Change buffer sizes to support GR-PEACH

Dependencies:   CyaSSL

Dependents:   GR-PEACH_Azure_Speech

Fork of HTTPClient-SSL by MultiTech

Committer:
Vanger
Date:
Tue Jan 06 15:31:45 2015 +0000
Revision:
34:13920d48893d
Parent:
33:3b2809748a9e
Child:
37:293e8eae4230
Changed the socket to fully close at the end of each connect, to reset blocking to (false, timeout), and changed the b_auth header to be \r\n\0 delimited; Also changed the class to use a pointer to TCPSocketConnection, for dynamic factory creation

Who changed what in which revision?

UserRevisionLine numberNew contents of line
donatien 0:2ccb9960a044 1 /* HTTPClient.cpp */
donatien 10:e1351de84c16 2 /* Copyright (C) 2012 mbed.org, MIT License
donatien 10:e1351de84c16 3 *
donatien 10:e1351de84c16 4 * Permission is hereby granted, free of charge, to any person obtaining a copy of this software
donatien 10:e1351de84c16 5 * and associated documentation files (the "Software"), to deal in the Software without restriction,
donatien 10:e1351de84c16 6 * including without limitation the rights to use, copy, modify, merge, publish, distribute,
donatien 10:e1351de84c16 7 * sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is
donatien 10:e1351de84c16 8 * furnished to do so, subject to the following conditions:
donatien 10:e1351de84c16 9 *
donatien 10:e1351de84c16 10 * The above copyright notice and this permission notice shall be included in all copies or
donatien 10:e1351de84c16 11 * substantial portions of the Software.
donatien 10:e1351de84c16 12 *
donatien 10:e1351de84c16 13 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
donatien 10:e1351de84c16 14 * BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
donatien 10:e1351de84c16 15 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
donatien 10:e1351de84c16 16 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
donatien 10:e1351de84c16 17 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
donatien 10:e1351de84c16 18 */
ansond 29:2d96cc752d19 19
ansond 29:2d96cc752d19 20 // DMA: Added tunable to adapt size of larger input URLs
ansond 29:2d96cc752d19 21 #define MAX_URL_HOSTNAME_LENGTH 128
ansond 29:2d96cc752d19 22 #define MAX_URL_PATH_LENGTH 128
donatien 0:2ccb9960a044 23
donatien 7:4e39864f7b15 24 //Debug is disabled by default
donatien 16:1f743885e7de 25 #if 0
donatien 12:89d09a6db00a 26 //Enable debug
donatien 11:390362de8c3f 27 #include <cstdio>
wolfSSL 18:d89df40b4cf3 28 #define DBG(x, ...) std::printf("[HTTPClient : DBG]"x"\r\n", ##__VA_ARGS__);
wolfSSL 18:d89df40b4cf3 29 #define WARN(x, ...) std::printf("[HTTPClient : WARN]"x"\r\n", ##__VA_ARGS__);
wolfSSL 18:d89df40b4cf3 30 #define ERR(x, ...) std::printf("[HTTPClient : ERR]"x"\r\n", ##__VA_ARGS__);
donatien 12:89d09a6db00a 31
donatien 12:89d09a6db00a 32 #else
donatien 12:89d09a6db00a 33 //Disable debug
wolfSSL 18:d89df40b4cf3 34 #define DBG(x, ...)
donatien 12:89d09a6db00a 35 #define WARN(x, ...)
wolfSSL 18:d89df40b4cf3 36 #define ERR(x, ...)
donatien 12:89d09a6db00a 37
donatien 7:4e39864f7b15 38 #endif
donatien 0:2ccb9960a044 39
donatien 0:2ccb9960a044 40 #define HTTP_PORT 80
wolfSSL 17:c73d8e61d391 41 #define HTTPS_PORT 443
donatien 0:2ccb9960a044 42
donatien 11:390362de8c3f 43 #define OK 0
donatien 11:390362de8c3f 44
donatien 11:390362de8c3f 45 #define MIN(x,y) (((x)<(y))?(x):(y))
donatien 11:390362de8c3f 46 #define MAX(x,y) (((x)>(y))?(x):(y))
donatien 11:390362de8c3f 47
wolfSSL 17:c73d8e61d391 48 #include <cstring>
donatien 0:2ccb9960a044 49
wolfSSL 17:c73d8e61d391 50 #include <../CyaSSL/cyassl/ctaocrypt/settings.h>
wolfSSL 17:c73d8e61d391 51 #include <../CyaSSL/cyassl/ctaocrypt/types.h>
wolfSSL 17:c73d8e61d391 52 #include <../CyaSSL/cyassl/internal.h>
wolfSSL 17:c73d8e61d391 53 #include <../CyaSSL/cyassl/ssl.h>
donatien 0:2ccb9960a044 54
donatien 11:390362de8c3f 55 #include "HTTPClient.h"
wolfSSL 17:c73d8e61d391 56
Vanger 33:3b2809748a9e 57 static TCPSocketConnection* m_sock;
wolfSSL 17:c73d8e61d391 58 #define CHUNK_SIZE 256
ansond 32:d9db238bb8a3 59 #define SEND_BUF_SIZE 1024
wolfSSL 17:c73d8e61d391 60 static char send_buf[SEND_BUF_SIZE] ;
ansond 32:d9db238bb8a3 61 static char *send_buf_p = NULL;
wolfSSL 17:c73d8e61d391 62
wolfSSL 17:c73d8e61d391 63 static int SocketReceive(CYASSL* ssl, char *buf, int sz, void *ctx)
wolfSSL 17:c73d8e61d391 64 {
wolfSSL 17:c73d8e61d391 65 int n ;
wolfSSL 17:c73d8e61d391 66 int i ;
wolfSSL 18:d89df40b4cf3 67 #define RECV_RETRY 3
wolfSSL 22:4b9a4151cc73 68
wolfSSL 17:c73d8e61d391 69 for(i=0; i<RECV_RETRY; i++) {
Vanger 33:3b2809748a9e 70 n = m_sock->receive(buf, sz) ;
wolfSSL 17:c73d8e61d391 71 if(n >= 0)return n ;
wolfSSL 22:4b9a4151cc73 72 wait(0.2) ;
wolfSSL 17:c73d8e61d391 73 }
wolfSSL 17:c73d8e61d391 74 ERR("SocketReceive:%d/%d\n", n, sz) ;
wolfSSL 17:c73d8e61d391 75 return n ;
wolfSSL 17:c73d8e61d391 76 }
wolfSSL 17:c73d8e61d391 77
wolfSSL 17:c73d8e61d391 78 static int SocketSend(CYASSL* ssl, char *buf, int sz, void *ctx)
wolfSSL 17:c73d8e61d391 79 {
wolfSSL 17:c73d8e61d391 80 int n ;
Vanger 34:13920d48893d 81
Vanger 34:13920d48893d 82 wait(0.1);
Vanger 33:3b2809748a9e 83 n = m_sock->send(buf, sz);
wolfSSL 17:c73d8e61d391 84 if(n > 0) {
Vanger 34:13920d48893d 85 wait(0.3);
Vanger 34:13920d48893d 86 return n;
Vanger 34:13920d48893d 87 } else {
Vanger 34:13920d48893d 88 ERR("SocketSend:%d/%d\n", n, sz);
Vanger 34:13920d48893d 89 }
Vanger 34:13920d48893d 90 return n;
wolfSSL 17:c73d8e61d391 91 }
