33:3b2809748a9e | 83 | n = m_sock->send(buf, sz); | 
| wolfSSL | 17:c73d8e61d391 | 84 | if(n > 0) { | 
| Vanger | 34:13920d48893d | 85 | wait(0.3); | 
| Vanger | 34:13920d48893d | 86 | return n; | 
| Vanger | 34:13920d48893d | 87 | } else { | 
| Vanger | 34:13920d48893d | 88 | ERR("SocketSend:%d/%d\n", n, sz); | 
| Vanger | 34:13920d48893d | 89 | } | 
| Vanger | 34:13920d48893d | 90 | return n; | 
| wolfSSL | 17:c73d8e61d391 | 91 | } | 
| donatien | 11:390362de8c3f | 92 | |
| wolfSSL | 22:4b9a4151cc73 | 93 | static void base64enc(char *out, const char *in) { | 
| wolfSSL | 22:4b9a4151cc73 | 94 | const char code[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=" ; | 
| wolfSSL | 22:4b9a4151cc73 | 95 | int i = 0, x = 0, l = 0; | 
| wolfSSL | 22:4b9a4151cc73 | 96 | |
| wolfSSL | 22:4b9a4151cc73 | 97 | for (; *in; in++) { | 
| wolfSSL | 22:4b9a4151cc73 | 98 | x = x << 8 | *in; | 
| wolfSSL | 22:4b9a4151cc73 | 99 | for (l += 8; l >= 6; l -= 6) { | 
| wolfSSL | 22:4b9a4151cc73 | 100 | out[i++] = code[(x >> (l - 6)) & 0x3f]; | 
| wolfSSL | 22:4b9a4151cc73 | 101 | } | 
| wolfSSL | 22:4b9a4151cc73 | 102 | } | 
| wolfSSL | 22:4b9a4151cc73 | 103 | if (l > 0) { | 
| wolfSSL | 22:4b9a4151cc73 | 104 | x <<= 6 - l; | 
| wolfSSL | 22:4b9a4151cc73 | 105 | out[i++] = code[x & 0x3f]; | 
| wolfSSL | 22:4b9a4151cc73 | 106 | } | 
| wolfSSL | 22:4b9a4151cc73 | 107 | for (; i % 4;) { | 
| wolfSSL | 22:4b9a4151cc73 | 108 | out[i++] = '='; | 
| wolfSSL | 22:4b9a4151cc73 | 109 | } | 
| wolfSSL | 22:4b9a4151cc73 | 110 | out[i] = '\0' ; | 
| wolfSSL | 22:4b9a4151cc73 | 111 | } | 
| wolfSSL | 22:4b9a4151cc73 | 112 | |
| donatien | 0:2ccb9960a044 | 113 | HTTPClient::HTTPClient() : | 
| wolfSSL | 18:d89df40b4cf3 | 114 | m_basicAuthUser(NULL), m_basicAuthPassword(NULL), m_httpResponseCode(0) | 
| donatien | 0:2ccb9960a044 | 115 | { | 
| Vanger | 38:a4ccad70be9d | 116 | set_time(1421106306); | 
| Vanger | 38:a4ccad70be9d | 117 | |
| Vanger | 38:a4ccad70be9d | 118 | CyaSSL_Init(); //Initialize CyaSSL | 
| Vanger | 38:a4ccad70be9d | 119 | |
| Vanger | 33:3b2809748a9e | 120 | m_sock = &_m_sock; | 
| Vanger | 39:d7c5541a9124 | 121 | // CyaSSL_Debugging_ON() ; //Turn on if the CyaSSL library isn't working, for debug printf's | 
| wolfSSL | 22:4b9a4151cc73 | 122 | |
| Vanger | 39:d7c5541a9124 | 123 | peerMethod = VERIFY_PEER; | 
| wolfSSL | 18:d89df40b4cf3 | 124 | ctx = 0 ; | 
| wolfSSL | 18:d89df40b4cf3 | 125 | ssl = 0 ; | 
| wolfSSL | 22:4b9a4151cc73 | 126 | SSLver = 3 ; | 
| Vanger | 38:a4ccad70be9d | 127 | certificates = NULL; | 
| wolfSSL | 27:5d4739eae63e | 128 | redirect_url = NULL ; | 
| wolfSSL | 27:5d4739eae63e | 129 | redirect = 0 ; | 
| wolfSSL | 27:5d4739eae63e | 130 | header = NULL ; | 
| donatien | 0:2ccb9960a044 | 131 | } | 
| donatien | 0:2ccb9960a044 | 132 | |
| donatien | 0:2ccb9960a044 | 133 | HTTPClient::~HTTPClient() | 
| donatien | 0:2ccb9960a044 | 134 | { | 
| Vanger | 38:a4ccad70be9d | 135 | free((void *)m_basicAuthPassword); | 
| Vanger | 38:a4ccad70be9d | 136 | m_basicAuthPassword = NULL; | 
| Vanger | 38:a4ccad70be9d | 137 | free((void *)m_basicAuthUser); | 
| Vanger | 38:a4ccad70be9d | 138 | m_basicAuthUser = NULL; | 
| Vanger | 38:a4ccad70be9d | 139 | free((void *)certificates); | 
| Vanger | 38:a4ccad70be9d | 140 | certificates = NULL; | 
| donatien | 0:2ccb9960a044 | 141 | } | 
| donatien | 0:2ccb9960a044 | 142 | |
| wolfSSL | 22:4b9a4151cc73 | 143 | HTTPResult HTTPClient::basicAuth(const char* user, const char* password) //Basic Authentification | 
| donatien | 0:2ccb9960a044 | 144 | { | 
| wolfSSL | 22:4b9a4151cc73 | 145 | #define AUTHB_SIZE 128 | 
| wolfSSL | 22:4b9a4151cc73 | 146 | if((strlen(user) + strlen(password)) >= AUTHB_SIZE) | 
| wolfSSL | 22:4b9a4151cc73 | 147 | return HTTP_ERROR ; | 
| ansond | 30:6fef375c94e6 | 148 | |
| ansond | 30:6fef375c94e6 | 149 | if (m_basicAuthUser) free((void *)m_basicAuthUser); | 
| ansond | 30:6fef375c94e6 | 150 | if (user != NULL) { | 
| ansond | 30:6fef375c94e6 | 151 | m_basicAuthUser = (char *)malloc(strlen(user)+1); | 
| ansond | 30:6fef375c94e6 | 152 | strcpy((char *)m_basicAuthUser, user); | 
| Vanger | 38:a4ccad70be9d | 153 | } else { | 
| Vanger | 38:a4ccad70be9d | 154 | m_basicAuthUser = NULL; | 
| ansond | 30:6fef375c94e6 | 155 | } | 
| ansond | 30:6fef375c94e6 | 156 | |
| ansond | 30:6fef375c94e6 | 157 | if (m_basicAuthPassword) free((void *)m_basicAuthPassword); | 
| ansond | 30:6fef375c94e6 | 158 | if (password != NULL) { | 
| ansond | 30:6fef375c94e6 | 159 | m_basicAuthPassword = (char *)malloc(strlen(password)+1); | 
| ansond | 30:6fef375c94e6 | 160 | strcpy((char *)m_basicAuthPassword, password); | 
| Vanger | 38:a4ccad70be9d | 161 | } else { | 
| Vanger | 38:a4ccad70be9d | 162 | m_basicAuthPassword = NULL; | 
| Vanger | 38:a4ccad70be9d | 163 | } | 
| ansond | 30:6fef375c94e6 | 164 | |
| wolfSSL | 22:4b9a4151cc73 | 165 | return HTTP_OK ; | 
| donatien | 0:2ccb9960a044 | 166 | } | 
| donatien | 0:2ccb9960a044 | 167 | |
| donatien | 12:89d09a6db00a | 168 | HTTPResult HTTPClient::get(const char* url, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking | 
| donatien | 0:2ccb9960a044 | 169 | { | 
| wolfSSL | 18:d89df40b4cf3 | 170 | return connect(url, HTTP_GET, NULL, pDataIn, timeout); | 
| donatien | 0:2ccb9960a044 | 171 | } | 
| donatien | 0:2ccb9960a044 | 172 | |
| donatien | 12:89d09a6db00a | 173 | HTTPResult HTTPClient::get(const char* url, char* result, size_t maxResultLen, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking | 
| donatien | 0:2ccb9960a044 | 174 | { | 
| wolfSSL | 18:d89df40b4cf3 | 175 | HTTPText str(result, maxResultLen); | 
| wolfSSL | 18:d89df40b4cf3 | 176 | return get(url, &str, timeout); | 
| donatien | 0:2ccb9960a044 | 177 | } | 
| donatien | 0:2ccb9960a044 | 178 | |
| donatien | 12:89d09a6db00a | 179 | HTTPResult HTTPClient::post(const char* url, const IHTTPDataOut& dataOut, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking | 
| donatien | 0:2ccb9960a044 | 180 | { | 
| wolfSSL | 18:d89df40b4cf3 | 181 | return connect(url, HTTP_POST, (IHTTPDataOut*)&dataOut, pDataIn, timeout); | 
| donatien | 0:2ccb9960a044 | 182 | } | 
| donatien | 0:2ccb9960a044 | 183 | |
| donatien | 16:1f743885e7de | 184 | HTTPResult HTTPClient::put(const char* url, const IHTTPDataOut& dataOut, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking | 
| donatien | 16:1f743885e7de | 185 | { | 
| wolfSSL | 18:d89df40b4cf3 | 186 | return connect(url, HTTP_PUT, (IHTTPDataOut*)&dataOut, pDataIn, timeout); | 
| donatien | 16:1f743885e7de | 187 | } | 
| donatien | 16:1f743885e7de | 188 | |
| donatien | 16:1f743885e7de | 189 | HTTPResult HTTPClient::del(const char* url, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking | 
