HTTP and HTTPS library for Mbed OS 5

Dependents:   MQTTGateway2 MQTTGatewayK64 http-example-wnc GuardRoom ... more

For the example program, see: sandbox/http-example.

This library is used to make HTTP and HTTPS calls from Mbed OS 5 applications.

HTTP Request API

NetworkInterface* network = /* obtain a NetworkInterface object */

const char body[] = "{\"hello\":\"world\"}";

HttpRequest* request = new HttpRequest(network, HTTP_POST, "http://httpbin.org/post");
request->set_header("Content-Type", "application/json");
HttpResponse* response = request->send(body, strlen(body));
// if response is NULL, check response->get_error()

printf("status is %d - %s\n", response->get_status_code(), response->get_status_message());
printf("body is:\n%s\n", response->get_body_as_string().c_str());

delete request; // also clears out the response

HTTPS Request API

// pass in the root certificates that you trust, there is no central CA registry in Mbed OS
const char SSL_CA_PEM[] = "-----BEGIN CERTIFICATE-----\n"
    /* rest of the CA root certificates */;

NetworkInterface* network = /* obtain a NetworkInterface object */

const char body[] = "{\"hello\":\"world\"}";

HttpsRequest* request = new HttpsRequest(network, SSL_CA_PEM, HTTP_GET "https://httpbin.org/status/418");
HttpResponse* response = request->send();
// if response is NULL, check response->get_error()

printf("status is %d - %s\n", response->get_status_code(), response->get_status_message());
printf("body is:\n%s\n", response->get_body().c_str());

delete request;

Note: You can get the root CA for a domain easily from Firefox. Click on the green padlock, click More information > Security > View certificate > Details. Select the top entry in the 'Certificate Hierarchy' and click Export.... This gives you a PEM file. Add the content of the PEM file to your root CA list (here's an image).

Mbed TLS Entropy configuration

If your target does not have a built-in TRNG, or other entropy sources, add the following macros to your mbed_app.json file to disable entropy:

{
    "macros": [
        "MBEDTLS_TEST_NULL_ENTROPY",
        "MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES"
    ]
}

Note that this is not secure, and you should not deploy this device into production with this configuration.

Memory usage

Small requests where the body of the response is cached by the library (like the one found in main-http.cpp), require 4K of RAM. When the request is finished they require 1.5K of RAM, depending on the size of the response. This applies both to HTTP and HTTPS. If you need to handle requests that return a large response body, see 'Dealing with large body'.

HTTPS requires additional memory: on FRDM-K64F about 50K of heap space (at its peak). This means that you cannot use HTTPS on devices with less than 128K of memory, asyou also need to reserve memory for the stack and network interface.

Dealing with large response body

By default the library will store the full request body on the heap. This works well for small responses, but you'll run out of memory when receiving a large response body. To mitigate this you can pass in a callback as the last argument to the request constructor. This callback will be called whenever a chunk of the body is received. You can set the request chunk size in the HTTP_RECEIVE_BUFFER_SIZE macro (see mbed_lib.json for the definition) although it also depends on the buffer size ofthe underlying network connection.

void body_callback(const char* data, uint32_t data_len) {
    // do something with the data
}

HttpRequest* req = new HttpRequest(network, HTTP_GET, "http://pathtolargefile.com", &body_callback);
req->send(NULL, 0);

Dealing with a large request body

If you cannot load the full request into memory, you can pass a callback into the send function. Through this callback you can feed in chunks of the request body. This is very useful if you want to send files from a file system.

const void * get_chunk(uint32_t* out_size) {
    // set the value of out_size (via *out_size = 10) to the size of the buffer
    // return the buffer

    // if you don't have any more data, set *out_size to 0
}

HttpRequest* req = new HttpRequest(network, HTTP_POST, "http://my_api.com/upload");
req->send(callback(&get_chunk));

Socket re-use

By default the library opens a new socket per request. This is wasteful, especially when dealing with TLS requests. You can re-use sockets like this:

