Fork of wolfSSL's HTTPClient fork. Fork!

Dependencies:   CyaSSL

Dependents:   exosite_http_example exosite_http_example

Fork of HTTPClient by wolf SSL

Committer:
PBarrett
Date:
Tue Jan 20 14:13:07 2015 +0000
Revision:
31:612864287dd9
Parent:
30:a9ecee69c6b5
add multiple header support plus a hacky mess for content-types

Who changed what in which revision?

UserRevisionLine numberNew contents of line
donatien 0:2ccb9960a044 1 /* HTTPClient.cpp */
donatien 10:e1351de84c16 2 /* Copyright (C) 2012 mbed.org, MIT License
donatien 10:e1351de84c16 3 *
donatien 10:e1351de84c16 4 * Permission is hereby granted, free of charge, to any person obtaining a copy of this software
donatien 10:e1351de84c16 5 * and associated documentation files (the "Software"), to deal in the Software without restriction,
donatien 10:e1351de84c16 6 * including without limitation the rights to use, copy, modify, merge, publish, distribute,
donatien 10:e1351de84c16 7 * sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is
donatien 10:e1351de84c16 8 * furnished to do so, subject to the following conditions:
donatien 10:e1351de84c16 9 *
donatien 10:e1351de84c16 10 * The above copyright notice and this permission notice shall be included in all copies or
donatien 10:e1351de84c16 11 * substantial portions of the Software.
donatien 10:e1351de84c16 12 *
donatien 10:e1351de84c16 13 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
donatien 10:e1351de84c16 14 * BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
donatien 10:e1351de84c16 15 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
donatien 10:e1351de84c16 16 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
donatien 10:e1351de84c16 17 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
donatien 10:e1351de84c16 18 */
donatien 0:2ccb9960a044 19
donatien 7:4e39864f7b15 20 //Debug is disabled by default
donatien 16:1f743885e7de 21 #if 0
donatien 12:89d09a6db00a 22 //Enable debug
donatien 11:390362de8c3f 23 #include <cstdio>
wolfSSL 18:d89df40b4cf3 24 #define DBG(x, ...) std::printf("[HTTPClient : DBG]"x"\r\n", ##__VA_ARGS__);
wolfSSL 18:d89df40b4cf3 25 #define WARN(x, ...) std::printf("[HTTPClient : WARN]"x"\r\n", ##__VA_ARGS__);
wolfSSL 18:d89df40b4cf3 26 #define ERR(x, ...) std::printf("[HTTPClient : ERR]"x"\r\n", ##__VA_ARGS__);
donatien 12:89d09a6db00a 27
donatien 12:89d09a6db00a 28 #else
donatien 12:89d09a6db00a 29 //Disable debug
wolfSSL 18:d89df40b4cf3 30 #define DBG(x, ...)
donatien 12:89d09a6db00a 31 #define WARN(x, ...)
wolfSSL 18:d89df40b4cf3 32 #define ERR(x, ...)
donatien 12:89d09a6db00a 33
donatien 7:4e39864f7b15 34 #endif
donatien 0:2ccb9960a044 35
donatien 0:2ccb9960a044 36 #define HTTP_PORT 80
wolfSSL 17:c73d8e61d391 37 #define HTTPS_PORT 443
donatien 0:2ccb9960a044 38
donatien 11:390362de8c3f 39 #define OK 0
donatien 11:390362de8c3f 40
donatien 11:390362de8c3f 41 #define MIN(x,y) (((x)<(y))?(x):(y))
donatien 11:390362de8c3f 42 #define MAX(x,y) (((x)>(y))?(x):(y))
donatien 11:390362de8c3f 43
wolfSSL 17:c73d8e61d391 44 #include <cstring>
donatien 0:2ccb9960a044 45
wolfSSL 17:c73d8e61d391 46 #include <../CyaSSL/cyassl/ctaocrypt/settings.h>
wolfSSL 17:c73d8e61d391 47 #include <../CyaSSL/cyassl/ctaocrypt/types.h>
wolfSSL 17:c73d8e61d391 48 #include <../CyaSSL/cyassl/internal.h>
wolfSSL 17:c73d8e61d391 49 #include <../CyaSSL/cyassl/ssl.h>
donatien 0:2ccb9960a044 50
donatien 11:390362de8c3f 51 #include "HTTPClient.h"
wolfSSL 17:c73d8e61d391 52 #include "TCPSocketConnection.h"
wolfSSL 17:c73d8e61d391 53
wolfSSL 19:1e2f05809eb1 54 static TCPSocketConnection m_sock;
wolfSSL 17:c73d8e61d391 55 #define CHUNK_SIZE 256
wolfSSL 17:c73d8e61d391 56 #define SEND_BUF_SIZE 512
wolfSSL 17:c73d8e61d391 57 static char send_buf[SEND_BUF_SIZE] ;
wolfSSL 17:c73d8e61d391 58 static char *send_buf_p ;
wolfSSL 17:c73d8e61d391 59
wolfSSL 17:c73d8e61d391 60 static int SocketReceive(CYASSL* ssl, char *buf, int sz, void *ctx)
wolfSSL 17:c73d8e61d391 61 {
wolfSSL 17:c73d8e61d391 62 int n ;
wolfSSL 17:c73d8e61d391 63 int i ;
wolfSSL 18:d89df40b4cf3 64 #define RECV_RETRY 3
wolfSSL 22:4b9a4151cc73 65
wolfSSL 17:c73d8e61d391 66 for(i=0; i<RECV_RETRY; i++) {
wolfSSL 17:c73d8e61d391 67 n = m_sock.receive(buf, sz) ;
wolfSSL 17:c73d8e61d391 68 if(n >= 0)return n ;
wolfSSL 22:4b9a4151cc73 69 wait(0.2) ;
wolfSSL 17:c73d8e61d391 70 }
wolfSSL 17:c73d8e61d391 71 ERR("SocketReceive:%d/%d\n", n, sz) ;
wolfSSL 17:c73d8e61d391 72 return n ;
wolfSSL 17:c73d8e61d391 73 }
wolfSSL 17:c73d8e61d391 74
wolfSSL 17:c73d8e61d391 75 static int SocketSend(CYASSL* ssl, char *buf, int sz, void *ctx)
wolfSSL 17:c73d8e61d391 76 {
wolfSSL 17:c73d8e61d391 77 int n ;
PBarrett 31:612864287dd9 78
wolfSSL 22:4b9a4151cc73 79 wait(0.1) ;
wolfSSL 17:c73d8e61d391 80 n = m_sock.send(buf, sz);
wolfSSL 17:c73d8e61d391 81 if(n > 0) {
wolfSSL 22:4b9a4151cc73 82 wait(0.3) ;
wolfSSL 17:c73d8e61d391 83 return n ;
wolfSSL 17:c73d8e61d391 84 } else ERR("SocketSend:%d/%d\n", n, sz);
wolfSSL 17:c73d8e61d391 85 return n ;
wolfSSL 17:c73d8e61d391 86 }
donatien 11:390362de8c3f 87
PBarrett 31:612864287dd9 88 static void base64enc(char *out, const char *in) {