| donatien | 16:1f743885e7de | 190 | { | 
| wolfSSL | 18:d89df40b4cf3 | 191 | return connect(url, HTTP_DELETE, NULL, pDataIn, timeout); | 
| donatien | 16:1f743885e7de | 192 | } | 
| donatien | 16:1f743885e7de | 193 | |
| donatien | 16:1f743885e7de | 194 | |
| donatien | 0:2ccb9960a044 | 195 | int HTTPClient::getHTTPResponseCode() | 
| donatien | 0:2ccb9960a044 | 196 | { | 
| wolfSSL | 18:d89df40b4cf3 | 197 | return m_httpResponseCode; | 
| donatien | 0:2ccb9960a044 | 198 | } | 
| donatien | 0:2ccb9960a044 | 199 | |
| wolfSSL | 27:5d4739eae63e | 200 | void HTTPClient::setHeader(const char * h) | 
| wolfSSL | 17:c73d8e61d391 | 201 | { | 
| wolfSSL | 17:c73d8e61d391 | 202 | header = h ; | 
| wolfSSL | 17:c73d8e61d391 | 203 | } | 
| wolfSSL | 17:c73d8e61d391 | 204 | |
| wolfSSL | 27:5d4739eae63e | 205 | void HTTPClient::setLocationBuf(char * url, int size) | 
| wolfSSL | 27:5d4739eae63e | 206 | { | 
| wolfSSL | 27:5d4739eae63e | 207 | redirect_url = url ; | 
| wolfSSL | 27:5d4739eae63e | 208 | redirect_url_size = size ; | 
| wolfSSL | 27:5d4739eae63e | 209 | } | 
| wolfSSL | 27:5d4739eae63e | 210 | |
| wolfSSL | 22:4b9a4151cc73 | 211 | HTTPResult HTTPClient::setSSLversion(int minorV) | 
| wolfSSL | 22:4b9a4151cc73 | 212 | { | 
| wolfSSL | 22:4b9a4151cc73 | 213 | if((minorV>=0) && (minorV<=3)) | 
| wolfSSL | 22:4b9a4151cc73 | 214 | SSLver = minorV ; | 
| wolfSSL | 22:4b9a4151cc73 | 215 | else return HTTP_ERROR ; | 
| wolfSSL | 22:4b9a4151cc73 | 216 | return HTTP_OK ; | 
| wolfSSL | 22:4b9a4151cc73 | 217 | } | 
| wolfSSL | 22:4b9a4151cc73 | 218 | |
| Vanger | 38:a4ccad70be9d | 219 | HTTPResult HTTPClient::addRootCACertificate(const char* cert) | 
| Vanger | 38:a4ccad70be9d | 220 | { | 
| Vanger | 38:a4ccad70be9d | 221 | if(cert == NULL) { | 
| Vanger | 38:a4ccad70be9d | 222 | if(certificates != NULL) { | 
| Vanger | 38:a4ccad70be9d | 223 | free((void *)certificates); | 
| Vanger | 38:a4ccad70be9d | 224 | } | 
| Vanger | 38:a4ccad70be9d | 225 | } else { | 
| Vanger | 38:a4ccad70be9d | 226 | //Append certificate, else allocate new certificate | 
| Vanger | 38:a4ccad70be9d | 227 | if(certificates != NULL) { | 
| Vanger | 38:a4ccad70be9d | 228 | certificates = (char *)realloc((void *)certificates, strlen(cert) + 1 + strlen(certificates)); //+1 is for '\0' char | 
| Vanger | 38:a4ccad70be9d | 229 | if(certificates == NULL) { | 
| Vanger | 38:a4ccad70be9d | 230 | return HTTP_ERROR; | 
| Vanger | 38:a4ccad70be9d | 231 | } else { | 
| Vanger | 38:a4ccad70be9d | 232 | strcat((char *)certificates, cert); | 
| Vanger | 38:a4ccad70be9d | 233 | } | 
| Vanger | 38:a4ccad70be9d | 234 | } else { | 
| Vanger | 38:a4ccad70be9d | 235 | certificates = (char *)malloc(strlen(cert) + 1); | 
| Vanger | 38:a4ccad70be9d | 236 | if(certificates == NULL) { | 
| Vanger | 38:a4ccad70be9d | 237 | return HTTP_ERROR; | 
| Vanger | 38:a4ccad70be9d | 238 | } else { | 
| Vanger | 38:a4ccad70be9d | 239 | strcpy((char *)certificates, cert); | 
| Vanger | 38:a4ccad70be9d | 240 | } | 
| Vanger | 38:a4ccad70be9d | 241 | } | 
| Vanger | 38:a4ccad70be9d | 242 | } | 
| Vanger | 38:a4ccad70be9d | 243 | return HTTP_OK; | 
| Vanger | 38:a4ccad70be9d | 244 | } | 
| Vanger | 38:a4ccad70be9d | 245 | |
| Vanger | 38:a4ccad70be9d | 246 | void HTTPClient::setPeerVerification(SSLMethod method) { | 
| Vanger | 39:d7c5541a9124 | 247 | if(method != VERIFY_NONE && method != VERIFY_PEER) { | 
| Vanger | 39:d7c5541a9124 | 248 | ERR("That is not an acceptable verification choice"); | 
| Vanger | 39:d7c5541a9124 | 249 | } else { | 
| Vanger | 39:d7c5541a9124 | 250 | peerMethod = method; | 
| Vanger | 39:d7c5541a9124 | 251 | } | 
| Vanger | 38:a4ccad70be9d | 252 | } | 
| Vanger | 38:a4ccad70be9d | 253 | |
| wolfSSL | 17:c73d8e61d391 | 254 | |
| donatien | 5:791fc3dcb6c4 | 255 | #define CHECK_CONN_ERR(ret) \ | 
| donatien | 5:791fc3dcb6c4 | 256 | do{ \ | 
| donatien | 7:4e39864f7b15 | 257 | if(ret) { \ | 
| wolfSSL | 17:c73d8e61d391 | 258 | cyassl_free() ;\ | 
| Vanger | 33:3b2809748a9e | 259 | m_sock->close(); \ | 
| donatien | 5:791fc3dcb6c4 | 260 | ERR("Connection error (%d)", ret); \ | 
| donatien | 11:390362de8c3f | 261 | return HTTP_CONN; \ | 
| donatien | 5:791fc3dcb6c4 | 262 | } \ | 
| donatien | 5:791fc3dcb6c4 | 263 | } while(0) | 
| donatien | 5:791fc3dcb6c4 | 264 | |
| donatien | 5:791fc3dcb6c4 | 265 | #define PRTCL_ERR() \ | 
| donatien | 5:791fc3dcb6c4 | 266 | do{ \ | 
| wolfSSL | 17:c73d8e61d391 | 267 | cyassl_free() ;\ | 
| Vanger | 33:3b2809748a9e | 268 | m_sock->close(); \ | 
| donatien | 5:791fc3dcb6c4 | 269 | ERR("Protocol error"); \ | 
| donatien | 11:390362de8c3f | 270 | return HTTP_PRTCL; \ | 
| donatien | 5:791fc3dcb6c4 | 271 | } while(0) | 
| donatien | 0:2ccb9960a044 | 272 | |
| wolfSSL | 17:c73d8e61d391 | 273 | void HTTPClient::cyassl_free(void) | 
| wolfSSL | 17:c73d8e61d391 | 274 | { | 
| wolfSSL | 19:1e2f05809eb1 | 275 | if(ssl) { | 
| wolfSSL | 17:c73d8e61d391 | 276 | CyaSSL_free(ssl) ; | 
| wolfSSL | 19:1e2f05809eb1 | 277 | ssl = NULL ; | 
| wolfSSL | 19:1e2f05809eb1 | 278 | } | 
| wolfSSL | 19:1e2f05809eb1 | 279 | if(ctx) { | 
| wolfSSL | 17:c73d8e61d391 | 280 | CyaSSL_CTX_free(ctx) ; | 
| wolfSSL | 19:1e2f05809eb1 | 281 | ctx = NULL ; | 
| wolfSSL | 19:1e2f05809eb1 | 282 | } | 
| wolfSSL | 22:4b9a4151cc73 | 283 | CyaSSL_Cleanup() ; | 
| wolfSSL | 22:4b9a4151cc73 | 284 | } | 
| wolfSSL | 17:c73d8e61d391 | 285 | |
| donatien | 12:89d09a6db00a | 286 | HTTPResult HTTPClient::connect(const char* url, HTTP_METH method, IHTTPDataOut* pDataOut, IHTTPDataIn* pDataIn, int timeout) //Execute request | 
| wolfSSL | 18:d89df40b4cf3 | 287 | { | 
| Vanger | 33:3b2809748a9e | 288 | CYASSL_METHOD * SSLmethod = 0; | 
| wolfSSL | 18:d89df40b4cf3 | 289 | m_httpResponseCode = 0; //Invalidate code | 
| wolfSSL | 18:d89df40b4cf3 | 290 | m_timeout = timeout; | 
| wolfSSL | 27:5d4739eae63e | 291 | redirect = 0 ; | 
| wolfSSL | 27:5d4739eae63e | 292 | |
| wolfSSL | 18:d89df40b4cf3 | 293 | pDataIn->writeReset(); | 
| wolfSSL | 18:d89df40b4cf3 | 294 | if( pDataOut ) { | 
| wolfSSL | 18:d89df40b4cf3 | 295 | pDataOut->readReset(); | 
| wolfSSL | 18:d89df40b4cf3 | 296 | } | 
| wolfSSL | 17:c73d8e61d391 | 297 | |
| wolfSSL | 18:d89df40b4cf3 | 298 | char scheme[8]; | 
| ansond | 29:2d96cc752d19 | 299 | char host[MAX_URL_HOSTNAME_LENGTH]; | 
| ansond | 29:2d96cc752d19 | 300 | char path[MAX_URL_PATH_LENGTH]; | 
| wolfSSL | 18:d89df40b4cf3 | 301 | |
| wolfSSL | 18:d89df40b4cf3 | 302 | int ret ; | 
| donatien | 0:2ccb9960a044 | 303 | |
| wolfSSL | 18:d89df40b4cf3 | 304 | //First we need to parse the url (http[s]://host[:port][/[path]]) | 