donatien 11:390362de8c3f 92
wolfSSL 22:4b9a4151cc73 93 static void base64enc(char *out, const char *in) {
wolfSSL 22:4b9a4151cc73 94 const char code[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=" ;
wolfSSL 22:4b9a4151cc73 95 int i = 0, x = 0, l = 0;
wolfSSL 22:4b9a4151cc73 96
wolfSSL 22:4b9a4151cc73 97 for (; *in; in++) {
wolfSSL 22:4b9a4151cc73 98 x = x << 8 | *in;
wolfSSL 22:4b9a4151cc73 99 for (l += 8; l >= 6; l -= 6) {
wolfSSL 22:4b9a4151cc73 100 out[i++] = code[(x >> (l - 6)) & 0x3f];
wolfSSL 22:4b9a4151cc73 101 }
wolfSSL 22:4b9a4151cc73 102 }
wolfSSL 22:4b9a4151cc73 103 if (l > 0) {
wolfSSL 22:4b9a4151cc73 104 x <<= 6 - l;
wolfSSL 22:4b9a4151cc73 105 out[i++] = code[x & 0x3f];
wolfSSL 22:4b9a4151cc73 106 }
wolfSSL 22:4b9a4151cc73 107 for (; i % 4;) {
wolfSSL 22:4b9a4151cc73 108 out[i++] = '=';
wolfSSL 22:4b9a4151cc73 109 }
wolfSSL 22:4b9a4151cc73 110 out[i] = '\0' ;
wolfSSL 22:4b9a4151cc73 111 }
wolfSSL 22:4b9a4151cc73 112
donatien 0:2ccb9960a044 113 HTTPClient::HTTPClient() :
wolfSSL 18:d89df40b4cf3 114 m_basicAuthUser(NULL), m_basicAuthPassword(NULL), m_httpResponseCode(0)
donatien 0:2ccb9960a044 115 {
Vanger 33:3b2809748a9e 116 m_sock = &_m_sock;
wolfSSL 22:4b9a4151cc73 117 /* CyaSSL_Debugging_ON() ; */
wolfSSL 22:4b9a4151cc73 118
wolfSSL 18:d89df40b4cf3 119 ctx = 0 ;
wolfSSL 18:d89df40b4cf3 120 ssl = 0 ;
wolfSSL 22:4b9a4151cc73 121 SSLver = 3 ;
wolfSSL 27:5d4739eae63e 122 m_basicAuthUser = NULL ;
wolfSSL 27:5d4739eae63e 123 redirect_url = NULL ;
wolfSSL 27:5d4739eae63e 124 redirect = 0 ;
wolfSSL 27:5d4739eae63e 125 header = NULL ;
donatien 0:2ccb9960a044 126 }
donatien 0:2ccb9960a044 127
donatien 0:2ccb9960a044 128 HTTPClient::~HTTPClient()
donatien 0:2ccb9960a044 129 {
donatien 0:2ccb9960a044 130
donatien 0:2ccb9960a044 131 }
donatien 0:2ccb9960a044 132
wolfSSL 22:4b9a4151cc73 133 HTTPResult HTTPClient::basicAuth(const char* user, const char* password) //Basic Authentification
donatien 0:2ccb9960a044 134 {
wolfSSL 22:4b9a4151cc73 135 #define AUTHB_SIZE 128
wolfSSL 22:4b9a4151cc73 136 if((strlen(user) + strlen(password)) >= AUTHB_SIZE)
wolfSSL 22:4b9a4151cc73 137 return HTTP_ERROR ;
ansond 30:6fef375c94e6 138
ansond 30:6fef375c94e6 139 if (m_basicAuthUser) free((void *)m_basicAuthUser);
ansond 30:6fef375c94e6 140 if (user != NULL) {
ansond 30:6fef375c94e6 141 m_basicAuthUser = (char *)malloc(strlen(user)+1);
ansond 30:6fef375c94e6 142 strcpy((char *)m_basicAuthUser, user);
ansond 30:6fef375c94e6 143 }
ansond 30:6fef375c94e6 144
ansond 30:6fef375c94e6 145 if (m_basicAuthPassword) free((void *)m_basicAuthPassword);
ansond 30:6fef375c94e6 146 if (password != NULL) {
ansond 30:6fef375c94e6 147 m_basicAuthPassword = (char *)malloc(strlen(password)+1);
ansond 30:6fef375c94e6 148 strcpy((char *)m_basicAuthPassword, password);
ansond 30:6fef375c94e6 149 }
ansond 30:6fef375c94e6 150
wolfSSL 22:4b9a4151cc73 151 return HTTP_OK ;
donatien 0:2ccb9960a044 152 }
donatien 0:2ccb9960a044 153
donatien 12:89d09a6db00a 154 HTTPResult HTTPClient::get(const char* url, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 155 {
wolfSSL 18:d89df40b4cf3 156 return connect(url, HTTP_GET, NULL, pDataIn, timeout);
donatien 0:2ccb9960a044 157 }
donatien 0:2ccb9960a044 158
donatien 12:89d09a6db00a 159 HTTPResult HTTPClient::get(const char* url, char* result, size_t maxResultLen, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 160 {
wolfSSL 18:d89df40b4cf3 161 HTTPText str(result, maxResultLen);
wolfSSL 18:d89df40b4cf3 162 return get(url, &str, timeout);
donatien 0:2ccb9960a044 163 }
donatien 0:2ccb9960a044 164
donatien 12:89d09a6db00a 165 HTTPResult HTTPClient::post(const char* url, const IHTTPDataOut& dataOut, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 166 {
wolfSSL 18:d89df40b4cf3 167 return connect(url, HTTP_POST, (IHTTPDataOut*)&dataOut, pDataIn, timeout);
donatien 0:2ccb9960a044 168 }
donatien 0:2ccb9960a044 169
donatien 16:1f743885e7de 170 HTTPResult HTTPClient::put(const char* url, const IHTTPDataOut& dataOut, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 16:1f743885e7de 171 {
wolfSSL 18:d89df40b4cf3 172 return connect(url, HTTP_PUT, (IHTTPDataOut*)&dataOut, pDataIn, timeout);
donatien 16:1f743885e7de 173 }
donatien 16:1f743885e7de 174
donatien 16:1f743885e7de 175 HTTPResult HTTPClient::del(const char* url, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 16:1f743885e7de 176 {
wolfSSL 18:d89df40b4cf3 177 return connect(url, HTTP_DELETE, NULL, pDataIn, timeout);
donatien 16:1f743885e7de 178 }
donatien 16:1f743885e7de 179
donatien 16:1f743885e7de 180
donatien 0:2ccb9960a044 181 int HTTPClient::getHTTPResponseCode()
donatien 0:2ccb9960a044 182 {
wolfSSL 18:d89df40b4cf3 183 return m_httpResponseCode;
donatien 0:2ccb9960a044 184 }
donatien 0:2ccb9960a044 185
wolfSSL 27:5d4739eae63e 186 void HTTPClient::setHeader(const char * h)
wolfSSL 17:c73d8e61d391 187 {
wolfSSL 17:c73d8e61d391 188 header = h ;
wolfSSL 17:c73d8e61d391 189 }
wolfSSL 17:c73d8e61d391 190
wolfSSL 27:5d4739eae63e 191 void HTTPClient::setLocationBuf(char * url, int size)
wolfSSL 27:5d4739eae63e 192 {
wolfSSL 27:5d4739eae63e 193 redirect_url = url ;
wolfSSL 27:5d4739eae63e 194 redirect_url_size = size ;
wolfSSL 27:5d4739eae63e 195 }
wolfSSL 27:5d4739eae63e 196
wolfSSL 22:4b9a4151cc73 197 HTTPResult HTTPClient::setSSLversion(int minorV)
wolfSSL 22:4b9a4151cc73 198 {
wolfSSL 22:4b9a4151cc73 199 if((minorV>=0) && (minorV<=3))
wolfSSL 22:4b9a4151cc73 200 SSLver = minorV ;
