Change buffer sizes to support GR-PEACH

Dependencies:   CyaSSL

Dependents:   GR-PEACH_Azure_Speech

Fork of HTTPClient-SSL by MultiTech

Committer:
ksekimoto
Date:
Sat Nov 07 12:20:31 2015 +0000
Revision:
50:7fbf8ef951f2
Parent:
46:369da903fca9
The first version

Who changed what in which revision?

UserRevisionLine numberNew contents of line
donatien 0:2ccb9960a044 1 /* HTTPClient.cpp */
donatien 10:e1351de84c16 2 /* Copyright (C) 2012 mbed.org, MIT License
donatien 10:e1351de84c16 3 *
donatien 10:e1351de84c16 4 * Permission is hereby granted, free of charge, to any person obtaining a copy of this software
donatien 10:e1351de84c16 5 * and associated documentation files (the "Software"), to deal in the Software without restriction,
donatien 10:e1351de84c16 6 * including without limitation the rights to use, copy, modify, merge, publish, distribute,
donatien 10:e1351de84c16 7 * sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is
donatien 10:e1351de84c16 8 * furnished to do so, subject to the following conditions:
donatien 10:e1351de84c16 9 *
donatien 10:e1351de84c16 10 * The above copyright notice and this permission notice shall be included in all copies or
donatien 10:e1351de84c16 11 * substantial portions of the Software.
donatien 10:e1351de84c16 12 *
donatien 10:e1351de84c16 13 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
donatien 10:e1351de84c16 14 * BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
donatien 10:e1351de84c16 15 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
donatien 10:e1351de84c16 16 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
donatien 10:e1351de84c16 17 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
donatien 10:e1351de84c16 18 */
ansond 29:2d96cc752d19 19
ansond 29:2d96cc752d19 20 // DMA: Added tunable to adapt size of larger input URLs
ksekimoto 50:7fbf8ef951f2 21 #define MAX_URL_HOSTNAME_LENGTH 512
ksekimoto 50:7fbf8ef951f2 22 #define MAX_URL_PATH_LENGTH 512
donatien 0:2ccb9960a044 23
donatien 7:4e39864f7b15 24 //Debug is disabled by default
Vanger 40:6d9725c3eb6f 25 #if 0
donatien 12:89d09a6db00a 26 //Enable debug
donatien 11:390362de8c3f 27 #include <cstdio>
wolfSSL 18:d89df40b4cf3 28 #define DBG(x, ...) std::printf("[HTTPClient : DBG]"x"\r\n", ##__VA_ARGS__);
wolfSSL 18:d89df40b4cf3 29 #define WARN(x, ...) std::printf("[HTTPClient : WARN]"x"\r\n", ##__VA_ARGS__);
wolfSSL 18:d89df40b4cf3 30 #define ERR(x, ...) std::printf("[HTTPClient : ERR]"x"\r\n", ##__VA_ARGS__);
donatien 12:89d09a6db00a 31
donatien 12:89d09a6db00a 32 #else
donatien 12:89d09a6db00a 33 //Disable debug
wolfSSL 18:d89df40b4cf3 34 #define DBG(x, ...)
donatien 12:89d09a6db00a 35 #define WARN(x, ...)
wolfSSL 18:d89df40b4cf3 36 #define ERR(x, ...)
donatien 12:89d09a6db00a 37
donatien 7:4e39864f7b15 38 #endif
donatien 0:2ccb9960a044 39
donatien 0:2ccb9960a044 40 #define HTTP_PORT 80
wolfSSL 17:c73d8e61d391 41 #define HTTPS_PORT 443
donatien 0:2ccb9960a044 42
donatien 11:390362de8c3f 43 #define OK 0
donatien 11:390362de8c3f 44
donatien 11:390362de8c3f 45 #define MIN(x,y) (((x)<(y))?(x):(y))
donatien 11:390362de8c3f 46 #define MAX(x,y) (((x)>(y))?(x):(y))
donatien 11:390362de8c3f 47
ksekimoto 50:7fbf8ef951f2 48 #include "mbed.h"
ksekimoto 50:7fbf8ef951f2 49 #include <string>
wolfSSL 17:c73d8e61d391 50 #include <cstring>
donatien 0:2ccb9960a044 51
mfiore 41:236fa1143e5a 52 #include <settings.h>
mfiore 41:236fa1143e5a 53 #include <types.h>
mfiore 41:236fa1143e5a 54 #include <internal.h>
mfiore 41:236fa1143e5a 55 #include <ssl.h>
donatien 0:2ccb9960a044 56
donatien 11:390362de8c3f 57 #include "HTTPClient.h"
wolfSSL 17:c73d8e61d391 58
Vanger 33:3b2809748a9e 59 static TCPSocketConnection* m_sock;
ksekimoto 50:7fbf8ef951f2 60 //#define CHUNK_SIZE 256
ksekimoto 50:7fbf8ef951f2 61 //#define SEND_BUF_SIZE 1024
ksekimoto 50:7fbf8ef951f2 62 #define CHUNK_SIZE (1024*8)
ksekimoto 50:7fbf8ef951f2 63 #define SEND_BUF_SIZE (1024*4)
wolfSSL 17:c73d8e61d391 64 static char send_buf[SEND_BUF_SIZE] ;
ansond 32:d9db238bb8a3 65 static char *send_buf_p = NULL;
wolfSSL 17:c73d8e61d391 66
wolfSSL 17:c73d8e61d391 67 static int SocketReceive(CYASSL* ssl, char *buf, int sz, void *ctx)
wolfSSL 17:c73d8e61d391 68 {
wolfSSL 17:c73d8e61d391 69 int n ;
wolfSSL 17:c73d8e61d391 70 int i ;
wolfSSL 18:d89df40b4cf3 71 #define RECV_RETRY 3
wolfSSL 22:4b9a4151cc73 72
wolfSSL 17:c73d8e61d391 73 for(i=0; i<RECV_RETRY; i++) {
Vanger 33:3b2809748a9e 74 n = m_sock->receive(buf, sz) ;
wolfSSL 17:c73d8e61d391 75 if(n >= 0)return n ;
wolfSSL 22:4b9a4151cc73 76 wait(0.2) ;
wolfSSL 17:c73d8e61d391 77 }
wolfSSL 17:c73d8e61d391 78 ERR("SocketReceive:%d/%d\n", n, sz) ;
wolfSSL 17:c73d8e61d391 79 return n ;
wolfSSL 17:c73d8e61d391 80 }
wolfSSL 17:c73d8e61d391 81
wolfSSL 17:c73d8e61d391 82 static int SocketSend(CYASSL* ssl, char *buf, int sz, void *ctx)
wolfSSL 17:c73d8e61d391 83 {
wolfSSL 17:c73d8e61d391 84 int n ;
Vanger 34:13920d48893d 85
Vanger 34:13920d48893d 86 wait(0.1);
Vanger 33:3b2809748a9e 87 n = m_sock->send(buf, sz);
wolfSSL 17:c73d8e61d391 88 if(n > 0) {
Vanger 34:13920d48893d 89 wait(0.3);
Vanger 34:13920d48893d 90 return n;
Vanger 34:13920d48893d 91 } else {
Vanger 34:13920d48893d 92 ERR("SocketSend:%d/%d\n", n, sz);
Vanger 34:13920d48893d 93 }
Vanger 34:13920d48893d 94 return n;
wolfSSL 17:c73d8e61d391 95 }
donatien 11:390362de8c3f 96
wolfSSL 22:4b9a4151cc73 97 static void base64enc(char *out, const char *in) {
wolfSSL 22:4b9a4151cc73 98 const char code[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=" ;
wolfSSL 22:4b9a4151cc73 99 int i = 0, x = 0, l = 0;
wolfSSL 22:4b9a4151cc73 100
wolfSSL 22:4b9a4151cc73 101 for (; *in; in++) {
wolfSSL 22:4b9a4151cc73 102 x = x << 8 | *in;
wolfSSL 22:4b9a4151cc73 103 for (l += 8; l >= 6; l -= 6) {
wolfSSL 22:4b9a4151cc73 104 out[i++] = code[(x >> (l - 6)) & 0x3f];
wolfSSL 22:4b9a4151cc73 105 }
wolfSSL 22:4b9a4151cc73 106 }
wolfSSL 22:4b9a4151cc73 107 if (l > 0) {
wolfSSL 22:4b9a4151cc73 108 x <<= 6 - l;