| wolfSSL | 18:d89df40b4cf3 | 305 | HTTPResult res = parseURL(url, scheme, sizeof(scheme), host, sizeof(host), &port, path, sizeof(path)); | 
| wolfSSL | 18:d89df40b4cf3 | 306 | if(res != HTTP_OK) { | 
| wolfSSL | 18:d89df40b4cf3 | 307 | ERR("parseURL returned %d", res); | 
| wolfSSL | 18:d89df40b4cf3 | 308 | return res; | 
| wolfSSL | 18:d89df40b4cf3 | 309 | } | 
| donatien | 0:2ccb9960a044 | 310 | |
| wolfSSL | 22:4b9a4151cc73 | 311 | if(port == 0) { | 
| wolfSSL | 18:d89df40b4cf3 | 312 | if(strcmp(scheme, "http") == 0) | 
| wolfSSL | 18:d89df40b4cf3 | 313 | port = HTTP_PORT ; | 
| wolfSSL | 18:d89df40b4cf3 | 314 | else if(strcmp(scheme, "https") == 0) | 
| wolfSSL | 18:d89df40b4cf3 | 315 | port = HTTPS_PORT ; | 
| wolfSSL | 18:d89df40b4cf3 | 316 | } | 
| donatien | 0:2ccb9960a044 | 317 | |
| wolfSSL | 18:d89df40b4cf3 | 318 | DBG("Scheme: %s", scheme); | 
| wolfSSL | 18:d89df40b4cf3 | 319 | DBG("Host: %s", host); | 
| wolfSSL | 18:d89df40b4cf3 | 320 | DBG("Port: %d", port); | 
| wolfSSL | 18:d89df40b4cf3 | 321 | DBG("Path: %s", path); | 
| wolfSSL | 17:c73d8e61d391 | 322 | |
| wolfSSL | 18:d89df40b4cf3 | 323 | //Connect | 
| wolfSSL | 18:d89df40b4cf3 | 324 | DBG("Connecting socket to server"); | 
| wolfSSL | 18:d89df40b4cf3 | 325 | |
| wolfSSL | 18:d89df40b4cf3 | 326 | #define MAX_RETRY 5 | 
| wolfSSL | 18:d89df40b4cf3 | 327 | int retry ; | 
| donatien | 0:2ccb9960a044 | 328 | |
| wolfSSL | 18:d89df40b4cf3 | 329 | for(retry=0; retry<MAX_RETRY; retry++) { | 
| Vanger | 33:3b2809748a9e | 330 | int ret = m_sock->connect(host, port); | 
| wolfSSL | 18:d89df40b4cf3 | 331 | if(ret == 0)break ; | 
| Vanger | 34:13920d48893d | 332 | if(m_sock->is_connected()) { | 
| Vanger | 34:13920d48893d | 333 | m_sock->close(true); | 
| Vanger | 34:13920d48893d | 334 | } | 
| wolfSSL | 17:c73d8e61d391 | 335 | } | 
| wolfSSL | 18:d89df40b4cf3 | 336 | if(retry == MAX_RETRY) { | 
| Vanger | 33:3b2809748a9e | 337 | m_sock->close(); | 
| wolfSSL | 18:d89df40b4cf3 | 338 | ERR("Could not connect"); | 
| wolfSSL | 18:d89df40b4cf3 | 339 | return HTTP_CONN; | 
| wolfSSL | 17:c73d8e61d391 | 340 | } | 
| wolfSSL | 17:c73d8e61d391 | 341 | |
| wolfSSL | 18:d89df40b4cf3 | 342 | if(port == HTTPS_PORT) { | 
| wolfSSL | 22:4b9a4151cc73 | 343 | |
| wolfSSL | 18:d89df40b4cf3 | 344 | /* Start SSL connect */ | 
| wolfSSL | 27:5d4739eae63e | 345 | DBG("SSLver=%d", SSLver) ; | 
| wolfSSL | 19:1e2f05809eb1 | 346 | if(ctx == NULL) { | 
| wolfSSL | 22:4b9a4151cc73 | 347 | switch(SSLver) { | 
| wolfSSL | 22:4b9a4151cc73 | 348 | case 0 : SSLmethod = CyaSSLv3_client_method() ; break ; | 
| wolfSSL | 22:4b9a4151cc73 | 349 | case 1 : SSLmethod = CyaTLSv1_client_method() ; break ; | 
| wolfSSL | 22:4b9a4151cc73 | 350 | case 2 : SSLmethod = CyaTLSv1_1_client_method() ; break ; | 
| Vanger | 38:a4ccad70be9d | 351 | case 3 : SSLmethod = CyaTLSv1_2_client_method() ; break ; | 
| wolfSSL | 22:4b9a4151cc73 | 352 | } | 
| wolfSSL | 22:4b9a4151cc73 | 353 | ctx = CyaSSL_CTX_new((CYASSL_METHOD *)SSLmethod); | 
| wolfSSL | 19:1e2f05809eb1 | 354 | if (ctx == NULL) { | 
| wolfSSL | 19:1e2f05809eb1 | 355 | ERR("unable to get ctx"); | 
| wolfSSL | 19:1e2f05809eb1 | 356 | return HTTP_CONN; | 
| wolfSSL | 19:1e2f05809eb1 | 357 | } | 
| Vanger | 38:a4ccad70be9d | 358 | |
| Vanger | 38:a4ccad70be9d | 359 | if(certificates == NULL && peerMethod != VERIFY_NONE) { | 
| Vanger | 38:a4ccad70be9d | 360 | ERR("No certificates passed for peer verification"); | 
| Vanger | 38:a4ccad70be9d | 361 | return HTTP_PROCESSING; | 
| Vanger | 38:a4ccad70be9d | 362 | } | 
| Vanger | 38:a4ccad70be9d | 363 | |
| Vanger | 39:d7c5541a9124 | 364 | //SSL setup if being used | 
| Vanger | 38:a4ccad70be9d | 365 | { //Localize pMethod array for less overall memory time-use | 
| Vanger | 38:a4ccad70be9d | 366 | std::string pMethod; | 
| Vanger | 38:a4ccad70be9d | 367 | if(peerMethod == VERIFY_NONE) { | 
| Vanger | 38:a4ccad70be9d | 368 | pMethod = "not verify peer"; | 
| Vanger | 38:a4ccad70be9d | 369 | } else if (peerMethod == VERIFY_PEER) { | 
| Vanger | 38:a4ccad70be9d | 370 | pMethod = "verify peer if certificates available"; | 
| Vanger | 39:d7c5541a9124 | 371 | //Load the CA certificate(s) (If using multiple, concatenate them in the buffer being passed) | 
| Vanger | 39:d7c5541a9124 | 372 | if(certificates != NULL) { | 
| Vanger | 39:d7c5541a9124 | 373 | if (SSL_SUCCESS != CyaSSL_CTX_load_verify_buffer(ctx, (const unsigned char*)certificates, strlen(certificates), SSL_FILETYPE_PEM)) { | 
| Vanger | 39:d7c5541a9124 | 374 | ERR("unable to load root certificates"); | 
| Vanger | 39:d7c5541a9124 | 375 | return HTTP_CONN; | 
| Vanger | 39:d7c5541a9124 | 376 | } | 
| Vanger | 39:d7c5541a9124 | 377 | } | 
| Vanger | 38:a4ccad70be9d | 378 | } | 
| Vanger | 38:a4ccad70be9d | 379 | DBG("SSL connection set to %s", pMethod.c_str()); | 
| Vanger | 38:a4ccad70be9d | 380 | } | 
| Vanger | 38:a4ccad70be9d | 381 | |
| Vanger | 38:a4ccad70be9d | 382 | CyaSSL_CTX_set_verify(ctx, peerMethod, 0); //SSL_VERIFY_FAIL_IF_NO_PEER_CERT, VERIFY_NONE, SSL_VERIFY_PEER | 
| Vanger | 38:a4ccad70be9d | 383 | |
| wolfSSL | 19:1e2f05809eb1 | 384 | CyaSSL_SetIORecv(ctx, SocketReceive) ; | 
| wolfSSL | 19:1e2f05809eb1 | 385 | CyaSSL_SetIOSend(ctx, SocketSend) ; | 
| wolfSSL | 18:d89df40b4cf3 | 386 | } | 
| wolfSSL | 18:d89df40b4cf3 | 387 | if (ssl == NULL) { | 
| wolfSSL | 19:1e2f05809eb1 | 388 | ssl = CyaSSL_new(ctx); | 
| wolfSSL | 19:1e2f05809eb1 | 389 | if (ssl == NULL) { | 
| wolfSSL | 19:1e2f05809eb1 | 390 | ERR("unable to get SSL object"); | 
| wolfSSL | 19:1e2f05809eb1 | 391 | cyassl_free() ; | 
| wolfSSL | 19:1e2f05809eb1 | 392 | return HTTP_CONN; | 
| wolfSSL | 19:1e2f05809eb1 | 393 | } | 
| wolfSSL | 18:d89df40b4cf3 | 394 | } | 
| donatien | 0:2ccb9960a044 | 395 | |
| Vanger | 34:13920d48893d | 396 | DBG("ctx=%x, ssl=%x, ssl->ctx->CBIORecv, CBIOSend=%x, %x\r\n", | 
| wolfSSL | 18:d89df40b4cf3 | 397 | ctx, ssl, SocketReceive, SocketSend ) ; | 
| Vanger | 38:a4ccad70be9d | 398 | int ret = CyaSSL_connect(ssl); | 
| Vanger | 38:a4ccad70be9d | 399 | if (ret != SSL_SUCCESS) { | 
| wolfSSL | 18:d89df40b4cf3 | 400 | ERR("SSL_connect failed"); | 
| Vanger | 38:a4ccad70be9d | 401 | int err = CyaSSL_get_error(ssl, ret); | 
| Vanger | 38:a4ccad70be9d | 402 | char data[32]; | 
| Vanger | 38:a4ccad70be9d | 403 | char data_new[32]; | 
| Vanger | 38:a4ccad70be9d | 404 | strcpy(data_new, CyaSSL_ERR_error_string(err, data)); | 
| Vanger | 38:a4ccad70be9d | 405 | if(!strcmp(data,data_new)) { | 
| Vanger | 38:a4ccad70be9d | 406 | printf("Error code [%d] is [%s]\r\n", err, data); | 
| Vanger | 38:a4ccad70be9d | 407 | } else { | 