wolfSSL 22:4b9a4151cc73 201 else return HTTP_ERROR ;
wolfSSL 22:4b9a4151cc73 202 return HTTP_OK ;
wolfSSL 22:4b9a4151cc73 203 }
wolfSSL 22:4b9a4151cc73 204
wolfSSL 17:c73d8e61d391 205
donatien 5:791fc3dcb6c4 206 #define CHECK_CONN_ERR(ret) \
donatien 5:791fc3dcb6c4 207 do{ \
donatien 7:4e39864f7b15 208 if(ret) { \
wolfSSL 17:c73d8e61d391 209 cyassl_free() ;\
Vanger 33:3b2809748a9e 210 m_sock->close(); \
donatien 5:791fc3dcb6c4 211 ERR("Connection error (%d)", ret); \
donatien 11:390362de8c3f 212 return HTTP_CONN; \
donatien 5:791fc3dcb6c4 213 } \
donatien 5:791fc3dcb6c4 214 } while(0)
donatien 5:791fc3dcb6c4 215
donatien 5:791fc3dcb6c4 216 #define PRTCL_ERR() \
donatien 5:791fc3dcb6c4 217 do{ \
wolfSSL 17:c73d8e61d391 218 cyassl_free() ;\
Vanger 33:3b2809748a9e 219 m_sock->close(); \
donatien 5:791fc3dcb6c4 220 ERR("Protocol error"); \
donatien 11:390362de8c3f 221 return HTTP_PRTCL; \
donatien 5:791fc3dcb6c4 222 } while(0)
donatien 0:2ccb9960a044 223
wolfSSL 17:c73d8e61d391 224 void HTTPClient::cyassl_free(void)
wolfSSL 17:c73d8e61d391 225 {
wolfSSL 19:1e2f05809eb1 226 if(ssl) {
wolfSSL 17:c73d8e61d391 227 CyaSSL_free(ssl) ;
wolfSSL 19:1e2f05809eb1 228 ssl = NULL ;
wolfSSL 19:1e2f05809eb1 229 }
wolfSSL 19:1e2f05809eb1 230 if(ctx) {
wolfSSL 17:c73d8e61d391 231 CyaSSL_CTX_free(ctx) ;
wolfSSL 19:1e2f05809eb1 232 ctx = NULL ;
wolfSSL 19:1e2f05809eb1 233 }
wolfSSL 22:4b9a4151cc73 234 CyaSSL_Cleanup() ;
wolfSSL 22:4b9a4151cc73 235 }
wolfSSL 17:c73d8e61d391 236
donatien 12:89d09a6db00a 237 HTTPResult HTTPClient::connect(const char* url, HTTP_METH method, IHTTPDataOut* pDataOut, IHTTPDataIn* pDataIn, int timeout) //Execute request
wolfSSL 18:d89df40b4cf3 238 {
Vanger 33:3b2809748a9e 239 CYASSL_METHOD * SSLmethod = 0;
wolfSSL 18:d89df40b4cf3 240 m_httpResponseCode = 0; //Invalidate code
wolfSSL 18:d89df40b4cf3 241 m_timeout = timeout;
wolfSSL 27:5d4739eae63e 242 redirect = 0 ;
wolfSSL 27:5d4739eae63e 243
wolfSSL 18:d89df40b4cf3 244 pDataIn->writeReset();
wolfSSL 18:d89df40b4cf3 245 if( pDataOut ) {
wolfSSL 18:d89df40b4cf3 246 pDataOut->readReset();
wolfSSL 18:d89df40b4cf3 247 }
wolfSSL 17:c73d8e61d391 248
wolfSSL 18:d89df40b4cf3 249 char scheme[8];
ansond 29:2d96cc752d19 250 char host[MAX_URL_HOSTNAME_LENGTH];
ansond 29:2d96cc752d19 251 char path[MAX_URL_PATH_LENGTH];
wolfSSL 18:d89df40b4cf3 252
wolfSSL 18:d89df40b4cf3 253 int ret ;
donatien 0:2ccb9960a044 254
wolfSSL 18:d89df40b4cf3 255 //First we need to parse the url (http[s]://host[:port][/[path]])
wolfSSL 18:d89df40b4cf3 256 HTTPResult res = parseURL(url, scheme, sizeof(scheme), host, sizeof(host), &port, path, sizeof(path));
wolfSSL 18:d89df40b4cf3 257 if(res != HTTP_OK) {
wolfSSL 18:d89df40b4cf3 258 ERR("parseURL returned %d", res);
wolfSSL 18:d89df40b4cf3 259 return res;
wolfSSL 18:d89df40b4cf3 260 }
donatien 0:2ccb9960a044 261
wolfSSL 22:4b9a4151cc73 262 if(port == 0) {
wolfSSL 18:d89df40b4cf3 263 if(strcmp(scheme, "http") == 0)
wolfSSL 18:d89df40b4cf3 264 port = HTTP_PORT ;
wolfSSL 18:d89df40b4cf3 265 else if(strcmp(scheme, "https") == 0)
wolfSSL 18:d89df40b4cf3 266 port = HTTPS_PORT ;
wolfSSL 18:d89df40b4cf3 267 }
donatien 0:2ccb9960a044 268
wolfSSL 18:d89df40b4cf3 269 DBG("Scheme: %s", scheme);
wolfSSL 18:d89df40b4cf3 270 DBG("Host: %s", host);
wolfSSL 18:d89df40b4cf3 271 DBG("Port: %d", port);
wolfSSL 18:d89df40b4cf3 272 DBG("Path: %s", path);
wolfSSL 17:c73d8e61d391 273
wolfSSL 18:d89df40b4cf3 274 //Connect
wolfSSL 18:d89df40b4cf3 275 DBG("Connecting socket to server");
wolfSSL 18:d89df40b4cf3 276
wolfSSL 18:d89df40b4cf3 277 #define MAX_RETRY 5
wolfSSL 18:d89df40b4cf3 278 int retry ;
donatien 0:2ccb9960a044 279
wolfSSL 18:d89df40b4cf3 280 for(retry=0; retry<MAX_RETRY; retry++) {
Vanger 33:3b2809748a9e 281 int ret = m_sock->connect(host, port);
wolfSSL 18:d89df40b4cf3 282 if(ret == 0)break ;
Vanger 34:13920d48893d 283 if(m_sock->is_connected()) {
Vanger 34:13920d48893d 284 m_sock->close(true);
Vanger 34:13920d48893d 285 }
wolfSSL 17:c73d8e61d391 286 }
wolfSSL 18:d89df40b4cf3 287 if(retry == MAX_RETRY) {
Vanger 33:3b2809748a9e 288 m_sock->close();
wolfSSL 18:d89df40b4cf3 289 ERR("Could not connect");
wolfSSL 18:d89df40b4cf3 290 return HTTP_CONN;
wolfSSL 17:c73d8e61d391 291 }
wolfSSL 17:c73d8e61d391 292
wolfSSL 18:d89df40b4cf3 293 if(port == HTTPS_PORT) {
wolfSSL 22:4b9a4151cc73 294
wolfSSL 18:d89df40b4cf3 295 /* Start SSL connect */
wolfSSL 27:5d4739eae63e 296 DBG("SSLver=%d", SSLver) ;
wolfSSL 19:1e2f05809eb1 297 if(ctx == NULL) {
wolfSSL 22:4b9a4151cc73 298 switch(SSLver) {
wolfSSL 22:4b9a4151cc73 299 case 0 : SSLmethod = CyaSSLv3_client_method() ; break ;
wolfSSL 22:4b9a4151cc73 300 case 1 : SSLmethod = CyaTLSv1_client_method() ; break ;
wolfSSL 22:4b9a4151cc73 301 case 2 : SSLmethod = CyaTLSv1_1_client_method() ; break ;
wolfSSL 22:4b9a4151cc73 302 case 3 : SSLmethod = CyaTLSv1_2_client_method() ; break ;
wolfSSL 22:4b9a4151cc73 303 }
wolfSSL 22:4b9a4151cc73 304 ctx = CyaSSL_CTX_new((CYASSL_METHOD *)SSLmethod);
wolfSSL 19:1e2f05809eb1 305 if (ctx == NULL) {
wolfSSL 19:1e2f05809eb1 306 ERR("unable to get ctx");
wolfSSL 19:1e2f05809eb1 307 return HTTP_CONN;
wolfSSL 19:1e2f05809eb1 308 }
wolfSSL 19:1e2f05809eb1 309 CyaSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0);
wolfSSL 19:1e2f05809eb1 310 CyaSSL_SetIORecv(ctx, SocketReceive) ;
wolfSSL 19:1e2f05809eb1 311 CyaSSL_SetIOSend(ctx, SocketSend) ;
wolfSSL 18:d89df40b4cf3 312 }
wolfSSL 18:d89df40b4cf3 313 if (ssl == NULL) {