wolfSSL 22:4b9a4151cc73 89 const char code[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=" ;
wolfSSL 22:4b9a4151cc73 90 int i = 0, x = 0, l = 0;
wolfSSL 22:4b9a4151cc73 91
wolfSSL 22:4b9a4151cc73 92 for (; *in; in++) {
wolfSSL 22:4b9a4151cc73 93 x = x << 8 | *in;
wolfSSL 22:4b9a4151cc73 94 for (l += 8; l >= 6; l -= 6) {
wolfSSL 22:4b9a4151cc73 95 out[i++] = code[(x >> (l - 6)) & 0x3f];
wolfSSL 22:4b9a4151cc73 96 }
wolfSSL 22:4b9a4151cc73 97 }
wolfSSL 22:4b9a4151cc73 98 if (l > 0) {
wolfSSL 22:4b9a4151cc73 99 x <<= 6 - l;
wolfSSL 22:4b9a4151cc73 100 out[i++] = code[x & 0x3f];
wolfSSL 22:4b9a4151cc73 101 }
wolfSSL 22:4b9a4151cc73 102 for (; i % 4;) {
wolfSSL 22:4b9a4151cc73 103 out[i++] = '=';
wolfSSL 22:4b9a4151cc73 104 }
wolfSSL 22:4b9a4151cc73 105 out[i] = '\0' ;
wolfSSL 22:4b9a4151cc73 106 }
wolfSSL 22:4b9a4151cc73 107
donatien 0:2ccb9960a044 108 HTTPClient::HTTPClient() :
wolfSSL 18:d89df40b4cf3 109 m_basicAuthUser(NULL), m_basicAuthPassword(NULL), m_httpResponseCode(0)
donatien 0:2ccb9960a044 110 {
wolfSSL 22:4b9a4151cc73 111
wolfSSL 22:4b9a4151cc73 112 /* CyaSSL_Debugging_ON() ; */
PBarrett 31:612864287dd9 113
wolfSSL 18:d89df40b4cf3 114 ctx = 0 ;
wolfSSL 18:d89df40b4cf3 115 ssl = 0 ;
PBarrett 31:612864287dd9 116 SSLver = 3 ;
donatien 0:2ccb9960a044 117 }
donatien 0:2ccb9960a044 118
donatien 0:2ccb9960a044 119 HTTPClient::~HTTPClient()
donatien 0:2ccb9960a044 120 {
donatien 0:2ccb9960a044 121
donatien 0:2ccb9960a044 122 }
donatien 0:2ccb9960a044 123
wolfSSL 22:4b9a4151cc73 124 HTTPResult HTTPClient::basicAuth(const char* user, const char* password) //Basic Authentification
donatien 0:2ccb9960a044 125 {
PBarrett 31:612864287dd9 126 #define AUTHB_SIZE 128
wolfSSL 22:4b9a4151cc73 127 if((strlen(user) + strlen(password)) >= AUTHB_SIZE)
wolfSSL 22:4b9a4151cc73 128 return HTTP_ERROR ;
wolfSSL 18:d89df40b4cf3 129 m_basicAuthUser = user;
wolfSSL 18:d89df40b4cf3 130 m_basicAuthPassword = password;
wolfSSL 22:4b9a4151cc73 131 return HTTP_OK ;
donatien 0:2ccb9960a044 132 }
donatien 0:2ccb9960a044 133
donatien 12:89d09a6db00a 134 HTTPResult HTTPClient::get(const char* url, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 135 {
wolfSSL 18:d89df40b4cf3 136 return connect(url, HTTP_GET, NULL, pDataIn, timeout);
donatien 0:2ccb9960a044 137 }
donatien 0:2ccb9960a044 138
donatien 12:89d09a6db00a 139 HTTPResult HTTPClient::get(const char* url, char* result, size_t maxResultLen, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 140 {
wolfSSL 18:d89df40b4cf3 141 HTTPText str(result, maxResultLen);
wolfSSL 18:d89df40b4cf3 142 return get(url, &str, timeout);
donatien 0:2ccb9960a044 143 }
donatien 0:2ccb9960a044 144
donatien 12:89d09a6db00a 145 HTTPResult HTTPClient::post(const char* url, const IHTTPDataOut& dataOut, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 146 {
wolfSSL 18:d89df40b4cf3 147 return connect(url, HTTP_POST, (IHTTPDataOut*)&dataOut, pDataIn, timeout);
donatien 0:2ccb9960a044 148 }
donatien 0:2ccb9960a044 149
donatien 16:1f743885e7de 150 HTTPResult HTTPClient::put(const char* url, const IHTTPDataOut& dataOut, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 16:1f743885e7de 151 {
wolfSSL 18:d89df40b4cf3 152 return connect(url, HTTP_PUT, (IHTTPDataOut*)&dataOut, pDataIn, timeout);
donatien 16:1f743885e7de 153 }
donatien 16:1f743885e7de 154
donatien 16:1f743885e7de 155 HTTPResult HTTPClient::del(const char* url, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 16:1f743885e7de 156 {
wolfSSL 18:d89df40b4cf3 157 return connect(url, HTTP_DELETE, NULL, pDataIn, timeout);
donatien 16:1f743885e7de 158 }
donatien 16:1f743885e7de 159
donatien 16:1f743885e7de 160
donatien 0:2ccb9960a044 161 int HTTPClient::getHTTPResponseCode()
donatien 0:2ccb9960a044 162 {
wolfSSL 18:d89df40b4cf3 163 return m_httpResponseCode;
donatien 0:2ccb9960a044 164 }
donatien 0:2ccb9960a044 165
PBarrett 31:612864287dd9 166 void HTTPClient::setHeader(int idx, char * h)
wolfSSL 17:c73d8e61d391 167 {
PBarrett 31:612864287dd9 168 if (idx < MAX_HEADER_COUNT)
PBarrett 31:612864287dd9 169 header[idx] = h;
wolfSSL 17:c73d8e61d391 170 }
wolfSSL 17:c73d8e61d391 171
PBarrett 31:612864287dd9 172 HTTPResult HTTPClient::setSSLversion(int minorV)
wolfSSL 27:5d4739eae63e 173 {
PBarrett 31:612864287dd9 174 if((minorV>=0) && (minorV<=3))
wolfSSL 22:4b9a4151cc73 175 SSLver = minorV ;
wolfSSL 22:4b9a4151cc73 176 else return HTTP_ERROR ;
wolfSSL 22:4b9a4151cc73 177 return HTTP_OK ;
wolfSSL 22:4b9a4151cc73 178 }
wolfSSL 22:4b9a4151cc73 179
wolfSSL 17:c73d8e61d391 180
donatien 5:791fc3dcb6c4 181 #define CHECK_CONN_ERR(ret) \
donatien 5:791fc3dcb6c4 182 do{ \
donatien 7:4e39864f7b15 183 if(ret) { \
wolfSSL 17:c73d8e61d391 184 cyassl_free() ;\
donatien 7:4e39864f7b15 185 m_sock.close(); \
donatien 5:791fc3dcb6c4 186 ERR("Connection error (%d)", ret); \
donatien 11:390362de8c3f 187 return HTTP_CONN; \
donatien 5:791fc3dcb6c4 188 } \
donatien 5:791fc3dcb6c4 189 } while(0)
donatien 5:791fc3dcb6c4 190
donatien 5:791fc3dcb6c4 191 #define PRTCL_ERR() \
donatien 5:791fc3dcb6c4 192 do{ \
wolfSSL 17:c73d8e61d391 193 cyassl_free() ;\
donatien 7:4e39864f7b15 194 m_sock.close(); \