HTTP

TCPSocket* socket = new TCPSocket();

nsapi_error_t open_result = socket->open(network);
// check open_result

nsapi_error_t connect_result = socket->connect("httpbin.org", 80);
// check connect_result

// Pass in `socket`, instead of `network` as first argument
HttpRequest* req = new HttpRequest(socket, HTTP_GET, "http://httpbin.org/status/418");

HTTPS

TLSSocket* socket = new TLSSocket();

nsapi_error_t r;
// make sure to check the return values for the calls below (should return NSAPI_ERROR_OK)
r = socket->open(network);
r = socket->set_root_ca_cert(SSL_CA_PEM);
r = socket->connect("httpbin.org", 443);

// Pass in `socket`, instead of `network` as first argument, and omit the `SSL_CA_PEM` argument
HttpsRequest* get_req = new HttpsRequest(socket, HTTP_GET, "https://httpbin.org/status/418");

Request logging

To make debugging easier you can log the raw request body that goes over the line. This also works with chunked encoding.

uint8_t *request_buffer = (uint8_t*)calloc(2048, 1);
req->set_request_log_buffer(request_buffer, 2048);

// after the request is done:
printf("\n----- Request buffer -----\n");
for (size_t ix = 0; ix < req->get_request_log_buffer_length(); ix++) {
    printf("%02x ", request_buffer[ix]);
}
printf("\n");

Integration tests

Integration tests are located in the TESTS folder and are ran through Greentea. Instructions on how to run the tests are in http-example.

Mbed OS 5.10 or lower

If you want to use this library on Mbed OS 5.10 or lower, you need to add the TLSSocket library to your project. This library is included in Mbed OS 5.11 and up.

Tested on

  • K64F with Ethernet.
  • NUCLEO_F411RE with ESP8266.
  • ODIN-W2 with WiFi.
  • K64F with Atmel 6LoWPAN shield.
  • DISCO-L475VG-IOT01A with WiFi.
  • Mbed Simulator.
Committer:
Jan Jongboom
Date:
Fri Jul 28 14:26:26 2017 +0200
Revision:
15:ffc77f212382
Parent:
11:96e4dcb9c0c2
Child:
20:0e63d6a93c02
Add request parsing to prepare for HTTP server example

Who changed what in which revision?