wolfSSL 22:4b9a4151cc73 109 out[i++] = code[x & 0x3f];
wolfSSL 22:4b9a4151cc73 110 }
wolfSSL 22:4b9a4151cc73 111 for (; i % 4;) {
wolfSSL 22:4b9a4151cc73 112 out[i++] = '=';
wolfSSL 22:4b9a4151cc73 113 }
wolfSSL 22:4b9a4151cc73 114 out[i] = '\0' ;
wolfSSL 22:4b9a4151cc73 115 }
wolfSSL 22:4b9a4151cc73 116
donatien 0:2ccb9960a044 117 HTTPClient::HTTPClient() :
wolfSSL 18:d89df40b4cf3 118 m_basicAuthUser(NULL), m_basicAuthPassword(NULL), m_httpResponseCode(0)
donatien 0:2ccb9960a044 119 {
Vanger 42:2f464f96c204 120 m_sock = &_m_sock;
Vanger 46:369da903fca9 121 //CyaSSL_Debugging_ON() ; //Turn on if the CyaSSL library isn't working, turns on debug printf's
Vanger 38:a4ccad70be9d 122
Vanger 42:2f464f96c204 123 peerMethod = VERIFY_NONE;
wolfSSL 18:d89df40b4cf3 124 ctx = 0 ;
wolfSSL 18:d89df40b4cf3 125 ssl = 0 ;
wolfSSL 22:4b9a4151cc73 126 SSLver = 3 ;
Vanger 38:a4ccad70be9d 127 certificates = NULL;
wolfSSL 27:5d4739eae63e 128 redirect_url = NULL ;
wolfSSL 27:5d4739eae63e 129 redirect = 0 ;
wolfSSL 27:5d4739eae63e 130 header = NULL ;
donatien 0:2ccb9960a044 131 }
donatien 0:2ccb9960a044 132
donatien 0:2ccb9960a044 133 HTTPClient::~HTTPClient()
donatien 0:2ccb9960a044 134 {
Vanger 42:2f464f96c204 135 if(m_basicAuthPassword) {
Vanger 42:2f464f96c204 136 free((void *)m_basicAuthPassword);
Vanger 42:2f464f96c204 137 m_basicAuthPassword = NULL;
Vanger 42:2f464f96c204 138 }
Vanger 42:2f464f96c204 139 if(m_basicAuthUser) {
Vanger 42:2f464f96c204 140 free((void *)m_basicAuthUser);
Vanger 42:2f464f96c204 141 m_basicAuthUser = NULL;
Vanger 42:2f464f96c204 142 }
Vanger 42:2f464f96c204 143 if(certificates) {
Vanger 42:2f464f96c204 144 free((void *)certificates);
Vanger 42:2f464f96c204 145 certificates = NULL;
Vanger 42:2f464f96c204 146 }
donatien 0:2ccb9960a044 147 }
donatien 0:2ccb9960a044 148
wolfSSL 22:4b9a4151cc73 149 HTTPResult HTTPClient::basicAuth(const char* user, const char* password) //Basic Authentification
donatien 0:2ccb9960a044 150 {
wolfSSL 22:4b9a4151cc73 151 #define AUTHB_SIZE 128
wolfSSL 22:4b9a4151cc73 152 if((strlen(user) + strlen(password)) >= AUTHB_SIZE)
wolfSSL 22:4b9a4151cc73 153 return HTTP_ERROR ;
ansond 30:6fef375c94e6 154
ansond 30:6fef375c94e6 155 if (m_basicAuthUser) free((void *)m_basicAuthUser);
ansond 30:6fef375c94e6 156 if (user != NULL) {
ansond 30:6fef375c94e6 157 m_basicAuthUser = (char *)malloc(strlen(user)+1);
ansond 30:6fef375c94e6 158 strcpy((char *)m_basicAuthUser, user);
Vanger 38:a4ccad70be9d 159 } else {
Vanger 38:a4ccad70be9d 160 m_basicAuthUser = NULL;
ansond 30:6fef375c94e6 161 }
ansond 30:6fef375c94e6 162
ansond 30:6fef375c94e6 163 if (m_basicAuthPassword) free((void *)m_basicAuthPassword);
ansond 30:6fef375c94e6 164 if (password != NULL) {
ansond 30:6fef375c94e6 165 m_basicAuthPassword = (char *)malloc(strlen(password)+1);
ansond 30:6fef375c94e6 166 strcpy((char *)m_basicAuthPassword, password);
Vanger 38:a4ccad70be9d 167 } else {
Vanger 38:a4ccad70be9d 168 m_basicAuthPassword = NULL;
Vanger 38:a4ccad70be9d 169 }
ansond 30:6fef375c94e6 170
wolfSSL 22:4b9a4151cc73 171 return HTTP_OK ;
donatien 0:2ccb9960a044 172 }
donatien 0:2ccb9960a044 173
donatien 12:89d09a6db00a 174 HTTPResult HTTPClient::get(const char* url, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 175 {
wolfSSL 18:d89df40b4cf3 176 return connect(url, HTTP_GET, NULL, pDataIn, timeout);
donatien 0:2ccb9960a044 177 }
donatien 0:2ccb9960a044 178
donatien 12:89d09a6db00a 179 HTTPResult HTTPClient::get(const char* url, char* result, size_t maxResultLen, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 180 {
wolfSSL 18:d89df40b4cf3 181 HTTPText str(result, maxResultLen);
wolfSSL 18:d89df40b4cf3 182 return get(url, &str, timeout);
donatien 0:2ccb9960a044 183 }
donatien 0:2ccb9960a044 184
donatien 12:89d09a6db00a 185 HTTPResult HTTPClient::post(const char* url, const IHTTPDataOut& dataOut, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 186 {
wolfSSL 18:d89df40b4cf3 187 return connect(url, HTTP_POST, (IHTTPDataOut*)&dataOut, pDataIn, timeout);
donatien 0:2ccb9960a044 188 }
donatien 0:2ccb9960a044 189
donatien 16:1f743885e7de 190 HTTPResult HTTPClient::put(const char* url, const IHTTPDataOut& dataOut, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 16:1f743885e7de 191 {
wolfSSL 18:d89df40b4cf3 192 return connect(url, HTTP_PUT, (IHTTPDataOut*)&dataOut, pDataIn, timeout);
donatien 16:1f743885e7de 193 }
donatien 16:1f743885e7de 194
donatien 16:1f743885e7de 195 HTTPResult HTTPClient::del(const char* url, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 16:1f743885e7de 196 {
wolfSSL 18:d89df40b4cf3 197 return connect(url, HTTP_DELETE, NULL, pDataIn, timeout);
donatien 16:1f743885e7de 198 }
donatien 16:1f743885e7de 199
donatien 16:1f743885e7de 200
donatien 0:2ccb9960a044 201 int HTTPClient::getHTTPResponseCode()
donatien 0:2ccb9960a044 202 {
wolfSSL 18:d89df40b4cf3 203 return m_httpResponseCode;
donatien 0:2ccb9960a044 204 }
donatien 0:2ccb9960a044 205
wolfSSL 27:5d4739eae63e 206 void HTTPClient::setHeader(const char * h)
wolfSSL 17:c73d8e61d391 207 {
wolfSSL 17:c73d8e61d391 208 header = h ;
wolfSSL 17:c73d8e61d391 209 }
wolfSSL 17:c73d8e61d391 210
wolfSSL 27:5d4739eae63e 211 void HTTPClient::setLocationBuf(char * url, int size)
wolfSSL 27:5d4739eae63e 212 {
wolfSSL 27:5d4739eae63e 213 redirect_url = url ;
wolfSSL 27:5d4739eae63e 214 redirect_url_size = size ;
wolfSSL 27:5d4739eae63e 215 }
wolfSSL 27:5d4739eae63e 216
wolfSSL 22:4b9a4151cc73 217 HTTPResult HTTPClient::setSSLversion(int minorV)
wolfSSL 22:4b9a4151cc73 218 {
wolfSSL 22:4b9a4151cc73 219 if((minorV>=0) && (minorV<=3))
wolfSSL 22:4b9a4151cc73 220 SSLver = minorV ;
wolfSSL 22:4b9a4151cc73 221 else return HTTP_ERROR ;
wolfSSL 22:4b9a4151cc73 222 return HTTP_OK ;
wolfSSL 22:4b9a4151cc73 223 }
wolfSSL 22:4b9a4151cc73 224
Vanger 38:a4ccad70be9d 225 HTTPResult HTTPClient::addRootCACertificate(const char* cert)
Vanger 38:a4ccad70be9d 226 {
Vanger 38:a4ccad70be9d 227 if(cert == NULL) {
Vanger 38:a4ccad70be9d 228 if(certificates != NULL) {