donatien 5:791fc3dcb6c4 195 ERR("Protocol error"); \
donatien 11:390362de8c3f 196 return HTTP_PRTCL; \
donatien 5:791fc3dcb6c4 197 } while(0)
donatien 0:2ccb9960a044 198
wolfSSL 17:c73d8e61d391 199 void HTTPClient::cyassl_free(void)
wolfSSL 17:c73d8e61d391 200 {
wolfSSL 19:1e2f05809eb1 201 if(ssl) {
wolfSSL 17:c73d8e61d391 202 CyaSSL_free(ssl) ;
wolfSSL 19:1e2f05809eb1 203 ssl = NULL ;
wolfSSL 19:1e2f05809eb1 204 }
wolfSSL 19:1e2f05809eb1 205 if(ctx) {
wolfSSL 17:c73d8e61d391 206 CyaSSL_CTX_free(ctx) ;
wolfSSL 19:1e2f05809eb1 207 ctx = NULL ;
wolfSSL 19:1e2f05809eb1 208 }
wolfSSL 22:4b9a4151cc73 209 CyaSSL_Cleanup() ;
PBarrett 31:612864287dd9 210 }
wolfSSL 17:c73d8e61d391 211
donatien 12:89d09a6db00a 212 HTTPResult HTTPClient::connect(const char* url, HTTP_METH method, IHTTPDataOut* pDataOut, IHTTPDataIn* pDataIn, int timeout) //Execute request
wolfSSL 18:d89df40b4cf3 213 {
wolfSSL 22:4b9a4151cc73 214 CYASSL_METHOD * SSLmethod ;
wolfSSL 18:d89df40b4cf3 215 m_httpResponseCode = 0; //Invalidate code
wolfSSL 18:d89df40b4cf3 216 m_timeout = timeout;
wolfSSL 30:a9ecee69c6b5 217
wolfSSL 18:d89df40b4cf3 218 pDataIn->writeReset();
wolfSSL 18:d89df40b4cf3 219 if( pDataOut ) {
wolfSSL 18:d89df40b4cf3 220 pDataOut->readReset();
wolfSSL 18:d89df40b4cf3 221 }
wolfSSL 17:c73d8e61d391 222
wolfSSL 18:d89df40b4cf3 223 char scheme[8];
wolfSSL 18:d89df40b4cf3 224 char host[32];
wolfSSL 22:4b9a4151cc73 225 char path[80];
wolfSSL 18:d89df40b4cf3 226
wolfSSL 18:d89df40b4cf3 227 int ret ;
donatien 0:2ccb9960a044 228
wolfSSL 18:d89df40b4cf3 229 //First we need to parse the url (http[s]://host[:port][/[path]])
wolfSSL 18:d89df40b4cf3 230 HTTPResult res = parseURL(url, scheme, sizeof(scheme), host, sizeof(host), &port, path, sizeof(path));
wolfSSL 18:d89df40b4cf3 231 if(res != HTTP_OK) {
wolfSSL 18:d89df40b4cf3 232 ERR("parseURL returned %d", res);
wolfSSL 18:d89df40b4cf3 233 return res;
wolfSSL 18:d89df40b4cf3 234 }
donatien 0:2ccb9960a044 235
wolfSSL 22:4b9a4151cc73 236 if(port == 0) {
wolfSSL 18:d89df40b4cf3 237 if(strcmp(scheme, "http") == 0)
wolfSSL 18:d89df40b4cf3 238 port = HTTP_PORT ;
wolfSSL 18:d89df40b4cf3 239 else if(strcmp(scheme, "https") == 0)
wolfSSL 18:d89df40b4cf3 240 port = HTTPS_PORT ;
wolfSSL 18:d89df40b4cf3 241 }
donatien 0:2ccb9960a044 242
wolfSSL 18:d89df40b4cf3 243 DBG("Scheme: %s", scheme);
wolfSSL 18:d89df40b4cf3 244 DBG("Host: %s", host);
wolfSSL 18:d89df40b4cf3 245 DBG("Port: %d", port);
wolfSSL 18:d89df40b4cf3 246 DBG("Path: %s", path);
wolfSSL 17:c73d8e61d391 247
wolfSSL 18:d89df40b4cf3 248 //Connect
wolfSSL 18:d89df40b4cf3 249 DBG("Connecting socket to server");
wolfSSL 18:d89df40b4cf3 250
wolfSSL 18:d89df40b4cf3 251 #define MAX_RETRY 5
wolfSSL 18:d89df40b4cf3 252 int retry ;
donatien 0:2ccb9960a044 253
wolfSSL 18:d89df40b4cf3 254 for(retry=0; retry<MAX_RETRY; retry++) {
wolfSSL 18:d89df40b4cf3 255 int ret = m_sock.connect(host, port);
wolfSSL 18:d89df40b4cf3 256 if(ret == 0)break ;
wolfSSL 17:c73d8e61d391 257 }
wolfSSL 18:d89df40b4cf3 258 if(retry == MAX_RETRY) {
wolfSSL 18:d89df40b4cf3 259 m_sock.close();
wolfSSL 18:d89df40b4cf3 260 ERR("Could not connect");
wolfSSL 18:d89df40b4cf3 261 return HTTP_CONN;
wolfSSL 17:c73d8e61d391 262 }
wolfSSL 17:c73d8e61d391 263
wolfSSL 18:d89df40b4cf3 264 if(port == HTTPS_PORT) {
wolfSSL 22:4b9a4151cc73 265
wolfSSL 18:d89df40b4cf3 266 /* Start SSL connect */
PBarrett 31:612864287dd9 267 DBG("SSLmethod=%d", SSLmethod) ;
wolfSSL 19:1e2f05809eb1 268 if(ctx == NULL) {
wolfSSL 22:4b9a4151cc73 269 switch(SSLver) {
PBarrett 31:612864287dd9 270 case 0 : SSLmethod = CyaSSLv3_client_method() ; break ;
PBarrett 31:612864287dd9 271 case 1 : SSLmethod = CyaTLSv1_client_method() ; break ;
PBarrett 31:612864287dd9 272 case 2 : SSLmethod = CyaTLSv1_1_client_method() ; break ;
PBarrett 31:612864287dd9 273 case 3 : SSLmethod = CyaTLSv1_2_client_method() ; break ;
wolfSSL 22:4b9a4151cc73 274 }
wolfSSL 22:4b9a4151cc73 275 ctx = CyaSSL_CTX_new((CYASSL_METHOD *)SSLmethod);
wolfSSL 19:1e2f05809eb1 276 if (ctx == NULL) {
wolfSSL 19:1e2f05809eb1 277 ERR("unable to get ctx");
wolfSSL 19:1e2f05809eb1 278 return HTTP_CONN;
wolfSSL 19:1e2f05809eb1 279 }
wolfSSL 19:1e2f05809eb1 280 CyaSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0);
wolfSSL 19:1e2f05809eb1 281 CyaSSL_SetIORecv(ctx, SocketReceive) ;
wolfSSL 19:1e2f05809eb1 282 CyaSSL_SetIOSend(ctx, SocketSend) ;
wolfSSL 18:d89df40b4cf3 283 }
wolfSSL 18:d89df40b4cf3 284 if (ssl == NULL) {
wolfSSL 19:1e2f05809eb1 285 ssl = CyaSSL_new(ctx);
wolfSSL 19:1e2f05809eb1 286 if (ssl == NULL) {
wolfSSL 19:1e2f05809eb1 287 ERR("unable to get SSL object");
wolfSSL 19:1e2f05809eb1 288 cyassl_free() ;
wolfSSL 19:1e2f05809eb1 289 return HTTP_CONN;
wolfSSL 19:1e2f05809eb1 290 }
wolfSSL 18:d89df40b4cf3 291 }
donatien 0:2ccb9960a044 292
wolfSSL 18:d89df40b4cf3 293 DBG("ctx=%x, ssl=%x, ssl->ctx->CBIORecv, CBIOSend=%x, %x\n",
wolfSSL 18:d89df40b4cf3 294 ctx, ssl, SocketReceive, SocketSend ) ;
wolfSSL 18:d89df40b4cf3 295 if (CyaSSL_connect(ssl) != SSL_SUCCESS) {
wolfSSL 18:d89df40b4cf3 296 ERR("SSL_connect failed");
wolfSSL 18:d89df40b4cf3 297 cyassl_free() ;