| Vanger | 38:a4ccad70be9d | 408 | printf("Failed to get error code [%d], Reason: [%s]\r\n", err, data_new); | 
| Vanger | 38:a4ccad70be9d | 409 | } | 
| wolfSSL | 18:d89df40b4cf3 | 410 | cyassl_free() ; | 
| wolfSSL | 18:d89df40b4cf3 | 411 | return HTTP_CONN; | 
| wolfSSL | 18:d89df40b4cf3 | 412 | } | 
| wolfSSL | 18:d89df40b4cf3 | 413 | } /* SSL connect complete */ | 
| donatien | 0:2ccb9960a044 | 414 | |
| wolfSSL | 18:d89df40b4cf3 | 415 | //Send request | 
| wolfSSL | 18:d89df40b4cf3 | 416 | DBG("Sending request"); | 
| wolfSSL | 18:d89df40b4cf3 | 417 | char buf[CHUNK_SIZE]; | 
| ansond | 30:6fef375c94e6 | 418 | memset(buf,0,CHUNK_SIZE); | 
| wolfSSL | 18:d89df40b4cf3 | 419 | send_buf_p = send_buf ; // Reset send buffer ; | 
| wolfSSL | 18:d89df40b4cf3 | 420 | |
| wolfSSL | 18:d89df40b4cf3 | 421 | const char* meth = (method==HTTP_GET)?"GET":(method==HTTP_POST)?"POST":(method==HTTP_PUT)?"PUT":(method==HTTP_DELETE)?"DELETE":""; | 
| ansond | 31:0675a342e45c | 422 | snprintf(buf, sizeof(buf), "%s %s HTTP/1.1\r\nHost: %s\r\nConnection: keep-alive\r\n", meth, path, host); //Write request | 
| wolfSSL | 18:d89df40b4cf3 | 423 | ret = send(buf); | 
| wolfSSL | 18:d89df40b4cf3 | 424 | if(ret) { | 
| Vanger | 33:3b2809748a9e | 425 | m_sock->close(); | 
| wolfSSL | 18:d89df40b4cf3 | 426 | ERR("Could not write request"); | 
| wolfSSL | 18:d89df40b4cf3 | 427 | return HTTP_CONN; | 
| donatien | 0:2ccb9960a044 | 428 | } | 
| wolfSSL | 17:c73d8e61d391 | 429 | |
| wolfSSL | 18:d89df40b4cf3 | 430 | //Send all headers | 
| donatien | 0:2ccb9960a044 | 431 | |
| wolfSSL | 18:d89df40b4cf3 | 432 | //Send default headers | 
| wolfSSL | 18:d89df40b4cf3 | 433 | DBG("Sending headers"); | 
| ansond | 31:0675a342e45c | 434 | if(m_basicAuthUser && m_basicAuthPassword) { | 
| ansond | 31:0675a342e45c | 435 | bAuth() ; /* send out Basic Auth header */ | 
| wolfSSL | 27:5d4739eae63e | 436 | } | 
| wolfSSL | 18:d89df40b4cf3 | 437 | if( pDataOut != NULL ) { | 
| wolfSSL | 18:d89df40b4cf3 | 438 | if( pDataOut->getIsChunked() ) { | 
| wolfSSL | 18:d89df40b4cf3 | 439 | ret = send("Transfer-Encoding: chunked\r\n"); | 
| wolfSSL | 18:d89df40b4cf3 | 440 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 18:d89df40b4cf3 | 441 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 442 | snprintf(buf, sizeof(buf), "Content-Length: %d\r\n", pDataOut->getDataLen()); | 
| wolfSSL | 22:4b9a4151cc73 | 443 | DBG("Content buf:%s", buf) ; | 
| wolfSSL | 18:d89df40b4cf3 | 444 | ret = send(buf); | 
| wolfSSL | 18:d89df40b4cf3 | 445 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 18:d89df40b4cf3 | 446 | } | 
| wolfSSL | 18:d89df40b4cf3 | 447 | char type[48]; | 
| wolfSSL | 18:d89df40b4cf3 | 448 | if( pDataOut->getDataType(type, 48) == HTTP_OK ) { | 
| wolfSSL | 18:d89df40b4cf3 | 449 | snprintf(buf, sizeof(buf), "Content-Type: %s\r\n", type); | 
| wolfSSL | 18:d89df40b4cf3 | 450 | ret = send(buf); | 
| wolfSSL | 18:d89df40b4cf3 | 451 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 18:d89df40b4cf3 | 452 | } | 
| wolfSSL | 18:d89df40b4cf3 | 453 | } | 
| wolfSSL | 18:d89df40b4cf3 | 454 | |
| wolfSSL | 18:d89df40b4cf3 | 455 | //Add user headers | 
| wolfSSL | 18:d89df40b4cf3 | 456 | if(header) { | 
| wolfSSL | 27:5d4739eae63e | 457 | ret = send((char *)header); | 
| donatien | 5:791fc3dcb6c4 | 458 | CHECK_CONN_ERR(ret); | 
| donatien | 0:2ccb9960a044 | 459 | } | 
| donatien | 0:2ccb9960a044 | 460 | |
| wolfSSL | 18:d89df40b4cf3 | 461 | //Close headers | 
| wolfSSL | 18:d89df40b4cf3 | 462 | DBG("Headers sent"); | 
| wolfSSL | 18:d89df40b4cf3 | 463 | ret = send("\r\n"); | 
| wolfSSL | 18:d89df40b4cf3 | 464 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 17:c73d8e61d391 | 465 | |
| wolfSSL | 18:d89df40b4cf3 | 466 | size_t trfLen; | 
| donatien | 0:2ccb9960a044 | 467 | |
| wolfSSL | 18:d89df40b4cf3 | 468 | //Send data (if available) | 
| wolfSSL | 18:d89df40b4cf3 | 469 | if( pDataOut != NULL ) { | 
| wolfSSL | 18:d89df40b4cf3 | 470 | DBG("Sending data"); | 
| wolfSSL | 18:d89df40b4cf3 | 471 | while(true) { | 
| wolfSSL | 18:d89df40b4cf3 | 472 | size_t writtenLen = 0; | 
| wolfSSL | 18:d89df40b4cf3 | 473 | pDataOut->read(buf, CHUNK_SIZE, &trfLen); | 
| wolfSSL | 18:d89df40b4cf3 | 474 | buf[trfLen] = 0x0 ; | 
| wolfSSL | 18:d89df40b4cf3 | 475 | DBG("buf:%s", buf) ; | 
| wolfSSL | 18:d89df40b4cf3 | 476 | if( pDataOut->getIsChunked() ) { | 
| wolfSSL | 18:d89df40b4cf3 | 477 | //Write chunk header | 
| wolfSSL | 22:4b9a4151cc73 | 478 | char chunkHeader[64]; | 
| wolfSSL | 18:d89df40b4cf3 | 479 | snprintf(chunkHeader, sizeof(chunkHeader), "%X\r\n", trfLen); //In hex encoding | 
| wolfSSL | 18:d89df40b4cf3 | 480 | ret = send(chunkHeader); | 
| wolfSSL | 18:d89df40b4cf3 | 481 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 18:d89df40b4cf3 | 482 | } else if( trfLen == 0 ) { | 
| wolfSSL | 22:4b9a4151cc73 | 483 | DBG("trfLen==0") ; | 
| wolfSSL | 18:d89df40b4cf3 | 484 | break; | 
| wolfSSL | 18:d89df40b4cf3 | 485 | } | 
| wolfSSL | 22:4b9a4151cc73 | 486 | DBG("trfLen 1=%d", trfLen) ; | 
| wolfSSL | 18:d89df40b4cf3 | 487 | if( trfLen != 0 ) { | 
| wolfSSL | 22:4b9a4151cc73 | 488 | DBG("Sending 1") ; | 
| wolfSSL | 18:d89df40b4cf3 | 489 | ret = send(buf, trfLen); | 
| wolfSSL | 22:4b9a4151cc73 | 490 | DBG("Sent 1") ; | 
| wolfSSL | 18:d89df40b4cf3 | 491 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 18:d89df40b4cf3 | 492 | } | 
| donatien | 0:2ccb9960a044 | 493 | |
| wolfSSL | 18:d89df40b4cf3 | 494 | if( pDataOut->getIsChunked() ) { | 
| wolfSSL | 18:d89df40b4cf3 | 495 | ret = send("\r\n"); //Chunk-terminating CRLF | 
| wolfSSL | 18:d89df40b4cf3 | 496 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 18:d89df40b4cf3 | 497 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 498 | writtenLen += trfLen; | 
| wolfSSL | 18:d89df40b4cf3 | 499 | if( writtenLen >= pDataOut->getDataLen() ) { | 
| wolfSSL | 22:4b9a4151cc73 | 500 | DBG("writtenLen=%d", writtenLen) ; | 
| wolfSSL | 18:d89df40b4cf3 | 501 | break; | 
| wolfSSL | 18:d89df40b4cf3 | 502 | } | 
| wolfSSL | 22:4b9a4151cc73 | 503 | DBG("writtenLen+=trfLen = %d", writtenLen) ; | 
| wolfSSL | 18:d89df40b4cf3 | 504 | } | 
| wolfSSL | 22:4b9a4151cc73 | 505 | DBG("trfLen 2=%d", trfLen) ; | 
| wolfSSL | 18:d89df40b4cf3 | 506 | if( trfLen == 0 ) { | 
| wolfSSL | 22:4b9a4151cc73 | 507 | DBG("trfLen == 0") ; | 
| wolfSSL | 18:d89df40b4cf3 | 508 | break; | 
| wolfSSL | 18:d89df40b4cf3 | 509 | } | 
| wolfSSL | 18:d89df40b4cf3 | 510 | } | 
| donatien | 0:2ccb9960a044 | 511 | |
| wolfSSL | 18:d89df40b4cf3 | 512 | } | 
| wolfSSL | 18:d89df40b4cf3 | 513 | ret = flush() ; // flush the send buffer ; | 