Vanger 38:a4ccad70be9d 229 free((void *)certificates);
Vanger 38:a4ccad70be9d 230 }
Vanger 38:a4ccad70be9d 231 } else {
Vanger 38:a4ccad70be9d 232 //Append certificate, else allocate new certificate
Vanger 38:a4ccad70be9d 233 if(certificates != NULL) {
Vanger 38:a4ccad70be9d 234 certificates = (char *)realloc((void *)certificates, strlen(cert) + 1 + strlen(certificates)); //+1 is for '\0' char
Vanger 38:a4ccad70be9d 235 if(certificates == NULL) {
Vanger 38:a4ccad70be9d 236 return HTTP_ERROR;
Vanger 38:a4ccad70be9d 237 } else {
Vanger 38:a4ccad70be9d 238 strcat((char *)certificates, cert);
Vanger 38:a4ccad70be9d 239 }
Vanger 38:a4ccad70be9d 240 } else {
Vanger 38:a4ccad70be9d 241 certificates = (char *)malloc(strlen(cert) + 1);
Vanger 38:a4ccad70be9d 242 if(certificates == NULL) {
Vanger 38:a4ccad70be9d 243 return HTTP_ERROR;
Vanger 38:a4ccad70be9d 244 } else {
Vanger 38:a4ccad70be9d 245 strcpy((char *)certificates, cert);
Vanger 38:a4ccad70be9d 246 }
Vanger 38:a4ccad70be9d 247 }
Vanger 38:a4ccad70be9d 248 }
Vanger 38:a4ccad70be9d 249 return HTTP_OK;
Vanger 38:a4ccad70be9d 250 }
Vanger 38:a4ccad70be9d 251
Vanger 38:a4ccad70be9d 252 void HTTPClient::setPeerVerification(SSLMethod method) {
Vanger 42:2f464f96c204 253 peerMethod = method;
Vanger 38:a4ccad70be9d 254 }
Vanger 38:a4ccad70be9d 255
wolfSSL 17:c73d8e61d391 256
donatien 5:791fc3dcb6c4 257 #define CHECK_CONN_ERR(ret) \
donatien 5:791fc3dcb6c4 258 do{ \
donatien 7:4e39864f7b15 259 if(ret) { \
wolfSSL 17:c73d8e61d391 260 cyassl_free() ;\
Vanger 33:3b2809748a9e 261 m_sock->close(); \
donatien 5:791fc3dcb6c4 262 ERR("Connection error (%d)", ret); \
donatien 11:390362de8c3f 263 return HTTP_CONN; \
donatien 5:791fc3dcb6c4 264 } \
donatien 5:791fc3dcb6c4 265 } while(0)
donatien 5:791fc3dcb6c4 266
donatien 5:791fc3dcb6c4 267 #define PRTCL_ERR() \
donatien 5:791fc3dcb6c4 268 do{ \
wolfSSL 17:c73d8e61d391 269 cyassl_free() ;\
Vanger 33:3b2809748a9e 270 m_sock->close(); \
donatien 5:791fc3dcb6c4 271 ERR("Protocol error"); \
donatien 11:390362de8c3f 272 return HTTP_PRTCL; \
donatien 5:791fc3dcb6c4 273 } while(0)
donatien 0:2ccb9960a044 274
wolfSSL 17:c73d8e61d391 275 void HTTPClient::cyassl_free(void)
wolfSSL 17:c73d8e61d391 276 {
wolfSSL 19:1e2f05809eb1 277 if(ssl) {
wolfSSL 17:c73d8e61d391 278 CyaSSL_free(ssl) ;
wolfSSL 19:1e2f05809eb1 279 ssl = NULL ;
wolfSSL 19:1e2f05809eb1 280 }
wolfSSL 19:1e2f05809eb1 281 if(ctx) {
wolfSSL 17:c73d8e61d391 282 CyaSSL_CTX_free(ctx) ;
wolfSSL 19:1e2f05809eb1 283 ctx = NULL ;
wolfSSL 19:1e2f05809eb1 284 }
wolfSSL 22:4b9a4151cc73 285 CyaSSL_Cleanup() ;
wolfSSL 22:4b9a4151cc73 286 }
wolfSSL 17:c73d8e61d391 287
donatien 12:89d09a6db00a 288 HTTPResult HTTPClient::connect(const char* url, HTTP_METH method, IHTTPDataOut* pDataOut, IHTTPDataIn* pDataIn, int timeout) //Execute request
wolfSSL 18:d89df40b4cf3 289 {
Vanger 33:3b2809748a9e 290 CYASSL_METHOD * SSLmethod = 0;
wolfSSL 18:d89df40b4cf3 291 m_httpResponseCode = 0; //Invalidate code
wolfSSL 18:d89df40b4cf3 292 m_timeout = timeout;
wolfSSL 27:5d4739eae63e 293 redirect = 0 ;
wolfSSL 27:5d4739eae63e 294
wolfSSL 18:d89df40b4cf3 295 pDataIn->writeReset();
wolfSSL 18:d89df40b4cf3 296 if( pDataOut ) {
wolfSSL 18:d89df40b4cf3 297 pDataOut->readReset();
wolfSSL 18:d89df40b4cf3 298 }
wolfSSL 17:c73d8e61d391 299
wolfSSL 18:d89df40b4cf3 300 char scheme[8];
ansond 29:2d96cc752d19 301 char host[MAX_URL_HOSTNAME_LENGTH];
ansond 29:2d96cc752d19 302 char path[MAX_URL_PATH_LENGTH];
wolfSSL 18:d89df40b4cf3 303
wolfSSL 18:d89df40b4cf3 304 int ret ;
donatien 0:2ccb9960a044 305
wolfSSL 18:d89df40b4cf3 306 //First we need to parse the url (http[s]://host[:port][/[path]])
wolfSSL 18:d89df40b4cf3 307 HTTPResult res = parseURL(url, scheme, sizeof(scheme), host, sizeof(host), &port, path, sizeof(path));
wolfSSL 18:d89df40b4cf3 308 if(res != HTTP_OK) {
wolfSSL 18:d89df40b4cf3 309 ERR("parseURL returned %d", res);
wolfSSL 18:d89df40b4cf3 310 return res;
wolfSSL 18:d89df40b4cf3 311 }
donatien 0:2ccb9960a044 312
wolfSSL 22:4b9a4151cc73 313 if(port == 0) {
wolfSSL 18:d89df40b4cf3 314 if(strcmp(scheme, "http") == 0)
wolfSSL 18:d89df40b4cf3 315 port = HTTP_PORT ;
wolfSSL 18:d89df40b4cf3 316 else if(strcmp(scheme, "https") == 0)
wolfSSL 18:d89df40b4cf3 317 port = HTTPS_PORT ;
wolfSSL 18:d89df40b4cf3 318 }
donatien 0:2ccb9960a044 319
wolfSSL 18:d89df40b4cf3 320 DBG("Scheme: %s", scheme);
wolfSSL 18:d89df40b4cf3 321 DBG("Host: %s", host);
wolfSSL 18:d89df40b4cf3 322 DBG("Port: %d", port);
wolfSSL 18:d89df40b4cf3 323 DBG("Path: %s", path);
wolfSSL 17:c73d8e61d391 324
wolfSSL 18:d89df40b4cf3 325 //Connect
wolfSSL 18:d89df40b4cf3 326 DBG("Connecting socket to server");
wolfSSL 18:d89df40b4cf3 327
wolfSSL 18:d89df40b4cf3 328 #define MAX_RETRY 5
wolfSSL 18:d89df40b4cf3 329 int retry ;
donatien 0:2ccb9960a044 330
wolfSSL 18:d89df40b4cf3 331 for(retry=0; retry<MAX_RETRY; retry++) {
Vanger 33:3b2809748a9e 332 int ret = m_sock->connect(host, port);
wolfSSL 18:d89df40b4cf3 333 if(ret == 0)break ;
Vanger 34:13920d48893d 334 if(m_sock->is_connected()) {
Vanger 34:13920d48893d 335 m_sock->close(true);
Vanger 34:13920d48893d 336 }
wolfSSL 17:c73d8e61d391 337 }
wolfSSL 18:d89df40b4cf3 338 if(retry == MAX_RETRY) {
Vanger 33:3b2809748a9e 339 m_sock->close();
wolfSSL 18:d89df40b4cf3 340 ERR("Could not connect");
wolfSSL 18:d89df40b4cf3 341 return HTTP_CONN;
wolfSSL 17:c73d8e61d391 342 }
wolfSSL 17:c73d8e61d391 343
wolfSSL 18:d89df40b4cf3 344 if(port == HTTPS_PORT) {
wolfSSL 22:4b9a4151cc73 345
wolfSSL 18:d89df40b4cf3 346 /* Start SSL connect */
wolfSSL 27:5d4739eae63e 347 DBG("SSLver=%d", SSLver) ;
wolfSSL 19:1e2f05809eb1 348 if(ctx == NULL) {
wolfSSL 22:4b9a4151cc73 349 switch(SSLver) {
wolfSSL 22:4b9a4151cc73 350 case 0 : SSLmethod = CyaSSLv3_client_method() ; break ;
wolfSSL 22:4b9a4151cc73 351 case 1 : SSLmethod = CyaTLSv1_client_method() ; break ;
wolfSSL 22:4b9a4151cc73 352 case 2 : SSLmethod = CyaTLSv1_1_client_method() ; break ;