wolfSSL 18:d89df40b4cf3 298 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 299 }
wolfSSL 18:d89df40b4cf3 300 } /* SSL connect complete */
donatien 0:2ccb9960a044 301
wolfSSL 18:d89df40b4cf3 302 //Send request
wolfSSL 18:d89df40b4cf3 303 DBG("Sending request");
wolfSSL 18:d89df40b4cf3 304 char buf[CHUNK_SIZE];
wolfSSL 18:d89df40b4cf3 305 send_buf_p = send_buf ; // Reset send buffer ;
wolfSSL 18:d89df40b4cf3 306
wolfSSL 18:d89df40b4cf3 307 const char* meth = (method==HTTP_GET)?"GET":(method==HTTP_POST)?"POST":(method==HTTP_PUT)?"PUT":(method==HTTP_DELETE)?"DELETE":"";
wolfSSL 18:d89df40b4cf3 308 snprintf(buf, sizeof(buf), "%s %s HTTP/1.1\r\nHost: %s\r\n", meth, path, host); //Write request
wolfSSL 18:d89df40b4cf3 309 ret = send(buf);
wolfSSL 18:d89df40b4cf3 310 if(ret) {
wolfSSL 18:d89df40b4cf3 311 m_sock.close();
wolfSSL 18:d89df40b4cf3 312 ERR("Could not write request");
wolfSSL 18:d89df40b4cf3 313 return HTTP_CONN;
donatien 0:2ccb9960a044 314 }
wolfSSL 17:c73d8e61d391 315
wolfSSL 18:d89df40b4cf3 316 //Send all headers
donatien 0:2ccb9960a044 317
wolfSSL 18:d89df40b4cf3 318 //Send default headers
wolfSSL 18:d89df40b4cf3 319 DBG("Sending headers");
wolfSSL 18:d89df40b4cf3 320 if( pDataOut != NULL ) {
wolfSSL 18:d89df40b4cf3 321 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 322 ret = send("Transfer-Encoding: chunked\r\n");
wolfSSL 18:d89df40b4cf3 323 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 324 } else {
wolfSSL 18:d89df40b4cf3 325 snprintf(buf, sizeof(buf), "Content-Length: %d\r\n", pDataOut->getDataLen());
wolfSSL 22:4b9a4151cc73 326 DBG("Content buf:%s", buf) ;
wolfSSL 18:d89df40b4cf3 327 ret = send(buf);
wolfSSL 18:d89df40b4cf3 328 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 329 }
wolfSSL 18:d89df40b4cf3 330 char type[48];
wolfSSL 18:d89df40b4cf3 331 if( pDataOut->getDataType(type, 48) == HTTP_OK ) {
wolfSSL 18:d89df40b4cf3 332 snprintf(buf, sizeof(buf), "Content-Type: %s\r\n", type);
wolfSSL 18:d89df40b4cf3 333 ret = send(buf);
wolfSSL 18:d89df40b4cf3 334 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 335 }
PBarrett 31:612864287dd9 336 if(m_basicAuthUser) {
PBarrett 31:612864287dd9 337 bAuth() ; /* send out Basic Auth header */
PBarrett 31:612864287dd9 338 }
wolfSSL 18:d89df40b4cf3 339 }
wolfSSL 18:d89df40b4cf3 340
wolfSSL 18:d89df40b4cf3 341 //Add user headers
PBarrett 31:612864287dd9 342 for(int i = 0; i < MAX_HEADER_COUNT && header[i] != 0; i++) {
PBarrett 31:612864287dd9 343 ret = send(header[i]);
donatien 5:791fc3dcb6c4 344 CHECK_CONN_ERR(ret);
donatien 0:2ccb9960a044 345 }
donatien 0:2ccb9960a044 346
wolfSSL 18:d89df40b4cf3 347 //Close headers
wolfSSL 18:d89df40b4cf3 348 DBG("Headers sent");
wolfSSL 18:d89df40b4cf3 349 ret = send("\r\n");
wolfSSL 18:d89df40b4cf3 350 CHECK_CONN_ERR(ret);
wolfSSL 17:c73d8e61d391 351
wolfSSL 18:d89df40b4cf3 352 size_t trfLen;
donatien 0:2ccb9960a044 353
wolfSSL 18:d89df40b4cf3 354 //Send data (if available)
wolfSSL 18:d89df40b4cf3 355 if( pDataOut != NULL ) {
wolfSSL 18:d89df40b4cf3 356 DBG("Sending data");
wolfSSL 18:d89df40b4cf3 357 while(true) {
wolfSSL 18:d89df40b4cf3 358 size_t writtenLen = 0;
wolfSSL 18:d89df40b4cf3 359 pDataOut->read(buf, CHUNK_SIZE, &trfLen);
wolfSSL 18:d89df40b4cf3 360 buf[trfLen] = 0x0 ;
wolfSSL 18:d89df40b4cf3 361 DBG("buf:%s", buf) ;
wolfSSL 18:d89df40b4cf3 362 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 363 //Write chunk header
wolfSSL 22:4b9a4151cc73 364 char chunkHeader[64];
wolfSSL 18:d89df40b4cf3 365 snprintf(chunkHeader, sizeof(chunkHeader), "%X\r\n", trfLen); //In hex encoding
wolfSSL 18:d89df40b4cf3 366 ret = send(chunkHeader);
wolfSSL 18:d89df40b4cf3 367 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 368 } else if( trfLen == 0 ) {
wolfSSL 22:4b9a4151cc73 369 DBG("trfLen==0") ;
wolfSSL 18:d89df40b4cf3 370 break;
wolfSSL 18:d89df40b4cf3 371 }
wolfSSL 22:4b9a4151cc73 372 DBG("trfLen 1=%d", trfLen) ;
wolfSSL 18:d89df40b4cf3 373 if( trfLen != 0 ) {
wolfSSL 22:4b9a4151cc73 374 DBG("Sending 1") ;
wolfSSL 18:d89df40b4cf3 375 ret = send(buf, trfLen);
wolfSSL 22:4b9a4151cc73 376 DBG("Sent 1") ;
wolfSSL 18:d89df40b4cf3 377 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 378 }
donatien 0:2ccb9960a044 379
wolfSSL 18:d89df40b4cf3 380 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 381 ret = send("\r\n"); //Chunk-terminating CRLF
wolfSSL 18:d89df40b4cf3 382 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 383 } else {
wolfSSL 18:d89df40b4cf3 384 writtenLen += trfLen;
wolfSSL 18:d89df40b4cf3 385 if( writtenLen >= pDataOut->getDataLen() ) {
wolfSSL 22:4b9a4151cc73 386 DBG("writtenLen=%d", writtenLen) ;
wolfSSL 18:d89df40b4cf3 387 break;
wolfSSL 18:d89df40b4cf3 388 }
wolfSSL 22:4b9a4151cc73 389 DBG("writtenLen+=trfLen = %d", writtenLen) ;
wolfSSL 18:d89df40b4cf3 390 }
wolfSSL 22:4b9a4151cc73 391 DBG("trfLen 2=%d", trfLen) ;
wolfSSL 18:d89df40b4cf3 392 if( trfLen == 0 ) {
wolfSSL 22:4b9a4151cc73 393 DBG("trfLen == 0") ;
wolfSSL 18:d89df40b4cf3 394 break;
wolfSSL 18:d89df40b4cf3 395 }
wolfSSL 18:d89df40b4cf3 396 }
donatien 0:2ccb9960a044 397
wolfSSL 18:d89df40b4cf3 398 }