wolfSSL 19:1e2f05809eb1 314 ssl = CyaSSL_new(ctx);
wolfSSL 19:1e2f05809eb1 315 if (ssl == NULL) {
wolfSSL 19:1e2f05809eb1 316 ERR("unable to get SSL object");
wolfSSL 19:1e2f05809eb1 317 cyassl_free() ;
wolfSSL 19:1e2f05809eb1 318 return HTTP_CONN;
wolfSSL 19:1e2f05809eb1 319 }
wolfSSL 18:d89df40b4cf3 320 }
donatien 0:2ccb9960a044 321
Vanger 34:13920d48893d 322 DBG("ctx=%x, ssl=%x, ssl->ctx->CBIORecv, CBIOSend=%x, %x\r\n",
wolfSSL 18:d89df40b4cf3 323 ctx, ssl, SocketReceive, SocketSend ) ;
wolfSSL 18:d89df40b4cf3 324 if (CyaSSL_connect(ssl) != SSL_SUCCESS) {
wolfSSL 18:d89df40b4cf3 325 ERR("SSL_connect failed");
wolfSSL 18:d89df40b4cf3 326 cyassl_free() ;
wolfSSL 18:d89df40b4cf3 327 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 328 }
wolfSSL 18:d89df40b4cf3 329 } /* SSL connect complete */
donatien 0:2ccb9960a044 330
wolfSSL 18:d89df40b4cf3 331 //Send request
wolfSSL 18:d89df40b4cf3 332 DBG("Sending request");
wolfSSL 18:d89df40b4cf3 333 char buf[CHUNK_SIZE];
ansond 30:6fef375c94e6 334 memset(buf,0,CHUNK_SIZE);
wolfSSL 18:d89df40b4cf3 335 send_buf_p = send_buf ; // Reset send buffer ;
wolfSSL 18:d89df40b4cf3 336
wolfSSL 18:d89df40b4cf3 337 const char* meth = (method==HTTP_GET)?"GET":(method==HTTP_POST)?"POST":(method==HTTP_PUT)?"PUT":(method==HTTP_DELETE)?"DELETE":"";
ansond 31:0675a342e45c 338 snprintf(buf, sizeof(buf), "%s %s HTTP/1.1\r\nHost: %s\r\nConnection: keep-alive\r\n", meth, path, host); //Write request
wolfSSL 18:d89df40b4cf3 339 ret = send(buf);
wolfSSL 18:d89df40b4cf3 340 if(ret) {
Vanger 33:3b2809748a9e 341 m_sock->close();
wolfSSL 18:d89df40b4cf3 342 ERR("Could not write request");
wolfSSL 18:d89df40b4cf3 343 return HTTP_CONN;
donatien 0:2ccb9960a044 344 }
wolfSSL 17:c73d8e61d391 345
wolfSSL 18:d89df40b4cf3 346 //Send all headers
donatien 0:2ccb9960a044 347
wolfSSL 18:d89df40b4cf3 348 //Send default headers
wolfSSL 18:d89df40b4cf3 349 DBG("Sending headers");
ansond 31:0675a342e45c 350 if(m_basicAuthUser && m_basicAuthPassword) {
ansond 31:0675a342e45c 351 bAuth() ; /* send out Basic Auth header */
wolfSSL 27:5d4739eae63e 352 }
wolfSSL 18:d89df40b4cf3 353 if( pDataOut != NULL ) {
wolfSSL 18:d89df40b4cf3 354 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 355 ret = send("Transfer-Encoding: chunked\r\n");
wolfSSL 18:d89df40b4cf3 356 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 357 } else {
wolfSSL 18:d89df40b4cf3 358 snprintf(buf, sizeof(buf), "Content-Length: %d\r\n", pDataOut->getDataLen());
wolfSSL 22:4b9a4151cc73 359 DBG("Content buf:%s", buf) ;
wolfSSL 18:d89df40b4cf3 360 ret = send(buf);
wolfSSL 18:d89df40b4cf3 361 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 362 }
wolfSSL 18:d89df40b4cf3 363 char type[48];
wolfSSL 18:d89df40b4cf3 364 if( pDataOut->getDataType(type, 48) == HTTP_OK ) {
wolfSSL 18:d89df40b4cf3 365 snprintf(buf, sizeof(buf), "Content-Type: %s\r\n", type);
wolfSSL 18:d89df40b4cf3 366 ret = send(buf);
wolfSSL 18:d89df40b4cf3 367 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 368 }
wolfSSL 18:d89df40b4cf3 369 }
wolfSSL 18:d89df40b4cf3 370
wolfSSL 18:d89df40b4cf3 371 //Add user headers
wolfSSL 18:d89df40b4cf3 372 if(header) {
wolfSSL 27:5d4739eae63e 373 ret = send((char *)header);
donatien 5:791fc3dcb6c4 374 CHECK_CONN_ERR(ret);
donatien 0:2ccb9960a044 375 }
donatien 0:2ccb9960a044 376
wolfSSL 18:d89df40b4cf3 377 //Close headers
wolfSSL 18:d89df40b4cf3 378 DBG("Headers sent");
wolfSSL 18:d89df40b4cf3 379 ret = send("\r\n");
wolfSSL 18:d89df40b4cf3 380 CHECK_CONN_ERR(ret);
wolfSSL 17:c73d8e61d391 381
wolfSSL 18:d89df40b4cf3 382 size_t trfLen;
donatien 0:2ccb9960a044 383
wolfSSL 18:d89df40b4cf3 384 //Send data (if available)
wolfSSL 18:d89df40b4cf3 385 if( pDataOut != NULL ) {
wolfSSL 18:d89df40b4cf3 386 DBG("Sending data");
wolfSSL 18:d89df40b4cf3 387 while(true) {
wolfSSL 18:d89df40b4cf3 388 size_t writtenLen = 0;
wolfSSL 18:d89df40b4cf3 389 pDataOut->read(buf, CHUNK_SIZE, &trfLen);
wolfSSL 18:d89df40b4cf3 390 buf[trfLen] = 0x0 ;
wolfSSL 18:d89df40b4cf3 391 DBG("buf:%s", buf) ;
wolfSSL 18:d89df40b4cf3 392 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 393 //Write chunk header
wolfSSL 22:4b9a4151cc73 394 char chunkHeader[64];
wolfSSL 18:d89df40b4cf3 395 snprintf(chunkHeader, sizeof(chunkHeader), "%X\r\n", trfLen); //In hex encoding
wolfSSL 18:d89df40b4cf3 396 ret = send(chunkHeader);
wolfSSL 18:d89df40b4cf3 397 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 398 } else if( trfLen == 0 ) {
wolfSSL 22:4b9a4151cc73 399 DBG("trfLen==0") ;
wolfSSL 18:d89df40b4cf3 400 break;
wolfSSL 18:d89df40b4cf3 401 }
wolfSSL 22:4b9a4151cc73 402 DBG("trfLen 1=%d", trfLen) ;
wolfSSL 18:d89df40b4cf3 403 if( trfLen != 0 ) {
wolfSSL 22:4b9a4151cc73 404 DBG("Sending 1") ;
wolfSSL 18:d89df40b4cf3 405 ret = send(buf, trfLen);
wolfSSL 22:4b9a4151cc73 406 DBG("Sent 1") ;
wolfSSL 18:d89df40b4cf3 407 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 408 }
donatien 0:2ccb9960a044 409
wolfSSL 18:d89df40b4cf3 410 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 411 ret = send("\r\n"); //Chunk-terminating CRLF
wolfSSL 18:d89df40b4cf3 412 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 413 } else {
wolfSSL 18:d89df40b4cf3 414 writtenLen += trfLen;
wolfSSL 18:d89df40b4cf3 415 if( writtenLen >= pDataOut->getDataLen() ) {
wolfSSL 22:4b9a4151cc73 416 DBG("writtenLen=%d", writtenLen) ;
wolfSSL 18:d89df40b4cf3 417 break;
wolfSSL 18:d89df40b4cf3 418 }