Vanger 38:a4ccad70be9d 353 case 3 : SSLmethod = CyaTLSv1_2_client_method() ; break ;
wolfSSL 22:4b9a4151cc73 354 }
wolfSSL 22:4b9a4151cc73 355 ctx = CyaSSL_CTX_new((CYASSL_METHOD *)SSLmethod);
wolfSSL 19:1e2f05809eb1 356 if (ctx == NULL) {
wolfSSL 19:1e2f05809eb1 357 ERR("unable to get ctx");
wolfSSL 19:1e2f05809eb1 358 return HTTP_CONN;
wolfSSL 19:1e2f05809eb1 359 }
Vanger 38:a4ccad70be9d 360
Vanger 38:a4ccad70be9d 361 if(certificates == NULL && peerMethod != VERIFY_NONE) {
Vanger 38:a4ccad70be9d 362 ERR("No certificates passed for peer verification");
Vanger 38:a4ccad70be9d 363 return HTTP_PROCESSING;
Vanger 38:a4ccad70be9d 364 }
Vanger 38:a4ccad70be9d 365
Vanger 39:d7c5541a9124 366 //SSL setup if being used
Vanger 38:a4ccad70be9d 367 { //Localize pMethod array for less overall memory time-use
Vanger 38:a4ccad70be9d 368 std::string pMethod;
Vanger 38:a4ccad70be9d 369 if(peerMethod == VERIFY_NONE) {
Vanger 38:a4ccad70be9d 370 pMethod = "not verify peer";
Vanger 38:a4ccad70be9d 371 } else if (peerMethod == VERIFY_PEER) {
Vanger 38:a4ccad70be9d 372 pMethod = "verify peer if certificates available";
Vanger 39:d7c5541a9124 373 //Load the CA certificate(s) (If using multiple, concatenate them in the buffer being passed)
Vanger 39:d7c5541a9124 374 if(certificates != NULL) {
Vanger 39:d7c5541a9124 375 if (SSL_SUCCESS != CyaSSL_CTX_load_verify_buffer(ctx, (const unsigned char*)certificates, strlen(certificates), SSL_FILETYPE_PEM)) {
Vanger 39:d7c5541a9124 376 ERR("unable to load root certificates");
Vanger 39:d7c5541a9124 377 return HTTP_CONN;
Vanger 39:d7c5541a9124 378 }
Vanger 39:d7c5541a9124 379 }
Vanger 38:a4ccad70be9d 380 }
Vanger 38:a4ccad70be9d 381 DBG("SSL connection set to %s", pMethod.c_str());
Vanger 38:a4ccad70be9d 382 }
Vanger 38:a4ccad70be9d 383
Vanger 38:a4ccad70be9d 384 CyaSSL_CTX_set_verify(ctx, peerMethod, 0); //SSL_VERIFY_FAIL_IF_NO_PEER_CERT, VERIFY_NONE, SSL_VERIFY_PEER
Vanger 38:a4ccad70be9d 385
wolfSSL 19:1e2f05809eb1 386 CyaSSL_SetIORecv(ctx, SocketReceive) ;
wolfSSL 19:1e2f05809eb1 387 CyaSSL_SetIOSend(ctx, SocketSend) ;
wolfSSL 18:d89df40b4cf3 388 }
wolfSSL 18:d89df40b4cf3 389 if (ssl == NULL) {
wolfSSL 19:1e2f05809eb1 390 ssl = CyaSSL_new(ctx);
wolfSSL 19:1e2f05809eb1 391 if (ssl == NULL) {
wolfSSL 19:1e2f05809eb1 392 ERR("unable to get SSL object");
wolfSSL 19:1e2f05809eb1 393 cyassl_free() ;
wolfSSL 19:1e2f05809eb1 394 return HTTP_CONN;
wolfSSL 19:1e2f05809eb1 395 }
wolfSSL 18:d89df40b4cf3 396 }
donatien 0:2ccb9960a044 397
Vanger 34:13920d48893d 398 DBG("ctx=%x, ssl=%x, ssl->ctx->CBIORecv, CBIOSend=%x, %x\r\n",
wolfSSL 18:d89df40b4cf3 399 ctx, ssl, SocketReceive, SocketSend ) ;
Vanger 38:a4ccad70be9d 400 int ret = CyaSSL_connect(ssl);
Vanger 38:a4ccad70be9d 401 if (ret != SSL_SUCCESS) {
wolfSSL 18:d89df40b4cf3 402 ERR("SSL_connect failed");
Vanger 38:a4ccad70be9d 403 int err = CyaSSL_get_error(ssl, ret);
Vanger 38:a4ccad70be9d 404 char data[32];
Vanger 38:a4ccad70be9d 405 char data_new[32];
Vanger 38:a4ccad70be9d 406 strcpy(data_new, CyaSSL_ERR_error_string(err, data));
Vanger 38:a4ccad70be9d 407 if(!strcmp(data,data_new)) {
Vanger 38:a4ccad70be9d 408 printf("Error code [%d] is [%s]\r\n", err, data);
Vanger 38:a4ccad70be9d 409 } else {
Vanger 38:a4ccad70be9d 410 printf("Failed to get error code [%d], Reason: [%s]\r\n", err, data_new);
Vanger 38:a4ccad70be9d 411 }
wolfSSL 18:d89df40b4cf3 412 cyassl_free() ;
wolfSSL 18:d89df40b4cf3 413 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 414 }
wolfSSL 18:d89df40b4cf3 415 } /* SSL connect complete */
donatien 0:2ccb9960a044 416
wolfSSL 18:d89df40b4cf3 417 //Send request
wolfSSL 18:d89df40b4cf3 418 DBG("Sending request");
wolfSSL 18:d89df40b4cf3 419 char buf[CHUNK_SIZE];
ansond 30:6fef375c94e6 420 memset(buf,0,CHUNK_SIZE);
wolfSSL 18:d89df40b4cf3 421 send_buf_p = send_buf ; // Reset send buffer ;
wolfSSL 18:d89df40b4cf3 422
wolfSSL 18:d89df40b4cf3 423 const char* meth = (method==HTTP_GET)?"GET":(method==HTTP_POST)?"POST":(method==HTTP_PUT)?"PUT":(method==HTTP_DELETE)?"DELETE":"";
ansond 31:0675a342e45c 424 snprintf(buf, sizeof(buf), "%s %s HTTP/1.1\r\nHost: %s\r\nConnection: keep-alive\r\n", meth, path, host); //Write request
wolfSSL 18:d89df40b4cf3 425 ret = send(buf);
wolfSSL 18:d89df40b4cf3 426 if(ret) {
Vanger 33:3b2809748a9e 427 m_sock->close();
wolfSSL 18:d89df40b4cf3 428 ERR("Could not write request");
wolfSSL 18:d89df40b4cf3 429 return HTTP_CONN;
donatien 0:2ccb9960a044 430 }
wolfSSL 17:c73d8e61d391 431
ksekimoto 50:7fbf8ef951f2 432 wait(0.3) ;
wolfSSL 18:d89df40b4cf3 433 //Send all headers
donatien 0:2ccb9960a044 434
wolfSSL 18:d89df40b4cf3 435 //Send default headers
wolfSSL 18:d89df40b4cf3 436 DBG("Sending headers");
ansond 31:0675a342e45c 437 if(m_basicAuthUser && m_basicAuthPassword) {
ansond 31:0675a342e45c 438 bAuth() ; /* send out Basic Auth header */
wolfSSL 27:5d4739eae63e 439 }
wolfSSL 18:d89df40b4cf3 440 if( pDataOut != NULL ) {
wolfSSL 18:d89df40b4cf3 441 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 442 ret = send("Transfer-Encoding: chunked\r\n");
wolfSSL 18:d89df40b4cf3 443 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 444 } else {
wolfSSL 18:d89df40b4cf3 445 snprintf(buf, sizeof(buf), "Content-Length: %d\r\n", pDataOut->getDataLen());
wolfSSL 22:4b9a4151cc73 446 DBG("Content buf:%s", buf) ;
wolfSSL 18:d89df40b4cf3 447 ret = send(buf);
wolfSSL 18:d89df40b4cf3 448 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 449 }
wolfSSL 18:d89df40b4cf3 450 char type[48];
wolfSSL 18:d89df40b4cf3 451 if( pDataOut->getDataType(type, 48) == HTTP_OK ) {
wolfSSL 18:d89df40b4cf3 452 snprintf(buf, sizeof(buf), "Content-Type: %s\r\n", type);
wolfSSL 18:d89df40b4cf3 453 ret = send(buf);
wolfSSL 18:d89df40b4cf3 454 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 455 }
wolfSSL 18:d89df40b4cf3 456 }
wolfSSL 18:d89df40b4cf3 457
wolfSSL 18:d89df40b4cf3 458 //Add user headers
wolfSSL 18:d89df40b4cf3 459 if(header) {
wolfSSL 27:5d4739eae63e 460 ret = send((char *)header);