wolfSSL 18:d89df40b4cf3 399 ret = flush() ; // flush the send buffer ;
wolfSSL 18:d89df40b4cf3 400 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 401
wolfSSL 18:d89df40b4cf3 402 //Receive response
wolfSSL 18:d89df40b4cf3 403 DBG("Receiving response");
wolfSSL 18:d89df40b4cf3 404
wolfSSL 18:d89df40b4cf3 405 ret = recv(buf, CHUNK_SIZE - 1, CHUNK_SIZE - 1, &trfLen); //Read n bytes
wolfSSL 18:d89df40b4cf3 406 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 407
wolfSSL 18:d89df40b4cf3 408 buf[trfLen] = '\0';
wolfSSL 18:d89df40b4cf3 409
wolfSSL 18:d89df40b4cf3 410 char* crlfPtr = strstr(buf, "\r\n");
wolfSSL 18:d89df40b4cf3 411 if(crlfPtr == NULL) {
donatien 5:791fc3dcb6c4 412 PRTCL_ERR();
donatien 0:2ccb9960a044 413 }
donatien 0:2ccb9960a044 414
wolfSSL 18:d89df40b4cf3 415 int crlfPos = crlfPtr - buf;
donatien 0:2ccb9960a044 416 buf[crlfPos] = '\0';
donatien 0:2ccb9960a044 417
wolfSSL 18:d89df40b4cf3 418 //Parse HTTP response
wolfSSL 18:d89df40b4cf3 419 if( sscanf(buf, "HTTP/%*d.%*d %d %*[^\r\n]", &m_httpResponseCode) != 1 ) {
wolfSSL 18:d89df40b4cf3 420 //Cannot match string, error
wolfSSL 18:d89df40b4cf3 421 ERR("Not a correct HTTP answer : %s\n", buf);
wolfSSL 18:d89df40b4cf3 422 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 423 }
donatien 4:c071b05ac026 424
PBarrett 31:612864287dd9 425 if( (m_httpResponseCode < 200) || (m_httpResponseCode >= 300) ) {
wolfSSL 18:d89df40b4cf3 426 //Did not return a 2xx code; TODO fetch headers/(&data?) anyway and implement a mean of writing/reading headers
wolfSSL 18:d89df40b4cf3 427 WARN("Response code %d", m_httpResponseCode);
wolfSSL 18:d89df40b4cf3 428 PRTCL_ERR();
donatien 0:2ccb9960a044 429 }
donatien 0:2ccb9960a044 430
wolfSSL 18:d89df40b4cf3 431 DBG("Reading headers");
donatien 0:2ccb9960a044 432
wolfSSL 18:d89df40b4cf3 433 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2) + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 434 trfLen -= (crlfPos + 2);
donatien 0:2ccb9960a044 435
wolfSSL 18:d89df40b4cf3 436 size_t recvContentLength = 0;
wolfSSL 18:d89df40b4cf3 437 bool recvChunked = false;
wolfSSL 18:d89df40b4cf3 438 //Now get headers
wolfSSL 18:d89df40b4cf3 439 while( true ) {
wolfSSL 18:d89df40b4cf3 440 crlfPtr = strstr(buf, "\r\n");
wolfSSL 18:d89df40b4cf3 441 if(crlfPtr == NULL) {
wolfSSL 18:d89df40b4cf3 442 if( trfLen < CHUNK_SIZE - 1 ) {
wolfSSL 18:d89df40b4cf3 443 size_t newTrfLen;
wolfSSL 18:d89df40b4cf3 444 ret = recv(buf + trfLen, 1, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 445 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 446 buf[trfLen] = '\0';
wolfSSL 18:d89df40b4cf3 447 DBG("Read %d chars; In buf: [%s]", newTrfLen, buf);
wolfSSL 18:d89df40b4cf3 448 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 449 continue;
PBarrett 31:612864287dd9 450 } else {
PBarrett 31:612864287dd9 451 PRTCL_ERR();
donatien 14:2744e0c0e527 452 }
wolfSSL 18:d89df40b4cf3 453 }
wolfSSL 18:d89df40b4cf3 454
wolfSSL 18:d89df40b4cf3 455 crlfPos = crlfPtr - buf;
PBarrett 31:612864287dd9 456
wolfSSL 18:d89df40b4cf3 457 if(crlfPos == 0) { //End of headers
wolfSSL 18:d89df40b4cf3 458 DBG("Headers read");
wolfSSL 18:d89df40b4cf3 459 memmove(buf, &buf[2], trfLen - 2 + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 460 trfLen -= 2;
wolfSSL 18:d89df40b4cf3 461 break;
donatien 0:2ccb9960a044 462 }
wolfSSL 18:d89df40b4cf3 463
wolfSSL 18:d89df40b4cf3 464 buf[crlfPos] = '\0';
wolfSSL 18:d89df40b4cf3 465
wolfSSL 18:d89df40b4cf3 466 char key[32];
wolfSSL 18:d89df40b4cf3 467 char value[32];
wolfSSL 18:d89df40b4cf3 468
wolfSSL 18:d89df40b4cf3 469 key[31] = '\0';
wolfSSL 18:d89df40b4cf3 470 value[31] = '\0';
wolfSSL 18:d89df40b4cf3 471
wolfSSL 18:d89df40b4cf3 472 int n = sscanf(buf, "%31[^:]: %31[^\r\n]", key, value);
wolfSSL 18:d89df40b4cf3 473 if ( n == 2 ) {
PBarrett 31:612864287dd9 474 DBG("Read header : %s: %s\n", key, value);
PBarrett 31:612864287dd9 475 if( !strcmp(key, "Content-Length") ) {
wolfSSL 18:d89df40b4cf3 476 sscanf(value, "%d", &recvContentLength);
wolfSSL 18:d89df40b4cf3 477 pDataIn->setDataLen(recvContentLength);
PBarrett 31:612864287dd9 478 } else if( !strcmp(key, "Transfer-Encoding") ) {
PBarrett 31:612864287dd9 479 if( !strcmp(value, "Chunked") || !strcmp(value, "chunked") ) {
wolfSSL 18:d89df40b4cf3 480 recvChunked = true;
wolfSSL 18:d89df40b4cf3 481 pDataIn->setIsChunked(true);
wolfSSL 18:d89df40b4cf3 482 }
PBarrett 31:612864287dd9 483 } else if( !strcmp(key, "Content-Type") ) {
wolfSSL 18:d89df40b4cf3 484 pDataIn->setDataType(value);
wolfSSL 18:d89df40b4cf3 485 }
PBarrett 31:612864287dd9 486
wolfSSL 18:d89df40b4cf3 487 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2) + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 488 trfLen -= (crlfPos + 2);
PBarrett 31:612864287dd9 489
wolfSSL 18:d89df40b4cf3 490 } else {
wolfSSL 18:d89df40b4cf3 491 ERR("Could not parse header");
donatien 14:2744e0c0e527 492 PRTCL_ERR();
donatien 0:2ccb9960a044 493 }
donatien 0:2ccb9960a044 494
donatien 0:2ccb9960a044 495 }
donatien 0:2ccb9960a044 496
wolfSSL 18:d89df40b4cf3 497 //Receive data
wolfSSL 18:d89df40b4cf3 498 DBG("Receiving data");