| wolfSSL | 18:d89df40b4cf3 | 514 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 18:d89df40b4cf3 | 515 | |
| wolfSSL | 18:d89df40b4cf3 | 516 | //Receive response | 
| wolfSSL | 18:d89df40b4cf3 | 517 | DBG("Receiving response"); | 
| wolfSSL | 18:d89df40b4cf3 | 518 | |
| wolfSSL | 18:d89df40b4cf3 | 519 | ret = recv(buf, CHUNK_SIZE - 1, CHUNK_SIZE - 1, &trfLen); //Read n bytes | 
| wolfSSL | 18:d89df40b4cf3 | 520 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 18:d89df40b4cf3 | 521 | |
| wolfSSL | 18:d89df40b4cf3 | 522 | buf[trfLen] = '\0'; | 
| wolfSSL | 18:d89df40b4cf3 | 523 | |
| wolfSSL | 18:d89df40b4cf3 | 524 | char* crlfPtr = strstr(buf, "\r\n"); | 
| wolfSSL | 18:d89df40b4cf3 | 525 | if(crlfPtr == NULL) { | 
| donatien | 5:791fc3dcb6c4 | 526 | PRTCL_ERR(); | 
| donatien | 0:2ccb9960a044 | 527 | } | 
| donatien | 0:2ccb9960a044 | 528 | |
| wolfSSL | 18:d89df40b4cf3 | 529 | int crlfPos = crlfPtr - buf; | 
| donatien | 0:2ccb9960a044 | 530 | buf[crlfPos] = '\0'; | 
| donatien | 0:2ccb9960a044 | 531 | |
| wolfSSL | 18:d89df40b4cf3 | 532 | //Parse HTTP response | 
| wolfSSL | 18:d89df40b4cf3 | 533 | if( sscanf(buf, "HTTP/%*d.%*d %d %*[^\r\n]", &m_httpResponseCode) != 1 ) { | 
| wolfSSL | 18:d89df40b4cf3 | 534 | //Cannot match string, error | 
| wolfSSL | 18:d89df40b4cf3 | 535 | ERR("Not a correct HTTP answer : %s\n", buf); | 
| wolfSSL | 18:d89df40b4cf3 | 536 | PRTCL_ERR(); | 
| wolfSSL | 18:d89df40b4cf3 | 537 | } | 
| donatien | 4:c071b05ac026 | 538 | |
| wolfSSL | 27:5d4739eae63e | 539 | if( (m_httpResponseCode < 200) || (m_httpResponseCode >= 400) ) { | 
| wolfSSL | 18:d89df40b4cf3 | 540 | //Did not return a 2xx code; TODO fetch headers/(&data?) anyway and implement a mean of writing/reading headers | 
| wolfSSL | 18:d89df40b4cf3 | 541 | WARN("Response code %d", m_httpResponseCode); | 
| wolfSSL | 18:d89df40b4cf3 | 542 | PRTCL_ERR(); | 
| donatien | 0:2ccb9960a044 | 543 | } | 
| donatien | 0:2ccb9960a044 | 544 | |
| wolfSSL | 18:d89df40b4cf3 | 545 | DBG("Reading headers"); | 
| donatien | 0:2ccb9960a044 | 546 | |
| wolfSSL | 18:d89df40b4cf3 | 547 | memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2) + 1); //Be sure to move NULL-terminating char as well | 
| wolfSSL | 18:d89df40b4cf3 | 548 | trfLen -= (crlfPos + 2); | 
| donatien | 0:2ccb9960a044 | 549 | |
| wolfSSL | 18:d89df40b4cf3 | 550 | size_t recvContentLength = 0; | 
| wolfSSL | 18:d89df40b4cf3 | 551 | bool recvChunked = false; | 
| wolfSSL | 18:d89df40b4cf3 | 552 | //Now get headers | 
| wolfSSL | 18:d89df40b4cf3 | 553 | while( true ) { | 
| wolfSSL | 18:d89df40b4cf3 | 554 | crlfPtr = strstr(buf, "\r\n"); | 
| wolfSSL | 18:d89df40b4cf3 | 555 | if(crlfPtr == NULL) { | 
| wolfSSL | 18:d89df40b4cf3 | 556 | if( trfLen < CHUNK_SIZE - 1 ) { | 
| ansond | 30:6fef375c94e6 | 557 | size_t newTrfLen = 0; | 
| wolfSSL | 18:d89df40b4cf3 | 558 | ret = recv(buf + trfLen, 1, CHUNK_SIZE - trfLen - 1, &newTrfLen); | 
| wolfSSL | 18:d89df40b4cf3 | 559 | trfLen += newTrfLen; | 
| wolfSSL | 18:d89df40b4cf3 | 560 | buf[trfLen] = '\0'; | 
| wolfSSL | 18:d89df40b4cf3 | 561 | DBG("Read %d chars; In buf: [%s]", newTrfLen, buf); | 
| wolfSSL | 18:d89df40b4cf3 | 562 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 18:d89df40b4cf3 | 563 | continue; | 
| wolfSSL | 18:d89df40b4cf3 | 564 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 565 | PRTCL_ERR(); | 
| donatien | 14:2744e0c0e527 | 566 | } | 
| wolfSSL | 18:d89df40b4cf3 | 567 | } | 
| wolfSSL | 18:d89df40b4cf3 | 568 | |
| wolfSSL | 18:d89df40b4cf3 | 569 | crlfPos = crlfPtr - buf; | 
| wolfSSL | 18:d89df40b4cf3 | 570 | |
| wolfSSL | 18:d89df40b4cf3 | 571 | if(crlfPos == 0) { //End of headers | 
| wolfSSL | 18:d89df40b4cf3 | 572 | DBG("Headers read"); | 
| wolfSSL | 18:d89df40b4cf3 | 573 | memmove(buf, &buf[2], trfLen - 2 + 1); //Be sure to move NULL-terminating char as well | 
| wolfSSL | 18:d89df40b4cf3 | 574 | trfLen -= 2; | 
| wolfSSL | 18:d89df40b4cf3 | 575 | break; | 
| donatien | 0:2ccb9960a044 | 576 | } | 
| wolfSSL | 18:d89df40b4cf3 | 577 | |
| wolfSSL | 18:d89df40b4cf3 | 578 | buf[crlfPos] = '\0'; | 
| wolfSSL | 18:d89df40b4cf3 | 579 | |
| ansond | 30:6fef375c94e6 | 580 | char key[41]; | 
| ansond | 30:6fef375c94e6 | 581 | char value[41]; | 
| wolfSSL | 18:d89df40b4cf3 | 582 | |
| ansond | 30:6fef375c94e6 | 583 | memset(key,0,41); | 
| ansond | 30:6fef375c94e6 | 584 | memset(value,0,41); | 
| wolfSSL | 18:d89df40b4cf3 | 585 | |
| ansond | 30:6fef375c94e6 | 586 | int n = sscanf(buf, "%40[^:]: %40[^\r\n]", key, value); | 
| wolfSSL | 18:d89df40b4cf3 | 587 | if ( n == 2 ) { | 
| wolfSSL | 18:d89df40b4cf3 | 588 | DBG("Read header : %s: %s\n", key, value); | 
| wolfSSL | 18:d89df40b4cf3 | 589 | if( !strcmp(key, "Content-Length") ) { | 
| wolfSSL | 18:d89df40b4cf3 | 590 | sscanf(value, "%d", &recvContentLength); | 
| wolfSSL | 18:d89df40b4cf3 | 591 | pDataIn->setDataLen(recvContentLength); | 
| wolfSSL | 18:d89df40b4cf3 | 592 | } else if( !strcmp(key, "Transfer-Encoding") ) { | 
| wolfSSL | 18:d89df40b4cf3 | 593 | if( !strcmp(value, "Chunked") || !strcmp(value, "chunked") ) { | 
| wolfSSL | 18:d89df40b4cf3 | 594 | recvChunked = true; | 
| wolfSSL | 18:d89df40b4cf3 | 595 | pDataIn->setIsChunked(true); | 
| wolfSSL | 18:d89df40b4cf3 | 596 | } | 
| wolfSSL | 18:d89df40b4cf3 | 597 | } else if( !strcmp(key, "Content-Type") ) { | 
| wolfSSL | 18:d89df40b4cf3 | 598 | pDataIn->setDataType(value); | 
| wolfSSL | 27:5d4739eae63e | 599 | } else if( !strcmp(key, "location") && redirect_url) { | 
| ansond | 31:0675a342e45c | 600 | sscanf(buf, "%40[^:]: %128[^\r\n]", key, redirect_url); | 
| wolfSSL | 27:5d4739eae63e | 601 | DBG("Redirect %s: %s", key, redirect_url) ; | 
| wolfSSL | 27:5d4739eae63e | 602 | redirect = 1 ; | 
| wolfSSL | 18:d89df40b4cf3 | 603 | } | 
| wolfSSL | 18:d89df40b4cf3 | 604 | memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2) + 1); //Be sure to move NULL-terminating char as well | 
| wolfSSL | 18:d89df40b4cf3 | 605 | trfLen -= (crlfPos + 2); | 
| wolfSSL | 18:d89df40b4cf3 | 606 | |
| wolfSSL | 18:d89df40b4cf3 | 607 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 608 | ERR("Could not parse header"); | 
| donatien | 14:2744e0c0e527 | 609 | PRTCL_ERR(); | 
| donatien | 0:2ccb9960a044 | 610 | } | 
| donatien | 0:2ccb9960a044 | 611 | |
| donatien | 0:2ccb9960a044 | 612 | } | 
| donatien | 0:2ccb9960a044 | 613 | |
| wolfSSL | 18:d89df40b4cf3 | 614 | //Receive data | 
| wolfSSL | 18:d89df40b4cf3 | 615 | DBG("Receiving data"); | 
| wolfSSL | 18:d89df40b4cf3 | 616 | |
| wolfSSL | 18:d89df40b4cf3 | 617 | while(true) { | 
| wolfSSL | 18:d89df40b4cf3 | 618 | size_t readLen = 0; | 
| donatien | 0:2ccb9960a044 | 619 | |