donatien 5:791fc3dcb6c4 461 CHECK_CONN_ERR(ret);
donatien 0:2ccb9960a044 462 }
donatien 0:2ccb9960a044 463
wolfSSL 18:d89df40b4cf3 464 //Close headers
wolfSSL 18:d89df40b4cf3 465 DBG("Headers sent");
wolfSSL 18:d89df40b4cf3 466 ret = send("\r\n");
wolfSSL 18:d89df40b4cf3 467 CHECK_CONN_ERR(ret);
wolfSSL 17:c73d8e61d391 468
wolfSSL 18:d89df40b4cf3 469 size_t trfLen;
donatien 0:2ccb9960a044 470
wolfSSL 18:d89df40b4cf3 471 //Send data (if available)
wolfSSL 18:d89df40b4cf3 472 if( pDataOut != NULL ) {
wolfSSL 18:d89df40b4cf3 473 DBG("Sending data");
wolfSSL 18:d89df40b4cf3 474 while(true) {
wolfSSL 18:d89df40b4cf3 475 size_t writtenLen = 0;
wolfSSL 18:d89df40b4cf3 476 pDataOut->read(buf, CHUNK_SIZE, &trfLen);
wolfSSL 18:d89df40b4cf3 477 buf[trfLen] = 0x0 ;
wolfSSL 18:d89df40b4cf3 478 DBG("buf:%s", buf) ;
wolfSSL 18:d89df40b4cf3 479 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 480 //Write chunk header
wolfSSL 22:4b9a4151cc73 481 char chunkHeader[64];
wolfSSL 18:d89df40b4cf3 482 snprintf(chunkHeader, sizeof(chunkHeader), "%X\r\n", trfLen); //In hex encoding
wolfSSL 18:d89df40b4cf3 483 ret = send(chunkHeader);
wolfSSL 18:d89df40b4cf3 484 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 485 } else if( trfLen == 0 ) {
wolfSSL 22:4b9a4151cc73 486 DBG("trfLen==0") ;
wolfSSL 18:d89df40b4cf3 487 break;
wolfSSL 18:d89df40b4cf3 488 }
wolfSSL 22:4b9a4151cc73 489 DBG("trfLen 1=%d", trfLen) ;
wolfSSL 18:d89df40b4cf3 490 if( trfLen != 0 ) {
wolfSSL 22:4b9a4151cc73 491 DBG("Sending 1") ;
wolfSSL 18:d89df40b4cf3 492 ret = send(buf, trfLen);
wolfSSL 22:4b9a4151cc73 493 DBG("Sent 1") ;
wolfSSL 18:d89df40b4cf3 494 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 495 }
donatien 0:2ccb9960a044 496
wolfSSL 18:d89df40b4cf3 497 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 498 ret = send("\r\n"); //Chunk-terminating CRLF
wolfSSL 18:d89df40b4cf3 499 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 500 } else {
wolfSSL 18:d89df40b4cf3 501 writtenLen += trfLen;
wolfSSL 18:d89df40b4cf3 502 if( writtenLen >= pDataOut->getDataLen() ) {
wolfSSL 22:4b9a4151cc73 503 DBG("writtenLen=%d", writtenLen) ;
wolfSSL 18:d89df40b4cf3 504 break;
wolfSSL 18:d89df40b4cf3 505 }
wolfSSL 22:4b9a4151cc73 506 DBG("writtenLen+=trfLen = %d", writtenLen) ;
wolfSSL 18:d89df40b4cf3 507 }
wolfSSL 22:4b9a4151cc73 508 DBG("trfLen 2=%d", trfLen) ;
wolfSSL 18:d89df40b4cf3 509 if( trfLen == 0 ) {
wolfSSL 22:4b9a4151cc73 510 DBG("trfLen == 0") ;
wolfSSL 18:d89df40b4cf3 511 break;
wolfSSL 18:d89df40b4cf3 512 }
wolfSSL 18:d89df40b4cf3 513 }
donatien 0:2ccb9960a044 514
wolfSSL 18:d89df40b4cf3 515 }
wolfSSL 18:d89df40b4cf3 516 ret = flush() ; // flush the send buffer ;
wolfSSL 18:d89df40b4cf3 517 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 518
wolfSSL 18:d89df40b4cf3 519 //Receive response
wolfSSL 18:d89df40b4cf3 520 DBG("Receiving response");
wolfSSL 18:d89df40b4cf3 521
wolfSSL 18:d89df40b4cf3 522 ret = recv(buf, CHUNK_SIZE - 1, CHUNK_SIZE - 1, &trfLen); //Read n bytes
wolfSSL 18:d89df40b4cf3 523 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 524
wolfSSL 18:d89df40b4cf3 525 buf[trfLen] = '\0';
wolfSSL 18:d89df40b4cf3 526
wolfSSL 18:d89df40b4cf3 527 char* crlfPtr = strstr(buf, "\r\n");
wolfSSL 18:d89df40b4cf3 528 if(crlfPtr == NULL) {
donatien 5:791fc3dcb6c4 529 PRTCL_ERR();
donatien 0:2ccb9960a044 530 }
donatien 0:2ccb9960a044 531
wolfSSL 18:d89df40b4cf3 532 int crlfPos = crlfPtr - buf;
donatien 0:2ccb9960a044 533 buf[crlfPos] = '\0';
donatien 0:2ccb9960a044 534
wolfSSL 18:d89df40b4cf3 535 //Parse HTTP response
wolfSSL 18:d89df40b4cf3 536 if( sscanf(buf, "HTTP/%*d.%*d %d %*[^\r\n]", &m_httpResponseCode) != 1 ) {
wolfSSL 18:d89df40b4cf3 537 //Cannot match string, error
wolfSSL 18:d89df40b4cf3 538 ERR("Not a correct HTTP answer : %s\n", buf);
wolfSSL 18:d89df40b4cf3 539 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 540 }
donatien 4:c071b05ac026 541
wolfSSL 27:5d4739eae63e 542 if( (m_httpResponseCode < 200) || (m_httpResponseCode >= 400) ) {
wolfSSL 18:d89df40b4cf3 543 //Did not return a 2xx code; TODO fetch headers/(&data?) anyway and implement a mean of writing/reading headers
wolfSSL 18:d89df40b4cf3 544 WARN("Response code %d", m_httpResponseCode);
wolfSSL 18:d89df40b4cf3 545 PRTCL_ERR();
donatien 0:2ccb9960a044 546 }
donatien 0:2ccb9960a044 547
wolfSSL 18:d89df40b4cf3 548 DBG("Reading headers");
donatien 0:2ccb9960a044 549
wolfSSL 18:d89df40b4cf3 550 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2) + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 551 trfLen -= (crlfPos + 2);
donatien 0:2ccb9960a044 552
wolfSSL 18:d89df40b4cf3 553 size_t recvContentLength = 0;
wolfSSL 18:d89df40b4cf3 554 bool recvChunked = false;
wolfSSL 18:d89df40b4cf3 555 //Now get headers
wolfSSL 18:d89df40b4cf3 556 while( true ) {
wolfSSL 18:d89df40b4cf3 557 crlfPtr = strstr(buf, "\r\n");
wolfSSL 18:d89df40b4cf3 558 if(crlfPtr == NULL) {
wolfSSL 18:d89df40b4cf3 559 if( trfLen < CHUNK_SIZE - 1 ) {
ansond 30:6fef375c94e6 560 size_t newTrfLen = 0;
wolfSSL 18:d89df40b4cf3 561 ret = recv(buf + trfLen, 1, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 562 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 563 buf[trfLen] = '\0';
wolfSSL 18:d89df40b4cf3 564 DBG("Read %d chars; In buf: [%s]", newTrfLen, buf);
wolfSSL 18:d89df40b4cf3 565 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 566 continue;
wolfSSL 18:d89df40b4cf3 567 } else {
wolfSSL 18:d89df40b4cf3 568 PRTCL_ERR();
donatien 14:2744e0c0e527 569 }
wolfSSL 18:d89df40b4cf3 570 }
wolfSSL 18:d89df40b4cf3 571
wolfSSL 18:d89df40b4cf3 572 crlfPos = crlfPtr - buf;
wolfSSL 18:d89df40b4cf3 573
wolfSSL 18:d89df40b4cf3 574 if(crlfPos == 0) { //End of headers
wolfSSL 18:d89df40b4cf3 575 DBG("Headers read");
wolfSSL 18:d89df40b4cf3 576 memmove(buf, &buf[2], trfLen - 2 + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 577 trfLen -= 2;
wolfSSL 18:d89df40b4cf3 578 break;
donatien 0:2ccb9960a044 579 }
wolfSSL 18:d89df40b4cf3 580