wolfSSL 18:d89df40b4cf3 499
wolfSSL 18:d89df40b4cf3 500 while(true) {
wolfSSL 18:d89df40b4cf3 501 size_t readLen = 0;
donatien 0:2ccb9960a044 502
wolfSSL 18:d89df40b4cf3 503 if( recvChunked ) {
wolfSSL 18:d89df40b4cf3 504 //Read chunk header
wolfSSL 18:d89df40b4cf3 505 bool foundCrlf;
wolfSSL 18:d89df40b4cf3 506 do {
wolfSSL 18:d89df40b4cf3 507 foundCrlf = false;
wolfSSL 18:d89df40b4cf3 508 crlfPos=0;
wolfSSL 18:d89df40b4cf3 509 buf[trfLen]=0;
wolfSSL 18:d89df40b4cf3 510 if(trfLen >= 2) {
wolfSSL 18:d89df40b4cf3 511 for(; crlfPos < trfLen - 2; crlfPos++) {
wolfSSL 18:d89df40b4cf3 512 if( buf[crlfPos] == '\r' && buf[crlfPos + 1] == '\n' ) {
wolfSSL 18:d89df40b4cf3 513 foundCrlf = true;
wolfSSL 18:d89df40b4cf3 514 break;
wolfSSL 18:d89df40b4cf3 515 }
wolfSSL 18:d89df40b4cf3 516 }
wolfSSL 18:d89df40b4cf3 517 }
wolfSSL 18:d89df40b4cf3 518 if(!foundCrlf) { //Try to read more
wolfSSL 18:d89df40b4cf3 519 if( trfLen < CHUNK_SIZE ) {
wolfSSL 18:d89df40b4cf3 520 size_t newTrfLen;
wolfSSL 18:d89df40b4cf3 521 ret = recv(buf + trfLen, 0, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 522 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 523 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 524 continue;
wolfSSL 18:d89df40b4cf3 525 } else {
wolfSSL 18:d89df40b4cf3 526 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 527 }
wolfSSL 18:d89df40b4cf3 528 }
wolfSSL 18:d89df40b4cf3 529 } while(!foundCrlf);
wolfSSL 18:d89df40b4cf3 530 buf[crlfPos] = '\0';
wolfSSL 18:d89df40b4cf3 531 int n = sscanf(buf, "%x", &readLen);
wolfSSL 18:d89df40b4cf3 532 if(n!=1) {
wolfSSL 18:d89df40b4cf3 533 ERR("Could not read chunk length");
wolfSSL 18:d89df40b4cf3 534 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 535 }
wolfSSL 18:d89df40b4cf3 536
wolfSSL 18:d89df40b4cf3 537 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2)); //Not need to move NULL-terminating char any more
wolfSSL 18:d89df40b4cf3 538 trfLen -= (crlfPos + 2);
donatien 0:2ccb9960a044 539
wolfSSL 18:d89df40b4cf3 540 if( readLen == 0 ) {
wolfSSL 18:d89df40b4cf3 541 //Last chunk
wolfSSL 18:d89df40b4cf3 542 break;
wolfSSL 18:d89df40b4cf3 543 }
wolfSSL 18:d89df40b4cf3 544 } else {
wolfSSL 18:d89df40b4cf3 545 readLen = recvContentLength;
wolfSSL 18:d89df40b4cf3 546 }
wolfSSL 18:d89df40b4cf3 547
wolfSSL 18:d89df40b4cf3 548 DBG("Retrieving %d bytes", readLen);
wolfSSL 18:d89df40b4cf3 549
wolfSSL 18:d89df40b4cf3 550 do {
wolfSSL 18:d89df40b4cf3 551 pDataIn->write(buf, MIN(trfLen, readLen));
wolfSSL 18:d89df40b4cf3 552 if( trfLen > readLen ) {
wolfSSL 18:d89df40b4cf3 553 memmove(buf, &buf[readLen], trfLen - readLen);
wolfSSL 18:d89df40b4cf3 554 trfLen -= readLen;
wolfSSL 18:d89df40b4cf3 555 readLen = 0;
wolfSSL 18:d89df40b4cf3 556 } else {
wolfSSL 18:d89df40b4cf3 557 readLen -= trfLen;
wolfSSL 18:d89df40b4cf3 558 }
donatien 0:2ccb9960a044 559
wolfSSL 18:d89df40b4cf3 560 if(readLen) {
wolfSSL 18:d89df40b4cf3 561 ret = recv(buf, 1, CHUNK_SIZE - trfLen - 1, &trfLen);
wolfSSL 18:d89df40b4cf3 562 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 563 }
wolfSSL 18:d89df40b4cf3 564 } while(readLen);
wolfSSL 18:d89df40b4cf3 565
wolfSSL 18:d89df40b4cf3 566 if( recvChunked ) {
wolfSSL 18:d89df40b4cf3 567 if(trfLen < 2) {
wolfSSL 18:d89df40b4cf3 568 size_t newTrfLen;
wolfSSL 18:d89df40b4cf3 569 //Read missing chars to find end of chunk
wolfSSL 18:d89df40b4cf3 570 ret = recv(buf + trfLen, 2 - trfLen, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 571 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 572 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 573 }
wolfSSL 18:d89df40b4cf3 574 if( (buf[0] != '\r') || (buf[1] != '\n') ) {
wolfSSL 18:d89df40b4cf3 575 ERR("Format error");
wolfSSL 18:d89df40b4cf3 576 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 577 }
wolfSSL 18:d89df40b4cf3 578 memmove(buf, &buf[2], trfLen - 2);
wolfSSL 18:d89df40b4cf3 579 trfLen -= 2;
wolfSSL 18:d89df40b4cf3 580 } else {
wolfSSL 18:d89df40b4cf3 581 break;
wolfSSL 18:d89df40b4cf3 582 }
wolfSSL 18:d89df40b4cf3 583
donatien 0:2ccb9960a044 584 }
wolfSSL 20:bec882d85856 585 cyassl_free() ;
wolfSSL 18:d89df40b4cf3 586 m_sock.close();
wolfSSL 18:d89df40b4cf3 587 DBG("Completed HTTP transaction");
PBarrett 31:612864287dd9 588
PBarrett 31:612864287dd9 589 return HTTP_OK;
donatien 0:2ccb9960a044 590 }
donatien 0:2ccb9960a044 591
wolfSSL 19:1e2f05809eb1 592 HTTPResult HTTPClient::recv(char* buf, size_t minLen, size_t maxLen, size_t* pReadLen) //0 on success, err code on failure
donatien 0:2ccb9960a044 593 {
wolfSSL 18:d89df40b4cf3 594 DBG("Trying to read between %d and %d bytes", minLen, maxLen);
wolfSSL 18:d89df40b4cf3 595 size_t readLen = 0;
PBarrett 31:612864287dd9 596
wolfSSL 18:d89df40b4cf3 597 if(!m_sock.is_connected()) {
wolfSSL 18:d89df40b4cf3 598 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 599 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 18:d89df40b4cf3 600 }
wolfSSL 18:d89df40b4cf3 601
wolfSSL 18:d89df40b4cf3 602 int ret;
wolfSSL 18:d89df40b4cf3 603
wolfSSL 18:d89df40b4cf3 604 if(port == HTTPS_PORT) {
wolfSSL 18:d89df40b4cf3 605 DBG("Enter CyaSSL_read") ;
wolfSSL 18:d89df40b4cf3 606