| wolfSSL | 18:d89df40b4cf3 | 620 | if( recvChunked ) { | 
| wolfSSL | 18:d89df40b4cf3 | 621 | //Read chunk header | 
| wolfSSL | 18:d89df40b4cf3 | 622 | bool foundCrlf; | 
| wolfSSL | 18:d89df40b4cf3 | 623 | do { | 
| wolfSSL | 18:d89df40b4cf3 | 624 | foundCrlf = false; | 
| wolfSSL | 18:d89df40b4cf3 | 625 | crlfPos=0; | 
| wolfSSL | 18:d89df40b4cf3 | 626 | buf[trfLen]=0; | 
| wolfSSL | 18:d89df40b4cf3 | 627 | if(trfLen >= 2) { | 
| wolfSSL | 18:d89df40b4cf3 | 628 | for(; crlfPos < trfLen - 2; crlfPos++) { | 
| wolfSSL | 18:d89df40b4cf3 | 629 | if( buf[crlfPos] == '\r' && buf[crlfPos + 1] == '\n' ) { | 
| wolfSSL | 18:d89df40b4cf3 | 630 | foundCrlf = true; | 
| wolfSSL | 18:d89df40b4cf3 | 631 | break; | 
| wolfSSL | 18:d89df40b4cf3 | 632 | } | 
| wolfSSL | 18:d89df40b4cf3 | 633 | } | 
| wolfSSL | 18:d89df40b4cf3 | 634 | } | 
| wolfSSL | 18:d89df40b4cf3 | 635 | if(!foundCrlf) { //Try to read more | 
| wolfSSL | 18:d89df40b4cf3 | 636 | if( trfLen < CHUNK_SIZE ) { | 
| ansond | 30:6fef375c94e6 | 637 | size_t newTrfLen = 0; | 
| wolfSSL | 18:d89df40b4cf3 | 638 | ret = recv(buf + trfLen, 0, CHUNK_SIZE - trfLen - 1, &newTrfLen); | 
| wolfSSL | 18:d89df40b4cf3 | 639 | trfLen += newTrfLen; | 
| wolfSSL | 18:d89df40b4cf3 | 640 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 18:d89df40b4cf3 | 641 | continue; | 
| wolfSSL | 18:d89df40b4cf3 | 642 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 643 | PRTCL_ERR(); | 
| wolfSSL | 18:d89df40b4cf3 | 644 | } | 
| wolfSSL | 18:d89df40b4cf3 | 645 | } | 
| wolfSSL | 18:d89df40b4cf3 | 646 | } while(!foundCrlf); | 
| wolfSSL | 18:d89df40b4cf3 | 647 | buf[crlfPos] = '\0'; | 
| wolfSSL | 18:d89df40b4cf3 | 648 | int n = sscanf(buf, "%x", &readLen); | 
| wolfSSL | 18:d89df40b4cf3 | 649 | if(n!=1) { | 
| wolfSSL | 18:d89df40b4cf3 | 650 | ERR("Could not read chunk length"); | 
| wolfSSL | 18:d89df40b4cf3 | 651 | PRTCL_ERR(); | 
| wolfSSL | 18:d89df40b4cf3 | 652 | } | 
| wolfSSL | 18:d89df40b4cf3 | 653 | |
| wolfSSL | 18:d89df40b4cf3 | 654 | memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2)); //Not need to move NULL-terminating char any more | 
| wolfSSL | 18:d89df40b4cf3 | 655 | trfLen -= (crlfPos + 2); | 
| donatien | 0:2ccb9960a044 | 656 | |
| wolfSSL | 18:d89df40b4cf3 | 657 | if( readLen == 0 ) { | 
| wolfSSL | 18:d89df40b4cf3 | 658 | //Last chunk | 
| wolfSSL | 18:d89df40b4cf3 | 659 | break; | 
| wolfSSL | 18:d89df40b4cf3 | 660 | } | 
| wolfSSL | 18:d89df40b4cf3 | 661 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 662 | readLen = recvContentLength; | 
| wolfSSL | 18:d89df40b4cf3 | 663 | } | 
| wolfSSL | 18:d89df40b4cf3 | 664 | |
| wolfSSL | 18:d89df40b4cf3 | 665 | DBG("Retrieving %d bytes", readLen); | 
| wolfSSL | 18:d89df40b4cf3 | 666 | |
| wolfSSL | 18:d89df40b4cf3 | 667 | do { | 
| wolfSSL | 18:d89df40b4cf3 | 668 | pDataIn->write(buf, MIN(trfLen, readLen)); | 
| wolfSSL | 18:d89df40b4cf3 | 669 | if( trfLen > readLen ) { | 
| wolfSSL | 18:d89df40b4cf3 | 670 | memmove(buf, &buf[readLen], trfLen - readLen); | 
| wolfSSL | 18:d89df40b4cf3 | 671 | trfLen -= readLen; | 
| wolfSSL | 18:d89df40b4cf3 | 672 | readLen = 0; | 
| wolfSSL | 18:d89df40b4cf3 | 673 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 674 | readLen -= trfLen; | 
| wolfSSL | 18:d89df40b4cf3 | 675 | } | 
| donatien | 0:2ccb9960a044 | 676 | |
| wolfSSL | 18:d89df40b4cf3 | 677 | if(readLen) { | 
| wolfSSL | 18:d89df40b4cf3 | 678 | ret = recv(buf, 1, CHUNK_SIZE - trfLen - 1, &trfLen); | 
| wolfSSL | 18:d89df40b4cf3 | 679 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 18:d89df40b4cf3 | 680 | } | 
| wolfSSL | 18:d89df40b4cf3 | 681 | } while(readLen); | 
| wolfSSL | 18:d89df40b4cf3 | 682 | |
| wolfSSL | 18:d89df40b4cf3 | 683 | if( recvChunked ) { | 
| wolfSSL | 18:d89df40b4cf3 | 684 | if(trfLen < 2) { | 
| ansond | 30:6fef375c94e6 | 685 | size_t newTrfLen = 0; | 
| wolfSSL | 18:d89df40b4cf3 | 686 | //Read missing chars to find end of chunk | 
| wolfSSL | 18:d89df40b4cf3 | 687 | ret = recv(buf + trfLen, 2 - trfLen, CHUNK_SIZE - trfLen - 1, &newTrfLen); | 
| wolfSSL | 18:d89df40b4cf3 | 688 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 18:d89df40b4cf3 | 689 | trfLen += newTrfLen; | 
| wolfSSL | 18:d89df40b4cf3 | 690 | } | 
| wolfSSL | 18:d89df40b4cf3 | 691 | if( (buf[0] != '\r') || (buf[1] != '\n') ) { | 
| wolfSSL | 18:d89df40b4cf3 | 692 | ERR("Format error"); | 
| wolfSSL | 18:d89df40b4cf3 | 693 | PRTCL_ERR(); | 
| wolfSSL | 18:d89df40b4cf3 | 694 | } | 
| wolfSSL | 18:d89df40b4cf3 | 695 | memmove(buf, &buf[2], trfLen - 2); | 
| wolfSSL | 18:d89df40b4cf3 | 696 | trfLen -= 2; | 
| wolfSSL | 18:d89df40b4cf3 | 697 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 698 | break; | 
| wolfSSL | 18:d89df40b4cf3 | 699 | } | 
| wolfSSL | 18:d89df40b4cf3 | 700 | |
| donatien | 0:2ccb9960a044 | 701 | } | 
| Vanger | 39:d7c5541a9124 | 702 | |
| Vanger | 39:d7c5541a9124 | 703 | if(m_sock->is_connected()) { | 
| Vanger | 39:d7c5541a9124 | 704 | m_sock->close(); | 
| Vanger | 39:d7c5541a9124 | 705 | } | 
| Vanger | 39:d7c5541a9124 | 706 | |
| Vanger | 39:d7c5541a9124 | 707 | m_sock->close(true); | 
| wolfSSL | 20:bec882d85856 | 708 | cyassl_free() ; | 
| wolfSSL | 18:d89df40b4cf3 | 709 | DBG("Completed HTTP transaction"); | 
| wolfSSL | 27:5d4739eae63e | 710 | if(redirect)return HTTP_REDIRECT ; | 
| wolfSSL | 27:5d4739eae63e | 711 | else return HTTP_OK; | 
| donatien | 0:2ccb9960a044 | 712 | } | 
| donatien | 0:2ccb9960a044 | 713 | |
| wolfSSL | 19:1e2f05809eb1 | 714 | HTTPResult HTTPClient::recv(char* buf, size_t minLen, size_t maxLen, size_t* pReadLen) //0 on success, err code on failure | 
| donatien | 0:2ccb9960a044 | 715 | { | 
| wolfSSL | 18:d89df40b4cf3 | 716 | DBG("Trying to read between %d and %d bytes", minLen, maxLen); | 
| wolfSSL | 18:d89df40b4cf3 | 717 | size_t readLen = 0; | 
| wolfSSL | 18:d89df40b4cf3 | 718 | |
| Vanger | 33:3b2809748a9e | 719 | if(!m_sock->is_connected()) { | 
| wolfSSL | 18:d89df40b4cf3 | 720 | WARN("Connection was closed by server"); | 
| wolfSSL | 18:d89df40b4cf3 | 721 | return HTTP_CLOSED; //Connection was closed by server | 
| wolfSSL | 18:d89df40b4cf3 | 722 | } | 
| wolfSSL | 18:d89df40b4cf3 | 723 | |
| wolfSSL | 18:d89df40b4cf3 | 724 | int ret; | 
| wolfSSL | 18:d89df40b4cf3 | 725 | |
| wolfSSL | 18:d89df40b4cf3 | 726 | if(port == HTTPS_PORT) { | 
| wolfSSL | 18:d89df40b4cf3 | 727 | DBG("Enter CyaSSL_read") ; | 
| wolfSSL | 18:d89df40b4cf3 | 728 | |
| Vanger | 33:3b2809748a9e | 729 | m_sock->set_blocking(false, m_timeout); | 
| wolfSSL | 18:d89df40b4cf3 | 730 | readLen = CyaSSL_read(ssl, buf, maxLen); | 
| wolfSSL | 18:d89df40b4cf3 | 731 | if (readLen > 0) { | 