wolfSSL 18:d89df40b4cf3 581 buf[crlfPos] = '\0';
wolfSSL 18:d89df40b4cf3 582
ansond 30:6fef375c94e6 583 char key[41];
ansond 30:6fef375c94e6 584 char value[41];
wolfSSL 18:d89df40b4cf3 585
ansond 30:6fef375c94e6 586 memset(key,0,41);
ansond 30:6fef375c94e6 587 memset(value,0,41);
wolfSSL 18:d89df40b4cf3 588
ansond 30:6fef375c94e6 589 int n = sscanf(buf, "%40[^:]: %40[^\r\n]", key, value);
wolfSSL 18:d89df40b4cf3 590 if ( n == 2 ) {
wolfSSL 18:d89df40b4cf3 591 DBG("Read header : %s: %s\n", key, value);
wolfSSL 18:d89df40b4cf3 592 if( !strcmp(key, "Content-Length") ) {
wolfSSL 18:d89df40b4cf3 593 sscanf(value, "%d", &recvContentLength);
wolfSSL 18:d89df40b4cf3 594 pDataIn->setDataLen(recvContentLength);
wolfSSL 18:d89df40b4cf3 595 } else if( !strcmp(key, "Transfer-Encoding") ) {
wolfSSL 18:d89df40b4cf3 596 if( !strcmp(value, "Chunked") || !strcmp(value, "chunked") ) {
wolfSSL 18:d89df40b4cf3 597 recvChunked = true;
wolfSSL 18:d89df40b4cf3 598 pDataIn->setIsChunked(true);
wolfSSL 18:d89df40b4cf3 599 }
wolfSSL 18:d89df40b4cf3 600 } else if( !strcmp(key, "Content-Type") ) {
wolfSSL 18:d89df40b4cf3 601 pDataIn->setDataType(value);
wolfSSL 27:5d4739eae63e 602 } else if( !strcmp(key, "location") && redirect_url) {
ansond 31:0675a342e45c 603 sscanf(buf, "%40[^:]: %128[^\r\n]", key, redirect_url);
wolfSSL 27:5d4739eae63e 604 DBG("Redirect %s: %s", key, redirect_url) ;
wolfSSL 27:5d4739eae63e 605 redirect = 1 ;
wolfSSL 18:d89df40b4cf3 606 }
wolfSSL 18:d89df40b4cf3 607 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2) + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 608 trfLen -= (crlfPos + 2);
wolfSSL 18:d89df40b4cf3 609
wolfSSL 18:d89df40b4cf3 610 } else {
wolfSSL 18:d89df40b4cf3 611 ERR("Could not parse header");
donatien 14:2744e0c0e527 612 PRTCL_ERR();
donatien 0:2ccb9960a044 613 }
donatien 0:2ccb9960a044 614
donatien 0:2ccb9960a044 615 }
donatien 0:2ccb9960a044 616
wolfSSL 18:d89df40b4cf3 617 //Receive data
wolfSSL 18:d89df40b4cf3 618 DBG("Receiving data");
wolfSSL 18:d89df40b4cf3 619
wolfSSL 18:d89df40b4cf3 620 while(true) {
wolfSSL 18:d89df40b4cf3 621 size_t readLen = 0;
donatien 0:2ccb9960a044 622
wolfSSL 18:d89df40b4cf3 623 if( recvChunked ) {
wolfSSL 18:d89df40b4cf3 624 //Read chunk header
wolfSSL 18:d89df40b4cf3 625 bool foundCrlf;
wolfSSL 18:d89df40b4cf3 626 do {
wolfSSL 18:d89df40b4cf3 627 foundCrlf = false;
wolfSSL 18:d89df40b4cf3 628 crlfPos=0;
wolfSSL 18:d89df40b4cf3 629 buf[trfLen]=0;
wolfSSL 18:d89df40b4cf3 630 if(trfLen >= 2) {
wolfSSL 18:d89df40b4cf3 631 for(; crlfPos < trfLen - 2; crlfPos++) {
wolfSSL 18:d89df40b4cf3 632 if( buf[crlfPos] == '\r' && buf[crlfPos + 1] == '\n' ) {
wolfSSL 18:d89df40b4cf3 633 foundCrlf = true;
wolfSSL 18:d89df40b4cf3 634 break;
wolfSSL 18:d89df40b4cf3 635 }
wolfSSL 18:d89df40b4cf3 636 }
wolfSSL 18:d89df40b4cf3 637 }
wolfSSL 18:d89df40b4cf3 638 if(!foundCrlf) { //Try to read more
wolfSSL 18:d89df40b4cf3 639 if( trfLen < CHUNK_SIZE ) {
ansond 30:6fef375c94e6 640 size_t newTrfLen = 0;
wolfSSL 18:d89df40b4cf3 641 ret = recv(buf + trfLen, 0, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 642 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 643 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 644 continue;
wolfSSL 18:d89df40b4cf3 645 } else {
wolfSSL 18:d89df40b4cf3 646 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 647 }
wolfSSL 18:d89df40b4cf3 648 }
wolfSSL 18:d89df40b4cf3 649 } while(!foundCrlf);
wolfSSL 18:d89df40b4cf3 650 buf[crlfPos] = '\0';
wolfSSL 18:d89df40b4cf3 651 int n = sscanf(buf, "%x", &readLen);
wolfSSL 18:d89df40b4cf3 652 if(n!=1) {
wolfSSL 18:d89df40b4cf3 653 ERR("Could not read chunk length");
wolfSSL 18:d89df40b4cf3 654 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 655 }
wolfSSL 18:d89df40b4cf3 656
wolfSSL 18:d89df40b4cf3 657 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2)); //Not need to move NULL-terminating char any more
wolfSSL 18:d89df40b4cf3 658 trfLen -= (crlfPos + 2);
donatien 0:2ccb9960a044 659
wolfSSL 18:d89df40b4cf3 660 if( readLen == 0 ) {
wolfSSL 18:d89df40b4cf3 661 //Last chunk
wolfSSL 18:d89df40b4cf3 662 break;
wolfSSL 18:d89df40b4cf3 663 }
wolfSSL 18:d89df40b4cf3 664 } else {
wolfSSL 18:d89df40b4cf3 665 readLen = recvContentLength;
wolfSSL 18:d89df40b4cf3 666 }
wolfSSL 18:d89df40b4cf3 667
wolfSSL 18:d89df40b4cf3 668 DBG("Retrieving %d bytes", readLen);
wolfSSL 18:d89df40b4cf3 669
wolfSSL 18:d89df40b4cf3 670 do {
wolfSSL 18:d89df40b4cf3 671 pDataIn->write(buf, MIN(trfLen, readLen));
wolfSSL 18:d89df40b4cf3 672 if( trfLen > readLen ) {
wolfSSL 18:d89df40b4cf3 673 memmove(buf, &buf[readLen], trfLen - readLen);
wolfSSL 18:d89df40b4cf3 674 trfLen -= readLen;
wolfSSL 18:d89df40b4cf3 675 readLen = 0;
wolfSSL 18:d89df40b4cf3 676 } else {
wolfSSL 18:d89df40b4cf3 677 readLen -= trfLen;
wolfSSL 18:d89df40b4cf3 678 }
donatien 0:2ccb9960a044 679
wolfSSL 18:d89df40b4cf3 680 if(readLen) {
wolfSSL 18:d89df40b4cf3 681 ret = recv(buf, 1, CHUNK_SIZE - trfLen - 1, &trfLen);
wolfSSL 18:d89df40b4cf3 682 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 683 }
wolfSSL 18:d89df40b4cf3 684 } while(readLen);
wolfSSL 18:d89df40b4cf3 685
wolfSSL 18:d89df40b4cf3 686 if( recvChunked ) {
wolfSSL 18:d89df40b4cf3 687 if(trfLen < 2) {
ansond 30:6fef375c94e6 688 size_t newTrfLen = 0;
wolfSSL 18:d89df40b4cf3 689 //Read missing chars to find end of chunk
wolfSSL 18:d89df40b4cf3 690 ret = recv(buf + trfLen, 2 - trfLen, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 691 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 692 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 693 }
wolfSSL 18:d89df40b4cf3 694 if( (buf[0] != '\r') || (buf[1] != '\n') ) {
wolfSSL 18:d89df40b4cf3 695 ERR("Format error");
wolfSSL 18:d89df40b4cf3 696 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 697 }
wolfSSL 18:d89df40b4cf3 698 memmove(buf, &buf[2], trfLen - 2);
wolfSSL 18:d89df40b4cf3 699 trfLen -= 2;
wolfSSL 18:d89df40b4cf3 700 } else {
wolfSSL 18:d89df40b4cf3 701 break;
wolfSSL 18:d89df40b4cf3 702 }