wolfSSL 18:d89df40b4cf3 607 m_sock.set_blocking(false, m_timeout);
wolfSSL 18:d89df40b4cf3 608 readLen = CyaSSL_read(ssl, buf, maxLen);
wolfSSL 18:d89df40b4cf3 609 if (readLen > 0) {
wolfSSL 18:d89df40b4cf3 610 buf[readLen] = 0;
wolfSSL 18:d89df40b4cf3 611 DBG("CyaSSL_read:%s\n", buf);
wolfSSL 18:d89df40b4cf3 612 } else {
wolfSSL 18:d89df40b4cf3 613 ERR("CyaSSL_read, ret = %d", readLen) ;
wolfSSL 18:d89df40b4cf3 614 return HTTP_ERROR ;
wolfSSL 18:d89df40b4cf3 615 }
wolfSSL 18:d89df40b4cf3 616 DBG("Read %d bytes", readLen);
wolfSSL 18:d89df40b4cf3 617 *pReadLen = readLen;
wolfSSL 18:d89df40b4cf3 618 return HTTP_OK;
wolfSSL 18:d89df40b4cf3 619 }
wolfSSL 18:d89df40b4cf3 620
wolfSSL 18:d89df40b4cf3 621 while(readLen < maxLen) {
wolfSSL 18:d89df40b4cf3 622 if(readLen < minLen) {
wolfSSL 18:d89df40b4cf3 623 DBG("Trying to read at most %d bytes [Blocking]", minLen - readLen);
wolfSSL 18:d89df40b4cf3 624 m_sock.set_blocking(false, m_timeout);
wolfSSL 18:d89df40b4cf3 625 ret = m_sock.receive_all(buf + readLen, minLen - readLen);
wolfSSL 18:d89df40b4cf3 626 } else {
wolfSSL 18:d89df40b4cf3 627 DBG("Trying to read at most %d bytes [Not blocking]", maxLen - readLen);
wolfSSL 18:d89df40b4cf3 628 m_sock.set_blocking(false, 0);
wolfSSL 18:d89df40b4cf3 629 ret = m_sock.receive(buf + readLen, maxLen - readLen);
wolfSSL 18:d89df40b4cf3 630 }
wolfSSL 18:d89df40b4cf3 631
wolfSSL 18:d89df40b4cf3 632 if( ret > 0) {
wolfSSL 18:d89df40b4cf3 633 readLen += ret;
wolfSSL 18:d89df40b4cf3 634 } else if( ret == 0 ) {
wolfSSL 18:d89df40b4cf3 635 break;
wolfSSL 18:d89df40b4cf3 636 } else {
wolfSSL 18:d89df40b4cf3 637 if(!m_sock.is_connected()) {
wolfSSL 18:d89df40b4cf3 638 ERR("Connection error (recv returned %d)", ret);
wolfSSL 18:d89df40b4cf3 639 *pReadLen = readLen;
wolfSSL 18:d89df40b4cf3 640 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 641 } else {
wolfSSL 18:d89df40b4cf3 642 break;
wolfSSL 18:d89df40b4cf3 643 }
wolfSSL 18:d89df40b4cf3 644 }
wolfSSL 18:d89df40b4cf3 645
wolfSSL 18:d89df40b4cf3 646 if(!m_sock.is_connected()) {
wolfSSL 18:d89df40b4cf3 647 break;
wolfSSL 18:d89df40b4cf3 648 }
wolfSSL 17:c73d8e61d391 649 }
wolfSSL 17:c73d8e61d391 650 DBG("Read %d bytes", readLen);
wolfSSL 17:c73d8e61d391 651 *pReadLen = readLen;
wolfSSL 17:c73d8e61d391 652 return HTTP_OK;
donatien 7:4e39864f7b15 653 }
donatien 7:4e39864f7b15 654
wolfSSL 19:1e2f05809eb1 655 HTTPResult HTTPClient::send(char* buf, size_t len) //0 on success, err code on failure
donatien 7:4e39864f7b15 656 {
wolfSSL 18:d89df40b4cf3 657 HTTPResult ret ;
wolfSSL 18:d89df40b4cf3 658 int cp_len ;
wolfSSL 18:d89df40b4cf3 659
wolfSSL 18:d89df40b4cf3 660 if(len == 0) {
wolfSSL 18:d89df40b4cf3 661 len = strlen(buf);
wolfSSL 17:c73d8e61d391 662 }
wolfSSL 17:c73d8e61d391 663
wolfSSL 18:d89df40b4cf3 664 do {
wolfSSL 22:4b9a4151cc73 665
wolfSSL 18:d89df40b4cf3 666 if((SEND_BUF_SIZE - (send_buf_p - send_buf)) >= len) {
wolfSSL 18:d89df40b4cf3 667 cp_len = len ;
wolfSSL 18:d89df40b4cf3 668 } else {
wolfSSL 22:4b9a4151cc73 669 cp_len = SEND_BUF_SIZE - (send_buf_p - send_buf) ;
wolfSSL 18:d89df40b4cf3 670 }
wolfSSL 22:4b9a4151cc73 671 DBG("send_buf_p:%x. send_buf+SIZE:%x, len=%d, cp_len=%d", send_buf_p, send_buf+SEND_BUF_SIZE, len, cp_len) ;
wolfSSL 18:d89df40b4cf3 672 memcpy(send_buf_p, buf, cp_len) ;
wolfSSL 18:d89df40b4cf3 673 send_buf_p += cp_len ;
wolfSSL 18:d89df40b4cf3 674 len -= cp_len ;
wolfSSL 18:d89df40b4cf3 675
wolfSSL 18:d89df40b4cf3 676 if(send_buf_p == send_buf + SEND_BUF_SIZE) {
PBarrett 31:612864287dd9 677 if(port == HTTPS_PORT){
wolfSSL 22:4b9a4151cc73 678 ERR("HTTPClient::send buffer overflow");
wolfSSL 22:4b9a4151cc73 679 return HTTP_ERROR ;
wolfSSL 22:4b9a4151cc73 680 }
wolfSSL 18:d89df40b4cf3 681 ret = flush() ;
wolfSSL 18:d89df40b4cf3 682 if(ret)return(ret) ;
wolfSSL 18:d89df40b4cf3 683 }
wolfSSL 18:d89df40b4cf3 684 } while(len) ;
wolfSSL 18:d89df40b4cf3 685 return HTTP_OK ;
wolfSSL 17:c73d8e61d391 686 }
wolfSSL 17:c73d8e61d391 687
wolfSSL 19:1e2f05809eb1 688 HTTPResult HTTPClient::flush() //0 on success, err code on failure
wolfSSL 17:c73d8e61d391 689 {
wolfSSL 18:d89df40b4cf3 690 int len ;
wolfSSL 18:d89df40b4cf3 691 char * buf ;
wolfSSL 18:d89df40b4cf3 692
wolfSSL 18:d89df40b4cf3 693 buf = send_buf ;
wolfSSL 18:d89df40b4cf3 694 len = send_buf_p - send_buf ;
wolfSSL 18:d89df40b4cf3 695 send_buf_p = send_buf ; // reset send buffer
wolfSSL 18:d89df40b4cf3 696
wolfSSL 18:d89df40b4cf3 697 DBG("Trying to write %d bytes:%s\n", len, buf);
wolfSSL 18:d89df40b4cf3 698 size_t writtenLen = 0;
wolfSSL 18:d89df40b4cf3 699
wolfSSL 18:d89df40b4cf3 700 if(!m_sock.is_connected()) {
wolfSSL 18:d89df40b4cf3 701 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 702 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 17:c73d8e61d391 703 }
wolfSSL 18:d89df40b4cf3 704
wolfSSL 18:d89df40b4cf3 705 if(port == HTTPS_PORT) {
wolfSSL 18:d89df40b4cf3 706 DBG("Enter CyaSSL_write") ;
wolfSSL 18:d89df40b4cf3 707 if (CyaSSL_write(ssl, buf, len) != len) {
wolfSSL 18:d89df40b4cf3 708 ERR("SSL_write failed");
wolfSSL 18:d89df40b4cf3 709 return HTTP_ERROR ;
wolfSSL 18:d89df40b4cf3 710 }