| wolfSSL | 18:d89df40b4cf3 | 732 | buf[readLen] = 0; | 
| wolfSSL | 18:d89df40b4cf3 | 733 | DBG("CyaSSL_read:%s\n", buf); | 
| wolfSSL | 18:d89df40b4cf3 | 734 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 735 | ERR("CyaSSL_read, ret = %d", readLen) ; | 
| wolfSSL | 18:d89df40b4cf3 | 736 | return HTTP_ERROR ; | 
| wolfSSL | 18:d89df40b4cf3 | 737 | } | 
| wolfSSL | 18:d89df40b4cf3 | 738 | DBG("Read %d bytes", readLen); | 
| wolfSSL | 18:d89df40b4cf3 | 739 | *pReadLen = readLen; | 
| wolfSSL | 18:d89df40b4cf3 | 740 | return HTTP_OK; | 
| wolfSSL | 18:d89df40b4cf3 | 741 | } | 
| wolfSSL | 18:d89df40b4cf3 | 742 | |
| wolfSSL | 18:d89df40b4cf3 | 743 | while(readLen < maxLen) { | 
| wolfSSL | 18:d89df40b4cf3 | 744 | if(readLen < minLen) { | 
| wolfSSL | 18:d89df40b4cf3 | 745 | DBG("Trying to read at most %d bytes [Blocking]", minLen - readLen); | 
| Vanger | 33:3b2809748a9e | 746 | m_sock->set_blocking(false, m_timeout); | 
| Vanger | 33:3b2809748a9e | 747 | ret = m_sock->receive_all(buf + readLen, minLen - readLen); | 
| wolfSSL | 18:d89df40b4cf3 | 748 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 749 | DBG("Trying to read at most %d bytes [Not blocking]", maxLen - readLen); | 
| Vanger | 33:3b2809748a9e | 750 | m_sock->set_blocking(false, 0); | 
| Vanger | 33:3b2809748a9e | 751 | ret = m_sock->receive(buf + readLen, maxLen - readLen); | 
| wolfSSL | 18:d89df40b4cf3 | 752 | } | 
| wolfSSL | 18:d89df40b4cf3 | 753 | |
| wolfSSL | 18:d89df40b4cf3 | 754 | if( ret > 0) { | 
| wolfSSL | 18:d89df40b4cf3 | 755 | readLen += ret; | 
| wolfSSL | 18:d89df40b4cf3 | 756 | } else if( ret == 0 ) { | 
| wolfSSL | 18:d89df40b4cf3 | 757 | break; | 
| wolfSSL | 18:d89df40b4cf3 | 758 | } else { | 
| Vanger | 33:3b2809748a9e | 759 | if(!m_sock->is_connected()) { | 
| wolfSSL | 18:d89df40b4cf3 | 760 | ERR("Connection error (recv returned %d)", ret); | 
| wolfSSL | 18:d89df40b4cf3 | 761 | *pReadLen = readLen; | 
| wolfSSL | 18:d89df40b4cf3 | 762 | return HTTP_CONN; | 
| wolfSSL | 18:d89df40b4cf3 | 763 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 764 | break; | 
| wolfSSL | 18:d89df40b4cf3 | 765 | } | 
| wolfSSL | 18:d89df40b4cf3 | 766 | } | 
| wolfSSL | 18:d89df40b4cf3 | 767 | |
| Vanger | 33:3b2809748a9e | 768 | if(!m_sock->is_connected()) { | 
| wolfSSL | 18:d89df40b4cf3 | 769 | break; | 
| wolfSSL | 18:d89df40b4cf3 | 770 | } | 
| wolfSSL | 17:c73d8e61d391 | 771 | } | 
| wolfSSL | 17:c73d8e61d391 | 772 | DBG("Read %d bytes", readLen); | 
| wolfSSL | 17:c73d8e61d391 | 773 | *pReadLen = readLen; | 
| Vanger | 34:13920d48893d | 774 | m_sock->set_blocking(false, m_timeout); | 
| wolfSSL | 17:c73d8e61d391 | 775 | return HTTP_OK; | 
| donatien | 7:4e39864f7b15 | 776 | } | 
| donatien | 7:4e39864f7b15 | 777 | |
| wolfSSL | 19:1e2f05809eb1 | 778 | HTTPResult HTTPClient::send(char* buf, size_t len) //0 on success, err code on failure | 
| donatien | 7:4e39864f7b15 | 779 | { | 
| wolfSSL | 18:d89df40b4cf3 | 780 | HTTPResult ret ; | 
| wolfSSL | 18:d89df40b4cf3 | 781 | int cp_len ; | 
| wolfSSL | 18:d89df40b4cf3 | 782 | |
| wolfSSL | 18:d89df40b4cf3 | 783 | if(len == 0) { | 
| wolfSSL | 18:d89df40b4cf3 | 784 | len = strlen(buf); | 
| wolfSSL | 17:c73d8e61d391 | 785 | } | 
| wolfSSL | 17:c73d8e61d391 | 786 | |
| wolfSSL | 18:d89df40b4cf3 | 787 | do { | 
| wolfSSL | 22:4b9a4151cc73 | 788 | |
| wolfSSL | 18:d89df40b4cf3 | 789 | if((SEND_BUF_SIZE - (send_buf_p - send_buf)) >= len) { | 
| wolfSSL | 18:d89df40b4cf3 | 790 | cp_len = len ; | 
| wolfSSL | 18:d89df40b4cf3 | 791 | } else { | 
| wolfSSL | 22:4b9a4151cc73 | 792 | cp_len = SEND_BUF_SIZE - (send_buf_p - send_buf) ; | 
| wolfSSL | 18:d89df40b4cf3 | 793 | } | 
| wolfSSL | 22:4b9a4151cc73 | 794 | DBG("send_buf_p:%x. send_buf+SIZE:%x, len=%d, cp_len=%d", send_buf_p, send_buf+SEND_BUF_SIZE, len, cp_len) ; | 
| wolfSSL | 18:d89df40b4cf3 | 795 | memcpy(send_buf_p, buf, cp_len) ; | 
| wolfSSL | 18:d89df40b4cf3 | 796 | send_buf_p += cp_len ; | 
| wolfSSL | 18:d89df40b4cf3 | 797 | len -= cp_len ; | 
| wolfSSL | 18:d89df40b4cf3 | 798 | |
| wolfSSL | 18:d89df40b4cf3 | 799 | if(send_buf_p == send_buf + SEND_BUF_SIZE) { | 
| wolfSSL | 22:4b9a4151cc73 | 800 | if(port == HTTPS_PORT){ | 
| wolfSSL | 22:4b9a4151cc73 | 801 | ERR("HTTPClient::send buffer overflow"); | 
| wolfSSL | 22:4b9a4151cc73 | 802 | return HTTP_ERROR ; | 
| wolfSSL | 22:4b9a4151cc73 | 803 | } | 
| wolfSSL | 18:d89df40b4cf3 | 804 | ret = flush() ; | 
| wolfSSL | 18:d89df40b4cf3 | 805 | if(ret)return(ret) ; | 
| wolfSSL | 18:d89df40b4cf3 | 806 | } | 
| wolfSSL | 18:d89df40b4cf3 | 807 | } while(len) ; | 
| wolfSSL | 18:d89df40b4cf3 | 808 | return HTTP_OK ; | 
| wolfSSL | 17:c73d8e61d391 | 809 | } | 
| wolfSSL | 17:c73d8e61d391 | 810 | |
| wolfSSL | 19:1e2f05809eb1 | 811 | HTTPResult HTTPClient::flush() //0 on success, err code on failure | 
| wolfSSL | 17:c73d8e61d391 | 812 | { | 
| wolfSSL | 18:d89df40b4cf3 | 813 | int len ; | 
| wolfSSL | 18:d89df40b4cf3 | 814 | char * buf ; | 
| wolfSSL | 18:d89df40b4cf3 | 815 | |
| wolfSSL | 18:d89df40b4cf3 | 816 | buf = send_buf ; | 
| wolfSSL | 18:d89df40b4cf3 | 817 | len = send_buf_p - send_buf ; | 
| wolfSSL | 18:d89df40b4cf3 | 818 | send_buf_p = send_buf ; // reset send buffer | 
| wolfSSL | 18:d89df40b4cf3 | 819 | |
| wolfSSL | 18:d89df40b4cf3 | 820 | DBG("Trying to write %d bytes:%s\n", len, buf); | 
| wolfSSL | 18:d89df40b4cf3 | 821 | size_t writtenLen = 0; | 
| wolfSSL | 18:d89df40b4cf3 | 822 | |
| Vanger | 33:3b2809748a9e | 823 | if(!m_sock->is_connected()) { | 
| wolfSSL | 18:d89df40b4cf3 | 824 | WARN("Connection was closed by server"); | 
| wolfSSL | 18:d89df40b4cf3 | 825 | return HTTP_CLOSED; //Connection was closed by server | 
| wolfSSL | 17:c73d8e61d391 | 826 | } | 
| wolfSSL | 18:d89df40b4cf3 | 827 | |
| wolfSSL | 18:d89df40b4cf3 | 828 | if(port == HTTPS_PORT) { | 
| wolfSSL | 18:d89df40b4cf3 | 829 | DBG("Enter CyaSSL_write") ; | 
| wolfSSL | 18:d89df40b4cf3 | 830 | if (CyaSSL_write(ssl, buf, len) != len) { | 
| wolfSSL | 18:d89df40b4cf3 | 831 | ERR("SSL_write failed"); | 
| wolfSSL | 18:d89df40b4cf3 | 832 | return HTTP_ERROR ; | 
| wolfSSL | 18:d89df40b4cf3 | 833 | } | 
| wolfSSL | 18:d89df40b4cf3 | 834 | DBG("Written %d bytes", writtenLen); | 
| wolfSSL | 18:d89df40b4cf3 | 835 | return HTTP_OK; | 
| wolfSSL | 18:d89df40b4cf3 | 836 | } | 
| Vanger | 33:3b2809748a9e | 837 | m_sock->set_blocking(false, m_timeout); | 
| Vanger | 33:3b2809748a9e | 838 | int ret = m_sock->send_all(buf, len); | 
| wolfSSL | 18:d89df40b4cf3 | 839 | if(ret > 0) { | 
| wolfSSL | 18:d89df40b4cf3 | 840 | writtenLen += ret; | 
| wolfSSL | 18:d89df40b4cf3 | 841 | } else if( ret == 0 ) { | 