UserRevisionLine numberNew contents of line
Jan Jongboom 0:910f5949759f 1 /*
Jan Jongboom 0:910f5949759f 2 * PackageLicenseDeclared: Apache-2.0
Jan Jongboom 0:910f5949759f 3 * Copyright (c) 2017 ARM Limited
Jan Jongboom 0:910f5949759f 4 *
Jan Jongboom 0:910f5949759f 5 * Licensed under the Apache License, Version 2.0 (the "License");
Jan Jongboom 0:910f5949759f 6 * you may not use this file except in compliance with the License.
Jan Jongboom 0:910f5949759f 7 * You may obtain a copy of the License at
Jan Jongboom 0:910f5949759f 8 *
Jan Jongboom 0:910f5949759f 9 * http://www.apache.org/licenses/LICENSE-2.0
Jan Jongboom 0:910f5949759f 10 *
Jan Jongboom 0:910f5949759f 11 * Unless required by applicable law or agreed to in writing, software
Jan Jongboom 0:910f5949759f 12 * distributed under the License is distributed on an "AS IS" BASIS,
Jan Jongboom 0:910f5949759f 13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
Jan Jongboom 0:910f5949759f 14 * See the License for the specific language governing permissions and
Jan Jongboom 0:910f5949759f 15 * limitations under the License.
Jan Jongboom 0:910f5949759f 16 */
Jan Jongboom 0:910f5949759f 17
Jan Jongboom 0:910f5949759f 18 #ifndef _MBED_HTTPS_REQUEST_H_
Jan Jongboom 0:910f5949759f 19 #define _MBED_HTTPS_REQUEST_H_
Jan Jongboom 0:910f5949759f 20
Jan Jongboom 0:910f5949759f 21 #include <string>
Jan Jongboom 0:910f5949759f 22 #include <vector>
Jan Jongboom 0:910f5949759f 23 #include <map>
Jan Jongboom 0:910f5949759f 24 #include "http_parser.h"
Jan Jongboom 0:910f5949759f 25 #include "http_response.h"
Jan Jongboom 0:910f5949759f 26 #include "http_request_builder.h"
Jan Jongboom 15:ffc77f212382 27 #include "http_request_parser.h"
Jan Jongboom 0:910f5949759f 28 #include "http_parsed_url.h"
Jan Jongboom 11:96e4dcb9c0c2 29 #include "tls_socket.h"
Jan Jongboom 0:910f5949759f 30
Jan Jongboom 0:910f5949759f 31 /**
Jan Jongboom 0:910f5949759f 32 * \brief HttpsRequest implements the logic for interacting with HTTPS servers.
Jan Jongboom 0:910f5949759f 33 */
Jan Jongboom 0:910f5949759f 34 class HttpsRequest {
Jan Jongboom 0:910f5949759f 35 public:
Jan Jongboom 0:910f5949759f 36 /**
Jan Jongboom 0:910f5949759f 37 * HttpsRequest Constructor
Jan Jongboom 0:910f5949759f 38 * Initializes the TCP socket, sets up event handlers and flags.
Jan Jongboom 0:910f5949759f 39 *
Jan Jongboom 0:910f5949759f 40 * @param[in] net_iface The network interface
Jan Jongboom 0:910f5949759f 41 * @param[in] ssl_ca_pem String containing the trusted CAs
Jan Jongboom 0:910f5949759f 42 * @param[in] method HTTP method to use
Jan Jongboom 0:910f5949759f 43 * @param[in] url URL to the resource
Jan Jongboom 0:910f5949759f 44 * @param[in] body_callback Callback on which to retrieve chunks of the response body.
Jan Jongboom 0:910f5949759f 45 If not set, the complete body will be allocated on the HttpResponse object,
Jan Jongboom 0:910f5949759f 46 which might use lots of memory.
Jan Jongboom 0:910f5949759f 47 */
Jan Jongboom 0:910f5949759f 48 HttpsRequest(NetworkInterface* net_iface,