wolfSSL 22:4b9a4151cc73 419 DBG("writtenLen+=trfLen = %d", writtenLen) ;
wolfSSL 18:d89df40b4cf3 420 }
wolfSSL 22:4b9a4151cc73 421 DBG("trfLen 2=%d", trfLen) ;
wolfSSL 18:d89df40b4cf3 422 if( trfLen == 0 ) {
wolfSSL 22:4b9a4151cc73 423 DBG("trfLen == 0") ;
wolfSSL 18:d89df40b4cf3 424 break;
wolfSSL 18:d89df40b4cf3 425 }
wolfSSL 18:d89df40b4cf3 426 }
donatien 0:2ccb9960a044 427
wolfSSL 18:d89df40b4cf3 428 }
wolfSSL 18:d89df40b4cf3 429 ret = flush() ; // flush the send buffer ;
wolfSSL 18:d89df40b4cf3 430 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 431
wolfSSL 18:d89df40b4cf3 432 //Receive response
wolfSSL 18:d89df40b4cf3 433 DBG("Receiving response");
wolfSSL 18:d89df40b4cf3 434
wolfSSL 18:d89df40b4cf3 435 ret = recv(buf, CHUNK_SIZE - 1, CHUNK_SIZE - 1, &trfLen); //Read n bytes
wolfSSL 18:d89df40b4cf3 436 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 437
wolfSSL 18:d89df40b4cf3 438 buf[trfLen] = '\0';
wolfSSL 18:d89df40b4cf3 439
wolfSSL 18:d89df40b4cf3 440 char* crlfPtr = strstr(buf, "\r\n");
wolfSSL 18:d89df40b4cf3 441 if(crlfPtr == NULL) {
donatien 5:791fc3dcb6c4 442 PRTCL_ERR();
donatien 0:2ccb9960a044 443 }
donatien 0:2ccb9960a044 444
wolfSSL 18:d89df40b4cf3 445 int crlfPos = crlfPtr - buf;
donatien 0:2ccb9960a044 446 buf[crlfPos] = '\0';
donatien 0:2ccb9960a044 447
wolfSSL 18:d89df40b4cf3 448 //Parse HTTP response
wolfSSL 18:d89df40b4cf3 449 if( sscanf(buf, "HTTP/%*d.%*d %d %*[^\r\n]", &m_httpResponseCode) != 1 ) {
wolfSSL 18:d89df40b4cf3 450 //Cannot match string, error
wolfSSL 18:d89df40b4cf3 451 ERR("Not a correct HTTP answer : %s\n", buf);
wolfSSL 18:d89df40b4cf3 452 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 453 }
donatien 4:c071b05ac026 454
wolfSSL 27:5d4739eae63e 455 if( (m_httpResponseCode < 200) || (m_httpResponseCode >= 400) ) {
wolfSSL 18:d89df40b4cf3 456 //Did not return a 2xx code; TODO fetch headers/(&data?) anyway and implement a mean of writing/reading headers
wolfSSL 18:d89df40b4cf3 457 WARN("Response code %d", m_httpResponseCode);
wolfSSL 18:d89df40b4cf3 458 PRTCL_ERR();
donatien 0:2ccb9960a044 459 }
donatien 0:2ccb9960a044 460
wolfSSL 18:d89df40b4cf3 461 DBG("Reading headers");
donatien 0:2ccb9960a044 462
wolfSSL 18:d89df40b4cf3 463 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2) + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 464 trfLen -= (crlfPos + 2);
donatien 0:2ccb9960a044 465
wolfSSL 18:d89df40b4cf3 466 size_t recvContentLength = 0;
wolfSSL 18:d89df40b4cf3 467 bool recvChunked = false;
wolfSSL 18:d89df40b4cf3 468 //Now get headers
wolfSSL 18:d89df40b4cf3 469 while( true ) {
wolfSSL 18:d89df40b4cf3 470 crlfPtr = strstr(buf, "\r\n");
wolfSSL 18:d89df40b4cf3 471 if(crlfPtr == NULL) {
wolfSSL 18:d89df40b4cf3 472 if( trfLen < CHUNK_SIZE - 1 ) {
ansond 30:6fef375c94e6 473 size_t newTrfLen = 0;
wolfSSL 18:d89df40b4cf3 474 ret = recv(buf + trfLen, 1, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 475 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 476 buf[trfLen] = '\0';
wolfSSL 18:d89df40b4cf3 477 DBG("Read %d chars; In buf: [%s]", newTrfLen, buf);
wolfSSL 18:d89df40b4cf3 478 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 479 continue;
wolfSSL 18:d89df40b4cf3 480 } else {
wolfSSL 18:d89df40b4cf3 481 PRTCL_ERR();
donatien 14:2744e0c0e527 482 }
wolfSSL 18:d89df40b4cf3 483 }
wolfSSL 18:d89df40b4cf3 484
wolfSSL 18:d89df40b4cf3 485 crlfPos = crlfPtr - buf;
wolfSSL 18:d89df40b4cf3 486
wolfSSL 18:d89df40b4cf3 487 if(crlfPos == 0) { //End of headers
wolfSSL 18:d89df40b4cf3 488 DBG("Headers read");
wolfSSL 18:d89df40b4cf3 489 memmove(buf, &buf[2], trfLen - 2 + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 490 trfLen -= 2;
wolfSSL 18:d89df40b4cf3 491 break;
donatien 0:2ccb9960a044 492 }
wolfSSL 18:d89df40b4cf3 493
wolfSSL 18:d89df40b4cf3 494 buf[crlfPos] = '\0';
wolfSSL 18:d89df40b4cf3 495
ansond 30:6fef375c94e6 496 char key[41];
ansond 30:6fef375c94e6 497 char value[41];
wolfSSL 18:d89df40b4cf3 498
ansond 30:6fef375c94e6 499 memset(key,0,41);
ansond 30:6fef375c94e6 500 memset(value,0,41);
wolfSSL 18:d89df40b4cf3 501
ansond 30:6fef375c94e6 502 int n = sscanf(buf, "%40[^:]: %40[^\r\n]", key, value);
wolfSSL 18:d89df40b4cf3 503 if ( n == 2 ) {
wolfSSL 18:d89df40b4cf3 504 DBG("Read header : %s: %s\n", key, value);
wolfSSL 18:d89df40b4cf3 505 if( !strcmp(key, "Content-Length") ) {
wolfSSL 18:d89df40b4cf3 506 sscanf(value, "%d", &recvContentLength);
wolfSSL 18:d89df40b4cf3 507 pDataIn->setDataLen(recvContentLength);
wolfSSL 18:d89df40b4cf3 508 } else if( !strcmp(key, "Transfer-Encoding") ) {
wolfSSL 18:d89df40b4cf3 509 if( !strcmp(value, "Chunked") || !strcmp(value, "chunked") ) {
wolfSSL 18:d89df40b4cf3 510 recvChunked = true;
wolfSSL 18:d89df40b4cf3 511 pDataIn->setIsChunked(true);
wolfSSL 18:d89df40b4cf3 512 }
wolfSSL 18:d89df40b4cf3 513 } else if( !strcmp(key, "Content-Type") ) {
wolfSSL 18:d89df40b4cf3 514 pDataIn->setDataType(value);
wolfSSL 27:5d4739eae63e 515 } else if( !strcmp(key, "location") && redirect_url) {
ansond 31:0675a342e45c 516 sscanf(buf, "%40[^:]: %128[^\r\n]", key, redirect_url);
wolfSSL 27:5d4739eae63e 517 DBG("Redirect %s: %s", key, redirect_url) ;
wolfSSL 27:5d4739eae63e 518 redirect = 1 ;
wolfSSL 18:d89df40b4cf3 519 }
wolfSSL 18:d89df40b4cf3 520 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2) + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 521 trfLen -= (crlfPos + 2);
wolfSSL 18:d89df40b4cf3 522
wolfSSL 18:d89df40b4cf3 523 } else {