| wolfSSL | 18:d89df40b4cf3 | 842 | WARN("Connection was closed by server"); | 
| wolfSSL | 18:d89df40b4cf3 | 843 | return HTTP_CLOSED; //Connection was closed by server | 
| wolfSSL | 18:d89df40b4cf3 | 844 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 845 | ERR("Connection error (send returned %d)", ret); | 
| wolfSSL | 18:d89df40b4cf3 | 846 | return HTTP_CONN; | 
| wolfSSL | 18:d89df40b4cf3 | 847 | } | 
| wolfSSL | 18:d89df40b4cf3 | 848 | |
| wolfSSL | 17:c73d8e61d391 | 849 | DBG("Written %d bytes", writtenLen); | 
| wolfSSL | 17:c73d8e61d391 | 850 | return HTTP_OK; | 
| donatien | 0:2ccb9960a044 | 851 | } | 
| donatien | 0:2ccb9960a044 | 852 | |
| wolfSSL | 19:1e2f05809eb1 | 853 | HTTPResult HTTPClient::parseURL(const char* url, char* scheme, size_t maxSchemeLen, char* host, size_t maxHostLen, uint16_t* port, char* path, size_t maxPathLen) //Parse URL | 
| donatien | 0:2ccb9960a044 | 854 | { | 
| wolfSSL | 18:d89df40b4cf3 | 855 | char* schemePtr = (char*) url; | 
| wolfSSL | 18:d89df40b4cf3 | 856 | char* hostPtr = (char*) strstr(url, "://"); | 
| wolfSSL | 18:d89df40b4cf3 | 857 | if(hostPtr == NULL) { | 
| wolfSSL | 18:d89df40b4cf3 | 858 | WARN("Could not find host"); | 
| wolfSSL | 18:d89df40b4cf3 | 859 | return HTTP_PARSE; //URL is invalid | 
| wolfSSL | 18:d89df40b4cf3 | 860 | } | 
| wolfSSL | 18:d89df40b4cf3 | 861 | |
| wolfSSL | 18:d89df40b4cf3 | 862 | if( maxSchemeLen < hostPtr - schemePtr + 1 ) { //including NULL-terminating char | 
| wolfSSL | 18:d89df40b4cf3 | 863 | WARN("Scheme str is too small (%d >= %d)", maxSchemeLen, hostPtr - schemePtr + 1); | 
| wolfSSL | 18:d89df40b4cf3 | 864 | return HTTP_PARSE; | 
| wolfSSL | 18:d89df40b4cf3 | 865 | } | 
| wolfSSL | 18:d89df40b4cf3 | 866 | memcpy(scheme, schemePtr, hostPtr - schemePtr); | 
| wolfSSL | 18:d89df40b4cf3 | 867 | scheme[hostPtr - schemePtr] = '\0'; | 
| donatien | 0:2ccb9960a044 | 868 | |
| wolfSSL | 18:d89df40b4cf3 | 869 | hostPtr+=3; | 
| donatien | 0:2ccb9960a044 | 870 | |
| wolfSSL | 18:d89df40b4cf3 | 871 | size_t hostLen = 0; | 
| donatien | 0:2ccb9960a044 | 872 | |
| wolfSSL | 18:d89df40b4cf3 | 873 | char* portPtr = strchr(hostPtr, ':'); | 
| wolfSSL | 18:d89df40b4cf3 | 874 | if( portPtr != NULL ) { | 
| wolfSSL | 18:d89df40b4cf3 | 875 | hostLen = portPtr - hostPtr; | 
| wolfSSL | 18:d89df40b4cf3 | 876 | portPtr++; | 
| wolfSSL | 18:d89df40b4cf3 | 877 | if( sscanf(portPtr, "%hu", port) != 1) { | 
| wolfSSL | 18:d89df40b4cf3 | 878 | WARN("Could not find port"); | 
| wolfSSL | 18:d89df40b4cf3 | 879 | return HTTP_PARSE; | 
| wolfSSL | 18:d89df40b4cf3 | 880 | } | 
| wolfSSL | 18:d89df40b4cf3 | 881 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 882 | *port=0; | 
| donatien | 0:2ccb9960a044 | 883 | } | 
| wolfSSL | 18:d89df40b4cf3 | 884 | char* pathPtr = strchr(hostPtr, '/'); | 
| Vanger | 38:a4ccad70be9d | 885 | if(pathPtr == NULL) { | 
| Vanger | 38:a4ccad70be9d | 886 | pathPtr = strchr(hostPtr, '#'); | 
| Vanger | 38:a4ccad70be9d | 887 | if(pathPtr != NULL) { | 
| Vanger | 38:a4ccad70be9d | 888 | pathPtr++; | 
| Vanger | 38:a4ccad70be9d | 889 | } else { | 
| Vanger | 38:a4ccad70be9d | 890 | pathPtr = (char *)(url + strlen(url)); | 
| Vanger | 38:a4ccad70be9d | 891 | } | 
| Vanger | 38:a4ccad70be9d | 892 | } | 
| Vanger | 38:a4ccad70be9d | 893 | |
| wolfSSL | 18:d89df40b4cf3 | 894 | if( hostLen == 0 ) { | 
| wolfSSL | 18:d89df40b4cf3 | 895 | hostLen = pathPtr - hostPtr; | 
| wolfSSL | 18:d89df40b4cf3 | 896 | } | 
| donatien | 0:2ccb9960a044 | 897 | |
| wolfSSL | 18:d89df40b4cf3 | 898 | if( maxHostLen < hostLen + 1 ) { //including NULL-terminating char | 
| wolfSSL | 18:d89df40b4cf3 | 899 | WARN("Host str is too small (%d >= %d)", maxHostLen, hostLen + 1); | 
| wolfSSL | 18:d89df40b4cf3 | 900 | return HTTP_PARSE; | 
| wolfSSL | 18:d89df40b4cf3 | 901 | } | 
| wolfSSL | 18:d89df40b4cf3 | 902 | memcpy(host, hostPtr, hostLen); | 
| wolfSSL | 18:d89df40b4cf3 | 903 | host[hostLen] = '\0'; | 
| donatien | 0:2ccb9960a044 | 904 | |
| wolfSSL | 18:d89df40b4cf3 | 905 | size_t pathLen; | 
| wolfSSL | 18:d89df40b4cf3 | 906 | char* fragmentPtr = strchr(hostPtr, '#'); | 
| wolfSSL | 18:d89df40b4cf3 | 907 | if(fragmentPtr != NULL) { | 
| wolfSSL | 18:d89df40b4cf3 | 908 | pathLen = fragmentPtr - pathPtr; | 
| wolfSSL | 18:d89df40b4cf3 | 909 | } else { | 
| wolfSSL | 18:d89df40b4cf3 | 910 | pathLen = strlen(pathPtr); | 
| wolfSSL | 18:d89df40b4cf3 | 911 | } | 
| donatien | 0:2ccb9960a044 | 912 | |
| wolfSSL | 18:d89df40b4cf3 | 913 | if( maxPathLen < pathLen + 1 ) { //including NULL-terminating char | 
| wolfSSL | 18:d89df40b4cf3 | 914 | WARN("Path str is too small (%d >= %d)", maxPathLen, pathLen + 1); | 
| wolfSSL | 18:d89df40b4cf3 | 915 | return HTTP_PARSE; | 
| wolfSSL | 18:d89df40b4cf3 | 916 | } | 
| wolfSSL | 18:d89df40b4cf3 | 917 | memcpy(path, pathPtr, pathLen); | 
| wolfSSL | 18:d89df40b4cf3 | 918 | path[pathLen] = '\0'; | 
| donatien | 0:2ccb9960a044 | 919 | |
| wolfSSL | 18:d89df40b4cf3 | 920 | return HTTP_OK; | 
| donatien | 0:2ccb9960a044 | 921 | } | 
| wolfSSL | 22:4b9a4151cc73 | 922 | |
| wolfSSL | 22:4b9a4151cc73 | 923 | HTTPResult HTTPClient::bAuth(void) | 
| wolfSSL | 22:4b9a4151cc73 | 924 | { | 
| wolfSSL | 22:4b9a4151cc73 | 925 | HTTPResult ret ; | 
| wolfSSL | 22:4b9a4151cc73 | 926 | char b_auth[(int)((AUTHB_SIZE+3)*4/3+1)] ; | 
| wolfSSL | 22:4b9a4151cc73 | 927 | char base64buff[AUTHB_SIZE+3] ; | 
| Vanger | 34:13920d48893d | 928 | |
| wolfSSL | 22:4b9a4151cc73 | 929 | ret = send("Authorization: Basic ") ; | 
| wolfSSL | 22:4b9a4151cc73 | 930 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 22:4b9a4151cc73 | 931 | sprintf(base64buff, "%s:%s", m_basicAuthUser, m_basicAuthPassword) ; | 
| wolfSSL | 27:5d4739eae63e | 932 | DBG("bAuth: %s", base64buff) ; | 
| wolfSSL | 22:4b9a4151cc73 | 933 | base64enc(b_auth, base64buff) ; | 
| Vanger | 37:293e8eae4230 | 934 | |
| Vanger | 34:13920d48893d | 935 | int b_auth_len = strlen(b_auth); | 
| Vanger | 34:13920d48893d | 936 | if(b_auth_len + 3 >= sizeof(b_auth)) { //\r\n\0 characters make up the +3 | 
| Vanger | 34:13920d48893d | 937 | ERR("The encoded line is larger than the buffer that holds it"); | 
| Vanger | 34:13920d48893d | 938 | } | 
| Vanger | 34:13920d48893d | 939 | b_auth[b_auth_len + 2] = '\0' ; | 
| Vanger | 34:13920d48893d | 940 | b_auth[b_auth_len + 1] = '\n' ; | 
| Vanger | 34:13920d48893d | 941 | b_auth[b_auth_len] = '\r' ; | 
| wolfSSL | 22:4b9a4151cc73 | 942 | DBG("b_auth:%s", b_auth) ; | 
| wolfSSL | 22:4b9a4151cc73 | 943 | ret = send(b_auth) ; | 
| wolfSSL | 22:4b9a4151cc73 | 944 | CHECK_CONN_ERR(ret); | 
| wolfSSL | 22:4b9a4151cc73 | 945 | return HTTP_OK ; | 
| wolfSSL | 22:4b9a4151cc73 | 946 | } |