Jan Jongboom 0:910f5949759f 49 const char* ssl_ca_pem,
Jan Jongboom 0:910f5949759f 50 http_method method,
Jan Jongboom 0:910f5949759f 51 const char* url,
Jan Jongboom 0:910f5949759f 52 Callback<void(const char *at, size_t length)> body_callback = 0)
Jan Jongboom 0:910f5949759f 53 {
Jan Jongboom 0:910f5949759f 54 _parsed_url = new ParsedUrl(url);
Jan Jongboom 0:910f5949759f 55 _body_callback = body_callback;
Jan Jongboom 0:910f5949759f 56 _request_builder = new HttpRequestBuilder(method, _parsed_url);
Jan Jongboom 0:910f5949759f 57 _response = NULL;
Jan Jongboom 0:910f5949759f 58 _debug = false;
Jan Jongboom 0:910f5949759f 59
Jan Jongboom 11:96e4dcb9c0c2 60 _tlssocket = new TLSSocket(net_iface, _parsed_url->host(), _parsed_url->port(), ssl_ca_pem);
Jan Jongboom 11:96e4dcb9c0c2 61 _we_created_the_socket = true;
Jan Jongboom 11:96e4dcb9c0c2 62 }
Jan Jongboom 0:910f5949759f 63
Jan Jongboom 11:96e4dcb9c0c2 64 /**
Jan Jongboom 11:96e4dcb9c0c2 65 * HttpsRequest Constructor
Jan Jongboom 11:96e4dcb9c0c2 66 * Sets up event handlers and flags.
Jan Jongboom 11:96e4dcb9c0c2 67 *
Jan Jongboom 11:96e4dcb9c0c2 68 * @param[in] socket A connected TLSSocket
Jan Jongboom 11:96e4dcb9c0c2 69 * @param[in] method HTTP method to use
Jan Jongboom 11:96e4dcb9c0c2 70 * @param[in] url URL to the resource
Jan Jongboom 11:96e4dcb9c0c2 71 * @param[in] body_callback Callback on which to retrieve chunks of the response body.
Jan Jongboom 11:96e4dcb9c0c2 72 If not set, the complete body will be allocated on the HttpResponse object,
Jan Jongboom 11:96e4dcb9c0c2 73 which might use lots of memory.
Jan Jongboom 11:96e4dcb9c0c2 74 */
Jan Jongboom 11:96e4dcb9c0c2 75 HttpsRequest(TLSSocket* socket,
Jan Jongboom 11:96e4dcb9c0c2 76 http_method method,
Jan Jongboom 11:96e4dcb9c0c2 77 const char* url,
Jan Jongboom 11:96e4dcb9c0c2 78 Callback<void(const char *at, size_t length)> body_callback = 0)
Jan Jongboom 11:96e4dcb9c0c2 79 {
Jan Jongboom 11:96e4dcb9c0c2 80 _parsed_url = new ParsedUrl(url);
Jan Jongboom 11:96e4dcb9c0c2 81 _body_callback = body_callback;
Jan Jongboom 11:96e4dcb9c0c2 82 _request_builder = new HttpRequestBuilder(method, _parsed_url);
Jan Jongboom 11:96e4dcb9c0c2 83 _response = NULL;
Jan Jongboom 11:96e4dcb9c0c2 84 _debug = false;
Jan Jongboom 11:96e4dcb9c0c2 85
Jan Jongboom 11:96e4dcb9c0c2 86 _tlssocket = socket;
Jan Jongboom 11:96e4dcb9c0c2 87 _we_created_the_socket = false;
Jan Jongboom 0:910f5949759f 88 }
Jan Jongboom 0:910f5949759f 89
Jan Jongboom 0:910f5949759f 90 /**
Jan Jongboom 0:910f5949759f 91 * HttpsRequest Destructor
Jan Jongboom 0:910f5949759f 92 */
Jan Jongboom 0:910f5949759f 93 ~HttpsRequest() {
Jan Jongboom 0:910f5949759f 94 if (_request_builder) {
Jan Jongboom 0:910f5949759f 95 delete _request_builder;
Jan Jongboom 0:910f5949759f 96 }
Jan Jongboom 0:910f5949759f 97
Jan Jongboom 11:96e4dcb9c0c2 98 if (_tlssocket && _we_created_the_socket) {
Jan Jongboom 11:96e4dcb9c0c2 99 delete _tlssocket;
Jan Jongboom 0:910f5949759f 100 }
Jan Jongboom 0:910f5949759f 101
Jan Jongboom 0:910f5949759f 102 if (_parsed_url) {
Jan Jongboom 0:910f5949759f 103 delete _parsed_url;