wolfSSL 18:d89df40b4cf3 711 DBG("Written %d bytes", writtenLen);
wolfSSL 18:d89df40b4cf3 712 return HTTP_OK;
wolfSSL 18:d89df40b4cf3 713 }
wolfSSL 18:d89df40b4cf3 714 m_sock.set_blocking(false, m_timeout);
wolfSSL 18:d89df40b4cf3 715 int ret = m_sock.send_all(buf, len);
wolfSSL 18:d89df40b4cf3 716 if(ret > 0) {
wolfSSL 18:d89df40b4cf3 717 writtenLen += ret;
wolfSSL 18:d89df40b4cf3 718 } else if( ret == 0 ) {
wolfSSL 18:d89df40b4cf3 719 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 720 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 18:d89df40b4cf3 721 } else {
wolfSSL 18:d89df40b4cf3 722 ERR("Connection error (send returned %d)", ret);
wolfSSL 18:d89df40b4cf3 723 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 724 }
wolfSSL 18:d89df40b4cf3 725
wolfSSL 17:c73d8e61d391 726 DBG("Written %d bytes", writtenLen);
wolfSSL 17:c73d8e61d391 727 return HTTP_OK;
donatien 0:2ccb9960a044 728 }
donatien 0:2ccb9960a044 729
wolfSSL 19:1e2f05809eb1 730 HTTPResult HTTPClient::parseURL(const char* url, char* scheme, size_t maxSchemeLen, char* host, size_t maxHostLen, uint16_t* port, char* path, size_t maxPathLen) //Parse URL
donatien 0:2ccb9960a044 731 {
wolfSSL 18:d89df40b4cf3 732 char* schemePtr = (char*) url;
wolfSSL 18:d89df40b4cf3 733 char* hostPtr = (char*) strstr(url, "://");
wolfSSL 18:d89df40b4cf3 734 if(hostPtr == NULL) {
wolfSSL 18:d89df40b4cf3 735 WARN("Could not find host");
wolfSSL 18:d89df40b4cf3 736 return HTTP_PARSE; //URL is invalid
wolfSSL 18:d89df40b4cf3 737 }
wolfSSL 18:d89df40b4cf3 738
wolfSSL 18:d89df40b4cf3 739 if( maxSchemeLen < hostPtr - schemePtr + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 740 WARN("Scheme str is too small (%d >= %d)", maxSchemeLen, hostPtr - schemePtr + 1);
wolfSSL 18:d89df40b4cf3 741 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 742 }
wolfSSL 18:d89df40b4cf3 743 memcpy(scheme, schemePtr, hostPtr - schemePtr);
wolfSSL 18:d89df40b4cf3 744 scheme[hostPtr - schemePtr] = '\0';
donatien 0:2ccb9960a044 745
wolfSSL 18:d89df40b4cf3 746 hostPtr+=3;
donatien 0:2ccb9960a044 747
wolfSSL 18:d89df40b4cf3 748 size_t hostLen = 0;
donatien 0:2ccb9960a044 749
wolfSSL 18:d89df40b4cf3 750 char* portPtr = strchr(hostPtr, ':');
wolfSSL 18:d89df40b4cf3 751 if( portPtr != NULL ) {
wolfSSL 18:d89df40b4cf3 752 hostLen = portPtr - hostPtr;
wolfSSL 18:d89df40b4cf3 753 portPtr++;
wolfSSL 18:d89df40b4cf3 754 if( sscanf(portPtr, "%hu", port) != 1) {
wolfSSL 18:d89df40b4cf3 755 WARN("Could not find port");
wolfSSL 18:d89df40b4cf3 756 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 757 }
wolfSSL 18:d89df40b4cf3 758 } else {
wolfSSL 18:d89df40b4cf3 759 *port=0;
donatien 0:2ccb9960a044 760 }
wolfSSL 18:d89df40b4cf3 761 char* pathPtr = strchr(hostPtr, '/');
wolfSSL 18:d89df40b4cf3 762 if( hostLen == 0 ) {
wolfSSL 18:d89df40b4cf3 763 hostLen = pathPtr - hostPtr;
wolfSSL 18:d89df40b4cf3 764 }
donatien 0:2ccb9960a044 765
wolfSSL 18:d89df40b4cf3 766 if( maxHostLen < hostLen + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 767 WARN("Host str is too small (%d >= %d)", maxHostLen, hostLen + 1);
wolfSSL 18:d89df40b4cf3 768 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 769 }
wolfSSL 18:d89df40b4cf3 770 memcpy(host, hostPtr, hostLen);
wolfSSL 18:d89df40b4cf3 771 host[hostLen] = '\0';
donatien 0:2ccb9960a044 772
wolfSSL 18:d89df40b4cf3 773 size_t pathLen;
wolfSSL 18:d89df40b4cf3 774 char* fragmentPtr = strchr(hostPtr, '#');
wolfSSL 18:d89df40b4cf3 775 if(fragmentPtr != NULL) {
wolfSSL 18:d89df40b4cf3 776 pathLen = fragmentPtr - pathPtr;
wolfSSL 18:d89df40b4cf3 777 } else {
wolfSSL 18:d89df40b4cf3 778 pathLen = strlen(pathPtr);
wolfSSL 18:d89df40b4cf3 779 }
donatien 0:2ccb9960a044 780
wolfSSL 18:d89df40b4cf3 781 if( maxPathLen < pathLen + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 782 WARN("Path str is too small (%d >= %d)", maxPathLen, pathLen + 1);
wolfSSL 18:d89df40b4cf3 783 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 784 }
wolfSSL 18:d89df40b4cf3 785 memcpy(path, pathPtr, pathLen);
wolfSSL 18:d89df40b4cf3 786 path[pathLen] = '\0';
donatien 0:2ccb9960a044 787
wolfSSL 18:d89df40b4cf3 788 return HTTP_OK;
donatien 0:2ccb9960a044 789 }
wolfSSL 22:4b9a4151cc73 790
wolfSSL 22:4b9a4151cc73 791 HTTPResult HTTPClient::bAuth(void)
wolfSSL 22:4b9a4151cc73 792 {
wolfSSL 22:4b9a4151cc73 793 HTTPResult ret ;
wolfSSL 22:4b9a4151cc73 794 char b_auth[(int)((AUTHB_SIZE+3)*4/3+1)] ;
wolfSSL 22:4b9a4151cc73 795 char base64buff[AUTHB_SIZE+3] ;
PBarrett 31:612864287dd9 796
wolfSSL 22:4b9a4151cc73 797 ret = send("Authorization: Basic ") ;
wolfSSL 22:4b9a4151cc73 798 CHECK_CONN_ERR(ret);
wolfSSL 22:4b9a4151cc73 799 sprintf(base64buff, "%s:%s", m_basicAuthUser, m_basicAuthPassword) ;
wolfSSL 22:4b9a4151cc73 800 base64enc(b_auth, base64buff) ;
wolfSSL 22:4b9a4151cc73 801 b_auth[strlen(b_auth)+1] = '\0' ;
wolfSSL 22:4b9a4151cc73 802 b_auth[strlen(b_auth)] = '\n' ;
wolfSSL 22:4b9a4151cc73 803 DBG("b_auth:%s", b_auth) ;
wolfSSL 22:4b9a4151cc73 804 ret = send(b_auth) ;
PBarrett 31:612864287dd9 805 CHECK_CONN_ERR(ret);
wolfSSL 22:4b9a4151cc73 806 return HTTP_OK ;
wolfSSL 22:4b9a4151cc73 807 }