wolfSSL 18:d89df40b4cf3 703
donatien 0:2ccb9960a044 704 }
Vanger 39:d7c5541a9124 705
Vanger 39:d7c5541a9124 706 m_sock->close(true);
wolfSSL 20:bec882d85856 707 cyassl_free() ;
wolfSSL 18:d89df40b4cf3 708 DBG("Completed HTTP transaction");
wolfSSL 27:5d4739eae63e 709 if(redirect)return HTTP_REDIRECT ;
wolfSSL 27:5d4739eae63e 710 else return HTTP_OK;
donatien 0:2ccb9960a044 711 }
donatien 0:2ccb9960a044 712
wolfSSL 19:1e2f05809eb1 713 HTTPResult HTTPClient::recv(char* buf, size_t minLen, size_t maxLen, size_t* pReadLen) //0 on success, err code on failure
donatien 0:2ccb9960a044 714 {
wolfSSL 18:d89df40b4cf3 715 DBG("Trying to read between %d and %d bytes", minLen, maxLen);
wolfSSL 18:d89df40b4cf3 716 size_t readLen = 0;
wolfSSL 18:d89df40b4cf3 717
Vanger 33:3b2809748a9e 718 if(!m_sock->is_connected()) {
wolfSSL 18:d89df40b4cf3 719 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 720 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 18:d89df40b4cf3 721 }
wolfSSL 18:d89df40b4cf3 722
wolfSSL 18:d89df40b4cf3 723 int ret;
wolfSSL 18:d89df40b4cf3 724
wolfSSL 18:d89df40b4cf3 725 if(port == HTTPS_PORT) {
wolfSSL 18:d89df40b4cf3 726 DBG("Enter CyaSSL_read") ;
wolfSSL 18:d89df40b4cf3 727
Vanger 33:3b2809748a9e 728 m_sock->set_blocking(false, m_timeout);
wolfSSL 18:d89df40b4cf3 729 readLen = CyaSSL_read(ssl, buf, maxLen);
wolfSSL 18:d89df40b4cf3 730 if (readLen > 0) {
wolfSSL 18:d89df40b4cf3 731 buf[readLen] = 0;
wolfSSL 18:d89df40b4cf3 732 DBG("CyaSSL_read:%s\n", buf);
wolfSSL 18:d89df40b4cf3 733 } else {
wolfSSL 18:d89df40b4cf3 734 ERR("CyaSSL_read, ret = %d", readLen) ;
wolfSSL 18:d89df40b4cf3 735 return HTTP_ERROR ;
wolfSSL 18:d89df40b4cf3 736 }
wolfSSL 18:d89df40b4cf3 737 DBG("Read %d bytes", readLen);
wolfSSL 18:d89df40b4cf3 738 *pReadLen = readLen;
wolfSSL 18:d89df40b4cf3 739 return HTTP_OK;
wolfSSL 18:d89df40b4cf3 740 }
wolfSSL 18:d89df40b4cf3 741
wolfSSL 18:d89df40b4cf3 742 while(readLen < maxLen) {
wolfSSL 18:d89df40b4cf3 743 if(readLen < minLen) {
wolfSSL 18:d89df40b4cf3 744 DBG("Trying to read at most %d bytes [Blocking]", minLen - readLen);
Vanger 33:3b2809748a9e 745 m_sock->set_blocking(false, m_timeout);
Vanger 33:3b2809748a9e 746 ret = m_sock->receive_all(buf + readLen, minLen - readLen);
wolfSSL 18:d89df40b4cf3 747 } else {
wolfSSL 18:d89df40b4cf3 748 DBG("Trying to read at most %d bytes [Not blocking]", maxLen - readLen);
Vanger 33:3b2809748a9e 749 m_sock->set_blocking(false, 0);
Vanger 33:3b2809748a9e 750 ret = m_sock->receive(buf + readLen, maxLen - readLen);
wolfSSL 18:d89df40b4cf3 751 }
wolfSSL 18:d89df40b4cf3 752
wolfSSL 18:d89df40b4cf3 753 if( ret > 0) {
wolfSSL 18:d89df40b4cf3 754 readLen += ret;
wolfSSL 18:d89df40b4cf3 755 } else if( ret == 0 ) {
wolfSSL 18:d89df40b4cf3 756 break;
wolfSSL 18:d89df40b4cf3 757 } else {
Vanger 33:3b2809748a9e 758 if(!m_sock->is_connected()) {
wolfSSL 18:d89df40b4cf3 759 ERR("Connection error (recv returned %d)", ret);
wolfSSL 18:d89df40b4cf3 760 *pReadLen = readLen;
wolfSSL 18:d89df40b4cf3 761 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 762 } else {
wolfSSL 18:d89df40b4cf3 763 break;
wolfSSL 18:d89df40b4cf3 764 }
wolfSSL 18:d89df40b4cf3 765 }
wolfSSL 18:d89df40b4cf3 766
Vanger 33:3b2809748a9e 767 if(!m_sock->is_connected()) {
wolfSSL 18:d89df40b4cf3 768 break;
wolfSSL 18:d89df40b4cf3 769 }
wolfSSL 17:c73d8e61d391 770 }
wolfSSL 17:c73d8e61d391 771 DBG("Read %d bytes", readLen);
wolfSSL 17:c73d8e61d391 772 *pReadLen = readLen;
Vanger 34:13920d48893d 773 m_sock->set_blocking(false, m_timeout);
wolfSSL 17:c73d8e61d391 774 return HTTP_OK;
donatien 7:4e39864f7b15 775 }
donatien 7:4e39864f7b15 776
wolfSSL 19:1e2f05809eb1 777 HTTPResult HTTPClient::send(char* buf, size_t len) //0 on success, err code on failure
donatien 7:4e39864f7b15 778 {
wolfSSL 18:d89df40b4cf3 779 HTTPResult ret ;
wolfSSL 18:d89df40b4cf3 780 int cp_len ;
wolfSSL 18:d89df40b4cf3 781
wolfSSL 18:d89df40b4cf3 782 if(len == 0) {
wolfSSL 18:d89df40b4cf3 783 len = strlen(buf);
wolfSSL 17:c73d8e61d391 784 }
wolfSSL 17:c73d8e61d391 785
wolfSSL 18:d89df40b4cf3 786 do {
wolfSSL 22:4b9a4151cc73 787
wolfSSL 18:d89df40b4cf3 788 if((SEND_BUF_SIZE - (send_buf_p - send_buf)) >= len) {
wolfSSL 18:d89df40b4cf3 789 cp_len = len ;
wolfSSL 18:d89df40b4cf3 790 } else {
wolfSSL 22:4b9a4151cc73 791 cp_len = SEND_BUF_SIZE - (send_buf_p - send_buf) ;
wolfSSL 18:d89df40b4cf3 792 }
wolfSSL 22:4b9a4151cc73 793 DBG("send_buf_p:%x. send_buf+SIZE:%x, len=%d, cp_len=%d", send_buf_p, send_buf+SEND_BUF_SIZE, len, cp_len) ;
wolfSSL 18:d89df40b4cf3 794 memcpy(send_buf_p, buf, cp_len) ;
wolfSSL 18:d89df40b4cf3 795 send_buf_p += cp_len ;
wolfSSL 18:d89df40b4cf3 796 len -= cp_len ;
wolfSSL 18:d89df40b4cf3 797
wolfSSL 18:d89df40b4cf3 798 if(send_buf_p == send_buf + SEND_BUF_SIZE) {
wolfSSL 22:4b9a4151cc73 799 if(port == HTTPS_PORT){
wolfSSL 22:4b9a4151cc73 800 ERR("HTTPClient::send buffer overflow");
wolfSSL 22:4b9a4151cc73 801 return HTTP_ERROR ;
wolfSSL 22:4b9a4151cc73 802 }
wolfSSL 18:d89df40b4cf3 803 ret = flush() ;
wolfSSL 18:d89df40b4cf3 804 if(ret)return(ret) ;
wolfSSL 18:d89df40b4cf3 805 }
wolfSSL 18:d89df40b4cf3 806 } while(len) ;
wolfSSL 18:d89df40b4cf3 807 return HTTP_OK ;
wolfSSL 17:c73d8e61d391 808 }
wolfSSL 17:c73d8e61d391 809
wolfSSL 19:1e2f05809eb1 810 HTTPResult HTTPClient::flush() //0 on success, err code on failure
wolfSSL 17:c73d8e61d391 811 {
wolfSSL 18:d89df40b4cf3 812 int len ;
wolfSSL 18:d89df40b4cf3 813 char * buf ;
wolfSSL 18:d89df40b4cf3 814
wolfSSL 18:d89df40b4cf3 815 buf = send_buf ;
wolfSSL 18:d89df40b4cf3 816 len = send_buf_p - send_buf ;
wolfSSL 18:d89df40b4cf3 817 send_buf_p = send_buf ; // reset send buffer
wolfSSL 18:d89df40b4cf3 818
wolfSSL 18:d89df40b4cf3 819 DBG("Trying to write %d bytes:%s\n", len, buf);
wolfSSL 18:d89df40b4cf3 820 size_t writtenLen = 0;
wolfSSL 18:d89df40b4cf3 821
Vanger 33:3b2809748a9e 822 if(!m_sock->is_connected()) {
wolfSSL 18:d89df40b4cf3 823 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 824 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 17:c73d8e61d391 825 }