Jan Jongboom 0:910f5949759f 104 }
Jan Jongboom 0:910f5949759f 105
Jan Jongboom 0:910f5949759f 106 if (_response) {
Jan Jongboom 0:910f5949759f 107 delete _response;
Jan Jongboom 0:910f5949759f 108 }
Jan Jongboom 0:910f5949759f 109 }
Jan Jongboom 0:910f5949759f 110
Jan Jongboom 0:910f5949759f 111 /**
Jan Jongboom 0:910f5949759f 112 * Execute the HTTPS request.
Jan Jongboom 0:910f5949759f 113 *
Jan Jongboom 0:910f5949759f 114 * @param[in] body Pointer to the request body
Jan Jongboom 0:910f5949759f 115 * @param[in] body_size Size of the request body
Jan Jongboom 0:910f5949759f 116 * @return An HttpResponse pointer on success, or NULL on failure.
Jan Jongboom 0:910f5949759f 117 * See get_error() for the error code.
Jan Jongboom 0:910f5949759f 118 */
Jan Jongboom 0:910f5949759f 119 HttpResponse* send(const void* body = NULL, nsapi_size_t body_size = 0) {
Jan Jongboom 11:96e4dcb9c0c2 120 // not tried to connect before?
Jan Jongboom 11:96e4dcb9c0c2 121 if (_tlssocket->error() != 0) {
Jan Jongboom 11:96e4dcb9c0c2 122 _error = _tlssocket->error();
Jan Jongboom 0:910f5949759f 123 return NULL;
Jan Jongboom 0:910f5949759f 124 }
Jan Jongboom 0:910f5949759f 125
Jan Jongboom 11:96e4dcb9c0c2 126 bool socket_was_open = _tlssocket->connected();
Jan Jongboom 0:910f5949759f 127
Jan Jongboom 11:96e4dcb9c0c2 128 if (!socket_was_open) {
Jan Jongboom 11:96e4dcb9c0c2 129 nsapi_error_t r = _tlssocket->connect();
Jan Jongboom 11:96e4dcb9c0c2 130 if (r != 0) {
Jan Jongboom 11:96e4dcb9c0c2 131 _error = r;
Jan Jongboom 11:96e4dcb9c0c2 132 return NULL;
Jan Jongboom 11:96e4dcb9c0c2 133 }
Jan Jongboom 0:910f5949759f 134 }
Jan Jongboom 0:910f5949759f 135
Jan Jongboom 11:96e4dcb9c0c2 136 int ret;
Jan Jongboom 0:910f5949759f 137
Jan Jongboom 10:b017c7d2cf23 138 size_t request_size = 0;
Jan Jongboom 10:b017c7d2cf23 139 char* request = _request_builder->build(body, body_size, request_size);
Jan Jongboom 0:910f5949759f 140
Jan Jongboom 11:96e4dcb9c0c2 141 ret = mbedtls_ssl_write(_tlssocket->get_ssl_context(), (const unsigned char *) request, request_size);
Jan Jongboom 0:910f5949759f 142
Jan Jongboom 0:910f5949759f 143 free(request);
Jan Jongboom 0:910f5949759f 144
Jan Jongboom 0:910f5949759f 145 if (ret < 0) {
Jan Jongboom 0:910f5949759f 146 if (ret != MBEDTLS_ERR_SSL_WANT_READ &&
Jan Jongboom 0:910f5949759f 147 ret != MBEDTLS_ERR_SSL_WANT_WRITE) {
Jan Jongboom 0:910f5949759f 148 print_mbedtls_error("mbedtls_ssl_write", ret);
Jan Jongboom 11:96e4dcb9c0c2 149 onError(_tlssocket->get_tcp_socket(), -1 );
Jan Jongboom 0:910f5949759f 150 }
Jan Jongboom 0:910f5949759f 151 else {
Jan Jongboom 0:910f5949759f 152 _error = ret;
Jan Jongboom 0:910f5949759f 153 }
Jan Jongboom 0:910f5949759f 154 return NULL;
Jan Jongboom 0:910f5949759f 155 }
Jan Jongboom 0:910f5949759f 156
Jan Jongboom 0:910f5949759f 157 // Create a response object
Jan Jongboom 0:910f5949759f 158 _response = new HttpResponse();
Jan Jongboom 0:910f5949759f 159 // And a response parser
Jan Jongboom 15:ffc77f212382 160 HttpParser parser(_response, HTTP_RESPONSE, _body_callback);