wolfSSL 18:d89df40b4cf3 524 ERR("Could not parse header");
donatien 14:2744e0c0e527 525 PRTCL_ERR();
donatien 0:2ccb9960a044 526 }
donatien 0:2ccb9960a044 527
donatien 0:2ccb9960a044 528 }
donatien 0:2ccb9960a044 529
wolfSSL 18:d89df40b4cf3 530 //Receive data
wolfSSL 18:d89df40b4cf3 531 DBG("Receiving data");
wolfSSL 18:d89df40b4cf3 532
wolfSSL 18:d89df40b4cf3 533 while(true) {
wolfSSL 18:d89df40b4cf3 534 size_t readLen = 0;
donatien 0:2ccb9960a044 535
wolfSSL 18:d89df40b4cf3 536 if( recvChunked ) {
wolfSSL 18:d89df40b4cf3 537 //Read chunk header
wolfSSL 18:d89df40b4cf3 538 bool foundCrlf;
wolfSSL 18:d89df40b4cf3 539 do {
wolfSSL 18:d89df40b4cf3 540 foundCrlf = false;
wolfSSL 18:d89df40b4cf3 541 crlfPos=0;
wolfSSL 18:d89df40b4cf3 542 buf[trfLen]=0;
wolfSSL 18:d89df40b4cf3 543 if(trfLen >= 2) {
wolfSSL 18:d89df40b4cf3 544 for(; crlfPos < trfLen - 2; crlfPos++) {
wolfSSL 18:d89df40b4cf3 545 if( buf[crlfPos] == '\r' && buf[crlfPos + 1] == '\n' ) {
wolfSSL 18:d89df40b4cf3 546 foundCrlf = true;
wolfSSL 18:d89df40b4cf3 547 break;
wolfSSL 18:d89df40b4cf3 548 }
wolfSSL 18:d89df40b4cf3 549 }
wolfSSL 18:d89df40b4cf3 550 }
wolfSSL 18:d89df40b4cf3 551 if(!foundCrlf) { //Try to read more
wolfSSL 18:d89df40b4cf3 552 if( trfLen < CHUNK_SIZE ) {
ansond 30:6fef375c94e6 553 size_t newTrfLen = 0;
wolfSSL 18:d89df40b4cf3 554 ret = recv(buf + trfLen, 0, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 555 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 556 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 557 continue;
wolfSSL 18:d89df40b4cf3 558 } else {
wolfSSL 18:d89df40b4cf3 559 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 560 }
wolfSSL 18:d89df40b4cf3 561 }
wolfSSL 18:d89df40b4cf3 562 } while(!foundCrlf);
wolfSSL 18:d89df40b4cf3 563 buf[crlfPos] = '\0';
wolfSSL 18:d89df40b4cf3 564 int n = sscanf(buf, "%x", &readLen);
wolfSSL 18:d89df40b4cf3 565 if(n!=1) {
wolfSSL 18:d89df40b4cf3 566 ERR("Could not read chunk length");
wolfSSL 18:d89df40b4cf3 567 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 568 }
wolfSSL 18:d89df40b4cf3 569
wolfSSL 18:d89df40b4cf3 570 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2)); //Not need to move NULL-terminating char any more
wolfSSL 18:d89df40b4cf3 571 trfLen -= (crlfPos + 2);
donatien 0:2ccb9960a044 572
wolfSSL 18:d89df40b4cf3 573 if( readLen == 0 ) {
wolfSSL 18:d89df40b4cf3 574 //Last chunk
wolfSSL 18:d89df40b4cf3 575 break;
wolfSSL 18:d89df40b4cf3 576 }
wolfSSL 18:d89df40b4cf3 577 } else {
wolfSSL 18:d89df40b4cf3 578 readLen = recvContentLength;
wolfSSL 18:d89df40b4cf3 579 }
wolfSSL 18:d89df40b4cf3 580
wolfSSL 18:d89df40b4cf3 581 DBG("Retrieving %d bytes", readLen);
wolfSSL 18:d89df40b4cf3 582
wolfSSL 18:d89df40b4cf3 583 do {
wolfSSL 18:d89df40b4cf3 584 pDataIn->write(buf, MIN(trfLen, readLen));
wolfSSL 18:d89df40b4cf3 585 if( trfLen > readLen ) {
wolfSSL 18:d89df40b4cf3 586 memmove(buf, &buf[readLen], trfLen - readLen);
wolfSSL 18:d89df40b4cf3 587 trfLen -= readLen;
wolfSSL 18:d89df40b4cf3 588 readLen = 0;
wolfSSL 18:d89df40b4cf3 589 } else {
wolfSSL 18:d89df40b4cf3 590 readLen -= trfLen;
wolfSSL 18:d89df40b4cf3 591 }
donatien 0:2ccb9960a044 592
wolfSSL 18:d89df40b4cf3 593 if(readLen) {
wolfSSL 18:d89df40b4cf3 594 ret = recv(buf, 1, CHUNK_SIZE - trfLen - 1, &trfLen);
wolfSSL 18:d89df40b4cf3 595 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 596 }
wolfSSL 18:d89df40b4cf3 597 } while(readLen);
wolfSSL 18:d89df40b4cf3 598
wolfSSL 18:d89df40b4cf3 599 if( recvChunked ) {
wolfSSL 18:d89df40b4cf3 600 if(trfLen < 2) {
ansond 30:6fef375c94e6 601 size_t newTrfLen = 0;
wolfSSL 18:d89df40b4cf3 602 //Read missing chars to find end of chunk
wolfSSL 18:d89df40b4cf3 603 ret = recv(buf + trfLen, 2 - trfLen, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 604 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 605 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 606 }
wolfSSL 18:d89df40b4cf3 607 if( (buf[0] != '\r') || (buf[1] != '\n') ) {
wolfSSL 18:d89df40b4cf3 608 ERR("Format error");
wolfSSL 18:d89df40b4cf3 609 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 610 }
wolfSSL 18:d89df40b4cf3 611 memmove(buf, &buf[2], trfLen - 2);
wolfSSL 18:d89df40b4cf3 612 trfLen -= 2;
wolfSSL 18:d89df40b4cf3 613 } else {
wolfSSL 18:d89df40b4cf3 614 break;
wolfSSL 18:d89df40b4cf3 615 }
wolfSSL 18:d89df40b4cf3 616
donatien 0:2ccb9960a044 617 }
wolfSSL 20:bec882d85856 618 cyassl_free() ;
Vanger 34:13920d48893d 619 m_sock->close(true);
wolfSSL 18:d89df40b4cf3 620 DBG("Completed HTTP transaction");
wolfSSL 27:5d4739eae63e 621 if(redirect)return HTTP_REDIRECT ;
wolfSSL 27:5d4739eae63e 622 else return HTTP_OK;
donatien 0:2ccb9960a044 623 }
donatien 0:2ccb9960a044 624
wolfSSL 19:1e2f05809eb1 625 HTTPResult HTTPClient::recv(char* buf, size_t minLen, size_t maxLen, size_t* pReadLen) //0 on success, err code on failure
donatien 0:2ccb9960a044 626 {
wolfSSL 18:d89df40b4cf3 627 DBG("Trying to read between %d and %d bytes", minLen, maxLen);
wolfSSL 18:d89df40b4cf3 628 size_t readLen = 0;
wolfSSL 18:d89df40b4cf3 629
Vanger 33:3b2809748a9e 630 if(!m_sock->is_connected()) {
wolfSSL 18:d89df40b4cf3 631 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 632 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 18:d89df40b4cf3 633 }
wolfSSL 18:d89df40b4cf3 634
wolfSSL 18:d89df40b4cf3 635 int ret;
wolfSSL 18:d89df40b4cf3 636
wolfSSL 18:d89df40b4cf3 637 if(port == HTTPS_PORT) {