wolfSSL 18:d89df40b4cf3 826
wolfSSL 18:d89df40b4cf3 827 if(port == HTTPS_PORT) {
wolfSSL 18:d89df40b4cf3 828 DBG("Enter CyaSSL_write") ;
wolfSSL 18:d89df40b4cf3 829 if (CyaSSL_write(ssl, buf, len) != len) {
wolfSSL 18:d89df40b4cf3 830 ERR("SSL_write failed");
wolfSSL 18:d89df40b4cf3 831 return HTTP_ERROR ;
wolfSSL 18:d89df40b4cf3 832 }
wolfSSL 18:d89df40b4cf3 833 DBG("Written %d bytes", writtenLen);
wolfSSL 18:d89df40b4cf3 834 return HTTP_OK;
wolfSSL 18:d89df40b4cf3 835 }
Vanger 33:3b2809748a9e 836 m_sock->set_blocking(false, m_timeout);
Vanger 33:3b2809748a9e 837 int ret = m_sock->send_all(buf, len);
wolfSSL 18:d89df40b4cf3 838 if(ret > 0) {
wolfSSL 18:d89df40b4cf3 839 writtenLen += ret;
wolfSSL 18:d89df40b4cf3 840 } else if( ret == 0 ) {
wolfSSL 18:d89df40b4cf3 841 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 842 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 18:d89df40b4cf3 843 } else {
wolfSSL 18:d89df40b4cf3 844 ERR("Connection error (send returned %d)", ret);
wolfSSL 18:d89df40b4cf3 845 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 846 }
wolfSSL 18:d89df40b4cf3 847
wolfSSL 17:c73d8e61d391 848 DBG("Written %d bytes", writtenLen);
wolfSSL 17:c73d8e61d391 849 return HTTP_OK;
donatien 0:2ccb9960a044 850 }
donatien 0:2ccb9960a044 851
wolfSSL 19:1e2f05809eb1 852 HTTPResult HTTPClient::parseURL(const char* url, char* scheme, size_t maxSchemeLen, char* host, size_t maxHostLen, uint16_t* port, char* path, size_t maxPathLen) //Parse URL
donatien 0:2ccb9960a044 853 {
wolfSSL 18:d89df40b4cf3 854 char* schemePtr = (char*) url;
wolfSSL 18:d89df40b4cf3 855 char* hostPtr = (char*) strstr(url, "://");
wolfSSL 18:d89df40b4cf3 856 if(hostPtr == NULL) {
wolfSSL 18:d89df40b4cf3 857 WARN("Could not find host");
wolfSSL 18:d89df40b4cf3 858 return HTTP_PARSE; //URL is invalid
wolfSSL 18:d89df40b4cf3 859 }
wolfSSL 18:d89df40b4cf3 860
wolfSSL 18:d89df40b4cf3 861 if( maxSchemeLen < hostPtr - schemePtr + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 862 WARN("Scheme str is too small (%d >= %d)", maxSchemeLen, hostPtr - schemePtr + 1);
wolfSSL 18:d89df40b4cf3 863 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 864 }
wolfSSL 18:d89df40b4cf3 865 memcpy(scheme, schemePtr, hostPtr - schemePtr);
wolfSSL 18:d89df40b4cf3 866 scheme[hostPtr - schemePtr] = '\0';
donatien 0:2ccb9960a044 867
wolfSSL 18:d89df40b4cf3 868 hostPtr+=3;
donatien 0:2ccb9960a044 869
wolfSSL 18:d89df40b4cf3 870 size_t hostLen = 0;
donatien 0:2ccb9960a044 871
wolfSSL 18:d89df40b4cf3 872 char* portPtr = strchr(hostPtr, ':');
wolfSSL 18:d89df40b4cf3 873 if( portPtr != NULL ) {
wolfSSL 18:d89df40b4cf3 874 hostLen = portPtr - hostPtr;
wolfSSL 18:d89df40b4cf3 875 portPtr++;
wolfSSL 18:d89df40b4cf3 876 if( sscanf(portPtr, "%hu", port) != 1) {
wolfSSL 18:d89df40b4cf3 877 WARN("Could not find port");
wolfSSL 18:d89df40b4cf3 878 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 879 }
wolfSSL 18:d89df40b4cf3 880 } else {
wolfSSL 18:d89df40b4cf3 881 *port=0;
donatien 0:2ccb9960a044 882 }
wolfSSL 18:d89df40b4cf3 883 char* pathPtr = strchr(hostPtr, '/');
Vanger 38:a4ccad70be9d 884
wolfSSL 18:d89df40b4cf3 885 if( hostLen == 0 ) {
wolfSSL 18:d89df40b4cf3 886 hostLen = pathPtr - hostPtr;
wolfSSL 18:d89df40b4cf3 887 }
donatien 0:2ccb9960a044 888
wolfSSL 18:d89df40b4cf3 889 if( maxHostLen < hostLen + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 890 WARN("Host str is too small (%d >= %d)", maxHostLen, hostLen + 1);
wolfSSL 18:d89df40b4cf3 891 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 892 }
donatien 0:2ccb9960a044 893
wolfSSL 18:d89df40b4cf3 894 size_t pathLen;
wolfSSL 18:d89df40b4cf3 895 char* fragmentPtr = strchr(hostPtr, '#');
wolfSSL 18:d89df40b4cf3 896 if(fragmentPtr != NULL) {
wolfSSL 18:d89df40b4cf3 897 pathLen = fragmentPtr - pathPtr;
wolfSSL 18:d89df40b4cf3 898 } else {
wolfSSL 18:d89df40b4cf3 899 pathLen = strlen(pathPtr);
wolfSSL 18:d89df40b4cf3 900 }
donatien 0:2ccb9960a044 901
wolfSSL 18:d89df40b4cf3 902 if( maxPathLen < pathLen + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 903 WARN("Path str is too small (%d >= %d)", maxPathLen, pathLen + 1);
wolfSSL 18:d89df40b4cf3 904 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 905 }
Vanger 42:2f464f96c204 906 memcpy(host, hostPtr, hostLen);
Vanger 42:2f464f96c204 907 host[hostLen] = '\0';
wolfSSL 18:d89df40b4cf3 908 memcpy(path, pathPtr, pathLen);
wolfSSL 18:d89df40b4cf3 909 path[pathLen] = '\0';
donatien 0:2ccb9960a044 910
wolfSSL 18:d89df40b4cf3 911 return HTTP_OK;
donatien 0:2ccb9960a044 912 }
wolfSSL 22:4b9a4151cc73 913
wolfSSL 22:4b9a4151cc73 914 HTTPResult HTTPClient::bAuth(void)
wolfSSL 22:4b9a4151cc73 915 {
wolfSSL 22:4b9a4151cc73 916 HTTPResult ret ;
wolfSSL 22:4b9a4151cc73 917 char b_auth[(int)((AUTHB_SIZE+3)*4/3+1)] ;
wolfSSL 22:4b9a4151cc73 918 char base64buff[AUTHB_SIZE+3] ;
Vanger 34:13920d48893d 919
wolfSSL 22:4b9a4151cc73 920 ret = send("Authorization: Basic ") ;
wolfSSL 22:4b9a4151cc73 921 CHECK_CONN_ERR(ret);
wolfSSL 22:4b9a4151cc73 922 sprintf(base64buff, "%s:%s", m_basicAuthUser, m_basicAuthPassword) ;
wolfSSL 27:5d4739eae63e 923 DBG("bAuth: %s", base64buff) ;
wolfSSL 22:4b9a4151cc73 924 base64enc(b_auth, base64buff) ;
Vanger 37:293e8eae4230 925
Vanger 34:13920d48893d 926 int b_auth_len = strlen(b_auth);
Vanger 34:13920d48893d 927 if(b_auth_len + 3 >= sizeof(b_auth)) { //\r\n\0 characters make up the +3
Vanger 34:13920d48893d 928 ERR("The encoded line is larger than the buffer that holds it");
Vanger 34:13920d48893d 929 }
Vanger 34:13920d48893d 930 b_auth[b_auth_len + 2] = '\0' ;
Vanger 34:13920d48893d 931 b_auth[b_auth_len + 1] = '\n' ;
Vanger 34:13920d48893d 932 b_auth[b_auth_len] = '\r' ;
wolfSSL 22:4b9a4151cc73 933 DBG("b_auth:%s", b_auth) ;
wolfSSL 22:4b9a4151cc73 934 ret = send(b_auth) ;
wolfSSL 22:4b9a4151cc73 935 CHECK_CONN_ERR(ret);
wolfSSL 22:4b9a4151cc73 936 return HTTP_OK ;
wolfSSL 22:4b9a4151cc73 937 }