Jan Jongboom 0:910f5949759f 161
Jan Jongboom 0:910f5949759f 162 // Set up a receive buffer (on the heap)
Jan Jongboom 0:910f5949759f 163 uint8_t* recv_buffer = (uint8_t*)malloc(HTTP_RECEIVE_BUFFER_SIZE);
Jan Jongboom 0:910f5949759f 164
Jan Jongboom 0:910f5949759f 165 /* Read data out of the socket */
Jan Jongboom 11:96e4dcb9c0c2 166 while ((ret = mbedtls_ssl_read(_tlssocket->get_ssl_context(), (unsigned char *) recv_buffer, HTTP_RECEIVE_BUFFER_SIZE)) > 0) {
Jan Jongboom 0:910f5949759f 167 // Don't know if this is actually needed, but OK
Jan Jongboom 0:910f5949759f 168 size_t _bpos = static_cast<size_t>(ret);
Jan Jongboom 0:910f5949759f 169 recv_buffer[_bpos] = 0;
Jan Jongboom 0:910f5949759f 170
Jan Jongboom 0:910f5949759f 171 size_t nparsed = parser.execute((const char*)recv_buffer, _bpos);
Jan Jongboom 0:910f5949759f 172 if (nparsed != _bpos) {
Jan Jongboom 0:910f5949759f 173 print_mbedtls_error("parser_error", nparsed);
Jan Jongboom 0:910f5949759f 174 // parser error...
Jan Jongboom 0:910f5949759f 175 _error = -2101;
Jan Jongboom 0:910f5949759f 176 free(recv_buffer);
Jan Jongboom 0:910f5949759f 177 return NULL;
Jan Jongboom 0:910f5949759f 178 }
Jan Jongboom 6:112d72c60e07 179
Jan Jongboom 7:2e3eedb9ca5c 180 if (_response->is_message_complete()) {
Jan Jongboom 0:910f5949759f 181 break;
Jan Jongboom 0:910f5949759f 182 }
Jan Jongboom 0:910f5949759f 183 }
Jan Jongboom 0:910f5949759f 184 if (ret < 0) {
Jan Jongboom 0:910f5949759f 185 if (ret != MBEDTLS_ERR_SSL_WANT_READ && ret != MBEDTLS_ERR_SSL_WANT_WRITE) {
Jan Jongboom 0:910f5949759f 186 print_mbedtls_error("mbedtls_ssl_read", ret);
Jan Jongboom 11:96e4dcb9c0c2 187 onError(_tlssocket->get_tcp_socket(), -1 );
Jan Jongboom 0:910f5949759f 188 }
Jan Jongboom 0:910f5949759f 189 else {
Jan Jongboom 0:910f5949759f 190 _error = ret;
Jan Jongboom 0:910f5949759f 191 }
Jan Jongboom 0:910f5949759f 192 free(recv_buffer);
Jan Jongboom 0:910f5949759f 193 return NULL;
Jan Jongboom 0:910f5949759f 194 }
Jan Jongboom 0:910f5949759f 195
Jan Jongboom 0:910f5949759f 196 parser.finish();
Jan Jongboom 0:910f5949759f 197
Jan Jongboom 11:96e4dcb9c0c2 198 if (!socket_was_open) {
Jan Jongboom 11:96e4dcb9c0c2 199 _tlssocket->get_tcp_socket()->close();
Jan Jongboom 11:96e4dcb9c0c2 200 }
Jan Jongboom 11:96e4dcb9c0c2 201
Jan Jongboom 0:910f5949759f 202 free(recv_buffer);
Jan Jongboom 0:910f5949759f 203
Jan Jongboom 0:910f5949759f 204 return _response;
Jan Jongboom 0:910f5949759f 205 }
Jan Jongboom 0:910f5949759f 206
Jan Jongboom 0:910f5949759f 207 /**
Jan Jongboom 11:96e4dcb9c0c2 208 * Closes the underlying TCP socket
Jan Jongboom 0:910f5949759f 209 */
Jan Jongboom 0:910f5949759f 210 void close() {
Jan Jongboom 11:96e4dcb9c0c2 211 _tlssocket->get_tcp_socket()->close();
Jan Jongboom 0:910f5949759f 212 }
Jan Jongboom 0:910f5949759f 213
Jan Jongboom 0:910f5949759f 214 /**
Jan Jongboom 0:910f5949759f 215 * Set a header for the request.
Jan Jongboom 0:910f5949759f 216 *
Jan Jongboom 0:910f5949759f 217 * The 'Host' and 'Content-Length' headers are set automatically.