wolfSSL 18:d89df40b4cf3 638 DBG("Enter CyaSSL_read") ;
wolfSSL 18:d89df40b4cf3 639
Vanger 33:3b2809748a9e 640 m_sock->set_blocking(false, m_timeout);
wolfSSL 18:d89df40b4cf3 641 readLen = CyaSSL_read(ssl, buf, maxLen);
wolfSSL 18:d89df40b4cf3 642 if (readLen > 0) {
wolfSSL 18:d89df40b4cf3 643 buf[readLen] = 0;
wolfSSL 18:d89df40b4cf3 644 DBG("CyaSSL_read:%s\n", buf);
wolfSSL 18:d89df40b4cf3 645 } else {
wolfSSL 18:d89df40b4cf3 646 ERR("CyaSSL_read, ret = %d", readLen) ;
wolfSSL 18:d89df40b4cf3 647 return HTTP_ERROR ;
wolfSSL 18:d89df40b4cf3 648 }
wolfSSL 18:d89df40b4cf3 649 DBG("Read %d bytes", readLen);
wolfSSL 18:d89df40b4cf3 650 *pReadLen = readLen;
wolfSSL 18:d89df40b4cf3 651 return HTTP_OK;
wolfSSL 18:d89df40b4cf3 652 }
wolfSSL 18:d89df40b4cf3 653
wolfSSL 18:d89df40b4cf3 654 while(readLen < maxLen) {
wolfSSL 18:d89df40b4cf3 655 if(readLen < minLen) {
wolfSSL 18:d89df40b4cf3 656 DBG("Trying to read at most %d bytes [Blocking]", minLen - readLen);
Vanger 33:3b2809748a9e 657 m_sock->set_blocking(false, m_timeout);
Vanger 33:3b2809748a9e 658 ret = m_sock->receive_all(buf + readLen, minLen - readLen);
wolfSSL 18:d89df40b4cf3 659 } else {
wolfSSL 18:d89df40b4cf3 660 DBG("Trying to read at most %d bytes [Not blocking]", maxLen - readLen);
Vanger 33:3b2809748a9e 661 m_sock->set_blocking(false, 0);
Vanger 33:3b2809748a9e 662 ret = m_sock->receive(buf + readLen, maxLen - readLen);
wolfSSL 18:d89df40b4cf3 663 }
wolfSSL 18:d89df40b4cf3 664
wolfSSL 18:d89df40b4cf3 665 if( ret > 0) {
wolfSSL 18:d89df40b4cf3 666 readLen += ret;
wolfSSL 18:d89df40b4cf3 667 } else if( ret == 0 ) {
wolfSSL 18:d89df40b4cf3 668 break;
wolfSSL 18:d89df40b4cf3 669 } else {
Vanger 33:3b2809748a9e 670 if(!m_sock->is_connected()) {
wolfSSL 18:d89df40b4cf3 671 ERR("Connection error (recv returned %d)", ret);
wolfSSL 18:d89df40b4cf3 672 *pReadLen = readLen;
wolfSSL 18:d89df40b4cf3 673 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 674 } else {
wolfSSL 18:d89df40b4cf3 675 break;
wolfSSL 18:d89df40b4cf3 676 }
wolfSSL 18:d89df40b4cf3 677 }
wolfSSL 18:d89df40b4cf3 678
Vanger 33:3b2809748a9e 679 if(!m_sock->is_connected()) {
wolfSSL 18:d89df40b4cf3 680 break;
wolfSSL 18:d89df40b4cf3 681 }
wolfSSL 17:c73d8e61d391 682 }
wolfSSL 17:c73d8e61d391 683 DBG("Read %d bytes", readLen);
wolfSSL 17:c73d8e61d391 684 *pReadLen = readLen;
Vanger 34:13920d48893d 685 m_sock->set_blocking(false, m_timeout);
wolfSSL 17:c73d8e61d391 686 return HTTP_OK;
donatien 7:4e39864f7b15 687 }
donatien 7:4e39864f7b15 688
wolfSSL 19:1e2f05809eb1 689 HTTPResult HTTPClient::send(char* buf, size_t len) //0 on success, err code on failure
donatien 7:4e39864f7b15 690 {
wolfSSL 18:d89df40b4cf3 691 HTTPResult ret ;
wolfSSL 18:d89df40b4cf3 692 int cp_len ;
wolfSSL 18:d89df40b4cf3 693
wolfSSL 18:d89df40b4cf3 694 if(len == 0) {
wolfSSL 18:d89df40b4cf3 695 len = strlen(buf);
wolfSSL 17:c73d8e61d391 696 }
wolfSSL 17:c73d8e61d391 697
wolfSSL 18:d89df40b4cf3 698 do {
wolfSSL 22:4b9a4151cc73 699
wolfSSL 18:d89df40b4cf3 700 if((SEND_BUF_SIZE - (send_buf_p - send_buf)) >= len) {
wolfSSL 18:d89df40b4cf3 701 cp_len = len ;
wolfSSL 18:d89df40b4cf3 702 } else {
wolfSSL 22:4b9a4151cc73 703 cp_len = SEND_BUF_SIZE - (send_buf_p - send_buf) ;
wolfSSL 18:d89df40b4cf3 704 }
wolfSSL 22:4b9a4151cc73 705 DBG("send_buf_p:%x. send_buf+SIZE:%x, len=%d, cp_len=%d", send_buf_p, send_buf+SEND_BUF_SIZE, len, cp_len) ;
wolfSSL 18:d89df40b4cf3 706 memcpy(send_buf_p, buf, cp_len) ;
wolfSSL 18:d89df40b4cf3 707 send_buf_p += cp_len ;
wolfSSL 18:d89df40b4cf3 708 len -= cp_len ;
wolfSSL 18:d89df40b4cf3 709
wolfSSL 18:d89df40b4cf3 710 if(send_buf_p == send_buf + SEND_BUF_SIZE) {
wolfSSL 22:4b9a4151cc73 711 if(port == HTTPS_PORT){
wolfSSL 22:4b9a4151cc73 712 ERR("HTTPClient::send buffer overflow");
wolfSSL 22:4b9a4151cc73 713 return HTTP_ERROR ;
wolfSSL 22:4b9a4151cc73 714 }
wolfSSL 18:d89df40b4cf3 715 ret = flush() ;
wolfSSL 18:d89df40b4cf3 716 if(ret)return(ret) ;
wolfSSL 18:d89df40b4cf3 717 }
wolfSSL 18:d89df40b4cf3 718 } while(len) ;
wolfSSL 18:d89df40b4cf3 719 return HTTP_OK ;
wolfSSL 17:c73d8e61d391 720 }
wolfSSL 17:c73d8e61d391 721
wolfSSL 19:1e2f05809eb1 722 HTTPResult HTTPClient::flush() //0 on success, err code on failure
wolfSSL 17:c73d8e61d391 723 {
wolfSSL 18:d89df40b4cf3 724 int len ;
wolfSSL 18:d89df40b4cf3 725 char * buf ;
wolfSSL 18:d89df40b4cf3 726
wolfSSL 18:d89df40b4cf3 727 buf = send_buf ;
wolfSSL 18:d89df40b4cf3 728 len = send_buf_p - send_buf ;
wolfSSL 18:d89df40b4cf3 729 send_buf_p = send_buf ; // reset send buffer
wolfSSL 18:d89df40b4cf3 730
wolfSSL 18:d89df40b4cf3 731 DBG("Trying to write %d bytes:%s\n", len, buf);
wolfSSL 18:d89df40b4cf3 732 size_t writtenLen = 0;
wolfSSL 18:d89df40b4cf3 733
Vanger 33:3b2809748a9e 734 if(!m_sock->is_connected()) {
wolfSSL 18:d89df40b4cf3 735 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 736 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 17:c73d8e61d391 737 }
wolfSSL 18:d89df40b4cf3 738
wolfSSL 18:d89df40b4cf3 739 if(port == HTTPS_PORT) {
wolfSSL 18:d89df40b4cf3 740 DBG("Enter CyaSSL_write") ;
wolfSSL 18:d89df40b4cf3 741 if (CyaSSL_write(ssl, buf, len) != len) {
wolfSSL 18:d89df40b4cf3 742 ERR("SSL_write failed");
wolfSSL 18:d89df40b4cf3 743 return HTTP_ERROR ;
wolfSSL 18:d89df40b4cf3 744 }
wolfSSL 18:d89df40b4cf3 745 DBG("Written %d bytes", writtenLen);
wolfSSL 18:d89df40b4cf3 746 return HTTP_OK;
wolfSSL 18:d89df40b4cf3 747 }
Vanger 33:3b2809748a9e 748 m_sock->set_blocking(false, m_timeout);