Jan Jongboom 0:910f5949759f 218 * Setting the same header twice will overwrite the previous entry.
Jan Jongboom 0:910f5949759f 219 *
Jan Jongboom 0:910f5949759f 220 * @param[in] key Header key
Jan Jongboom 0:910f5949759f 221 * @param[in] value Header value
Jan Jongboom 0:910f5949759f 222 */
Jan Jongboom 0:910f5949759f 223 void set_header(string key, string value) {
Jan Jongboom 0:910f5949759f 224 _request_builder->set_header(key, value);
Jan Jongboom 0:910f5949759f 225 }
Jan Jongboom 0:910f5949759f 226
Jan Jongboom 0:910f5949759f 227 /**
Jan Jongboom 0:910f5949759f 228 * Get the error code.
Jan Jongboom 0:910f5949759f 229 *
Jan Jongboom 0:910f5949759f 230 * When send() fails, this error is set.
Jan Jongboom 0:910f5949759f 231 */
Jan Jongboom 0:910f5949759f 232 nsapi_error_t get_error() {
Jan Jongboom 0:910f5949759f 233 return _error;
Jan Jongboom 0:910f5949759f 234 }
Jan Jongboom 0:910f5949759f 235
Jan Jongboom 0:910f5949759f 236 /**
Jan Jongboom 0:910f5949759f 237 * Set the debug flag.
Jan Jongboom 0:910f5949759f 238 *
Jan Jongboom 0:910f5949759f 239 * If this flag is set, debug information from mbed TLS will be logged to stdout.
Jan Jongboom 0:910f5949759f 240 */
Jan Jongboom 0:910f5949759f 241 void set_debug(bool debug) {
Jan Jongboom 0:910f5949759f 242 _debug = debug;
Jan Jongboom 11:96e4dcb9c0c2 243
Jan Jongboom 11:96e4dcb9c0c2 244 _tlssocket->set_debug(debug);
Jan Jongboom 0:910f5949759f 245 }
Jan Jongboom 0:910f5949759f 246
Jan Jongboom 11:96e4dcb9c0c2 247
Jan Jongboom 0:910f5949759f 248 protected:
Jan Jongboom 0:910f5949759f 249 /**
Jan Jongboom 0:910f5949759f 250 * Helper for pretty-printing mbed TLS error codes
Jan Jongboom 0:910f5949759f 251 */
Jan Jongboom 0:910f5949759f 252 static void print_mbedtls_error(const char *name, int err) {
Jan Jongboom 0:910f5949759f 253 char buf[128];
Jan Jongboom 0:910f5949759f 254 mbedtls_strerror(err, buf, sizeof (buf));
Jan Jongboom 0:910f5949759f 255 mbedtls_printf("%s() failed: -0x%04x (%d): %s\r\n", name, -err, err, buf);
Jan Jongboom 0:910f5949759f 256 }
Jan Jongboom 0:910f5949759f 257
Jan Jongboom 0:910f5949759f 258 void onError(TCPSocket *s, int error) {
Jan Jongboom 0:910f5949759f 259 s->close();
Jan Jongboom 0:910f5949759f 260 _error = error;
Jan Jongboom 0:910f5949759f 261 }
Jan Jongboom 0:910f5949759f 262
Jan Jongboom 0:910f5949759f 263 protected:
Jan Jongboom 11:96e4dcb9c0c2 264 TLSSocket* _tlssocket;
Jan Jongboom 11:96e4dcb9c0c2 265 bool _we_created_the_socket;
Jan Jongboom 0:910f5949759f 266
Jan Jongboom 0:910f5949759f 267 Callback<void(const char *at, size_t length)> _body_callback;
Jan Jongboom 0:910f5949759f 268 ParsedUrl* _parsed_url;
Jan Jongboom 0:910f5949759f 269 HttpRequestBuilder* _request_builder;
Jan Jongboom 0:910f5949759f 270 HttpResponse* _response;
Jan Jongboom 0:910f5949759f 271
Jan Jongboom 0:910f5949759f 272 nsapi_error_t _error;
Jan Jongboom 0:910f5949759f 273 bool _debug;
Jan Jongboom 0:910f5949759f 274
Jan Jongboom 0:910f5949759f 275 };
Jan Jongboom 0:910f5949759f 276
Jan Jongboom 0:910f5949759f 277 #endif // _MBED_HTTPS_REQUEST_H_