Vanger 33:3b2809748a9e 749 int ret = m_sock->send_all(buf, len);
wolfSSL 18:d89df40b4cf3 750 if(ret > 0) {
wolfSSL 18:d89df40b4cf3 751 writtenLen += ret;
wolfSSL 18:d89df40b4cf3 752 } else if( ret == 0 ) {
wolfSSL 18:d89df40b4cf3 753 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 754 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 18:d89df40b4cf3 755 } else {
wolfSSL 18:d89df40b4cf3 756 ERR("Connection error (send returned %d)", ret);
wolfSSL 18:d89df40b4cf3 757 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 758 }
wolfSSL 18:d89df40b4cf3 759
wolfSSL 17:c73d8e61d391 760 DBG("Written %d bytes", writtenLen);
wolfSSL 17:c73d8e61d391 761 return HTTP_OK;
donatien 0:2ccb9960a044 762 }
donatien 0:2ccb9960a044 763
wolfSSL 19:1e2f05809eb1 764 HTTPResult HTTPClient::parseURL(const char* url, char* scheme, size_t maxSchemeLen, char* host, size_t maxHostLen, uint16_t* port, char* path, size_t maxPathLen) //Parse URL
donatien 0:2ccb9960a044 765 {
wolfSSL 18:d89df40b4cf3 766 char* schemePtr = (char*) url;
wolfSSL 18:d89df40b4cf3 767 char* hostPtr = (char*) strstr(url, "://");
wolfSSL 18:d89df40b4cf3 768 if(hostPtr == NULL) {
wolfSSL 18:d89df40b4cf3 769 WARN("Could not find host");
wolfSSL 18:d89df40b4cf3 770 return HTTP_PARSE; //URL is invalid
wolfSSL 18:d89df40b4cf3 771 }
wolfSSL 18:d89df40b4cf3 772
wolfSSL 18:d89df40b4cf3 773 if( maxSchemeLen < hostPtr - schemePtr + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 774 WARN("Scheme str is too small (%d >= %d)", maxSchemeLen, hostPtr - schemePtr + 1);
wolfSSL 18:d89df40b4cf3 775 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 776 }
wolfSSL 18:d89df40b4cf3 777 memcpy(scheme, schemePtr, hostPtr - schemePtr);
wolfSSL 18:d89df40b4cf3 778 scheme[hostPtr - schemePtr] = '\0';
donatien 0:2ccb9960a044 779
wolfSSL 18:d89df40b4cf3 780 hostPtr+=3;
donatien 0:2ccb9960a044 781
wolfSSL 18:d89df40b4cf3 782 size_t hostLen = 0;
donatien 0:2ccb9960a044 783
wolfSSL 18:d89df40b4cf3 784 char* portPtr = strchr(hostPtr, ':');
wolfSSL 18:d89df40b4cf3 785 if( portPtr != NULL ) {
wolfSSL 18:d89df40b4cf3 786 hostLen = portPtr - hostPtr;
wolfSSL 18:d89df40b4cf3 787 portPtr++;
wolfSSL 18:d89df40b4cf3 788 if( sscanf(portPtr, "%hu", port) != 1) {
wolfSSL 18:d89df40b4cf3 789 WARN("Could not find port");
wolfSSL 18:d89df40b4cf3 790 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 791 }
wolfSSL 18:d89df40b4cf3 792 } else {
wolfSSL 18:d89df40b4cf3 793 *port=0;
donatien 0:2ccb9960a044 794 }
wolfSSL 18:d89df40b4cf3 795 char* pathPtr = strchr(hostPtr, '/');
wolfSSL 18:d89df40b4cf3 796 if( hostLen == 0 ) {
wolfSSL 18:d89df40b4cf3 797 hostLen = pathPtr - hostPtr;
wolfSSL 18:d89df40b4cf3 798 }
donatien 0:2ccb9960a044 799
wolfSSL 18:d89df40b4cf3 800 if( maxHostLen < hostLen + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 801 WARN("Host str is too small (%d >= %d)", maxHostLen, hostLen + 1);
wolfSSL 18:d89df40b4cf3 802 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 803 }
wolfSSL 18:d89df40b4cf3 804 memcpy(host, hostPtr, hostLen);
wolfSSL 18:d89df40b4cf3 805 host[hostLen] = '\0';
donatien 0:2ccb9960a044 806
wolfSSL 18:d89df40b4cf3 807 size_t pathLen;
wolfSSL 18:d89df40b4cf3 808 char* fragmentPtr = strchr(hostPtr, '#');
wolfSSL 18:d89df40b4cf3 809 if(fragmentPtr != NULL) {
wolfSSL 18:d89df40b4cf3 810 pathLen = fragmentPtr - pathPtr;
wolfSSL 18:d89df40b4cf3 811 } else {
wolfSSL 18:d89df40b4cf3 812 pathLen = strlen(pathPtr);
wolfSSL 18:d89df40b4cf3 813 }
donatien 0:2ccb9960a044 814
wolfSSL 18:d89df40b4cf3 815 if( maxPathLen < pathLen + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 816 WARN("Path str is too small (%d >= %d)", maxPathLen, pathLen + 1);
wolfSSL 18:d89df40b4cf3 817 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 818 }
wolfSSL 18:d89df40b4cf3 819 memcpy(path, pathPtr, pathLen);
wolfSSL 18:d89df40b4cf3 820 path[pathLen] = '\0';
donatien 0:2ccb9960a044 821
wolfSSL 18:d89df40b4cf3 822 return HTTP_OK;
donatien 0:2ccb9960a044 823 }
wolfSSL 22:4b9a4151cc73 824
wolfSSL 22:4b9a4151cc73 825 HTTPResult HTTPClient::bAuth(void)
wolfSSL 22:4b9a4151cc73 826 {
wolfSSL 22:4b9a4151cc73 827 HTTPResult ret ;
wolfSSL 22:4b9a4151cc73 828 char b_auth[(int)((AUTHB_SIZE+3)*4/3+1)] ;
wolfSSL 22:4b9a4151cc73 829 char base64buff[AUTHB_SIZE+3] ;
Vanger 34:13920d48893d 830
wolfSSL 22:4b9a4151cc73 831 ret = send("Authorization: Basic ") ;
wolfSSL 22:4b9a4151cc73 832 CHECK_CONN_ERR(ret);
wolfSSL 22:4b9a4151cc73 833 sprintf(base64buff, "%s:%s", m_basicAuthUser, m_basicAuthPassword) ;
wolfSSL 27:5d4739eae63e 834 DBG("bAuth: %s", base64buff) ;
wolfSSL 22:4b9a4151cc73 835 base64enc(b_auth, base64buff) ;
Vanger 34:13920d48893d 836 printf("size of b_auth %d, strlen of b_auth %d\r\n", sizeof(b_auth), strlen(b_auth));
Vanger 34:13920d48893d 837 int b_auth_len = strlen(b_auth);
Vanger 34:13920d48893d 838 if(b_auth_len + 3 >= sizeof(b_auth)) { //\r\n\0 characters make up the +3
Vanger 34:13920d48893d 839 ERR("The encoded line is larger than the buffer that holds it");
Vanger 34:13920d48893d 840 }
Vanger 34:13920d48893d 841 b_auth[b_auth_len + 2] = '\0' ;
Vanger 34:13920d48893d 842 b_auth[b_auth_len + 1] = '\n' ;
Vanger 34:13920d48893d 843 b_auth[b_auth_len] = '\r' ;
wolfSSL 22:4b9a4151cc73 844 DBG("b_auth:%s", b_auth) ;
wolfSSL 22:4b9a4151cc73 845 ret = send(b_auth) ;
wolfSSL 22:4b9a4151cc73 846 CHECK_CONN_ERR(ret);
wolfSSL 22:4b9a4151cc73 847 return HTTP_OK ;
wolfSSL 22:4b9a4151cc73 848 }