A Threaded Secure MQTT Client example. Uses MBED TLS for SSL/TLS connection. QoS0 only for now. Example has been tested with K64F connected via Ethernet.

Dependencies:   FP MQTTPacket

Fork of HelloMQTT by MQTT

Committer:
vpcola
Date:
Mon Mar 27 13:45:26 2017 +0000
Revision:
26:4b21de8043a5
Parent:
25:326f00faa092
Child:
27:c90092f35d79
TLS now working

Who changed what in which revision?

UserRevisionLine numberNew contents of line
vpcola 23:06fac173529e 1 #include "mbed.h"
vpcola 23:06fac173529e 2 #include "rtos.h"
vpcola 23:06fac173529e 3 #include "MQTTThreadedClient.h"
vpcola 25:326f00faa092 4 #include "mbedtls/platform.h"
vpcola 25:326f00faa092 5 #include "mbedtls/ssl.h"
vpcola 25:326f00faa092 6 #include "mbedtls/entropy.h"
vpcola 25:326f00faa092 7 #include "mbedtls/ctr_drbg.h"
vpcola 25:326f00faa092 8 #include "mbedtls/error.h"
vpcola 23:06fac173529e 9
vpcola 23:06fac173529e 10 static MemoryPool<PubMessage, 16> mpool;
vpcola 23:06fac173529e 11 static Queue<PubMessage, 16> mqueue;
vpcola 23:06fac173529e 12
vpcola 25:326f00faa092 13 // SSL/TLS variables
vpcola 25:326f00faa092 14 mbedtls_entropy_context _entropy;
vpcola 25:326f00faa092 15 mbedtls_ctr_drbg_context _ctr_drbg;
vpcola 25:326f00faa092 16 mbedtls_x509_crt _cacert;
vpcola 25:326f00faa092 17 mbedtls_ssl_context _ssl;
vpcola 25:326f00faa092 18 mbedtls_ssl_config _ssl_conf;
vpcola 25:326f00faa092 19 mbedtls_ssl_session saved_session;
vpcola 25:326f00faa092 20
vpcola 25:326f00faa092 21 /**
vpcola 25:326f00faa092 22 * Receive callback for mbed TLS
vpcola 25:326f00faa092 23 */
vpcola 25:326f00faa092 24 static int ssl_recv(void *ctx, unsigned char *buf, size_t len)
vpcola 25:326f00faa092 25 {
vpcola 25:326f00faa092 26 int recv = -1;
vpcola 25:326f00faa092 27 TCPSocket *socket = static_cast<TCPSocket *>(ctx);
vpcola 25:326f00faa092 28 socket->set_timeout(DEFAULT_SOCKET_TIMEOUT);
vpcola 25:326f00faa092 29 recv = socket->recv(buf, len);
vpcola 25:326f00faa092 30
vpcola 25:326f00faa092 31 if (NSAPI_ERROR_WOULD_BLOCK == recv) {
vpcola 25:326f00faa092 32 return MBEDTLS_ERR_SSL_WANT_READ;
vpcola 25:326f00faa092 33 } else if (recv < 0) {
vpcola 25:326f00faa092 34 return -1;
vpcola 25:326f00faa092 35 } else {
vpcola 25:326f00faa092 36 return recv;
vpcola 25:326f00faa092 37 }
vpcola 25:326f00faa092 38 }
vpcola 25:326f00faa092 39
vpcola 25:326f00faa092 40 /**
vpcola 25:326f00faa092 41 * Send callback for mbed TLS
vpcola 25:326f00faa092 42 */
vpcola 25:326f00faa092 43 static int ssl_send(void *ctx, const unsigned char *buf, size_t len)
vpcola 25:326f00faa092 44 {
vpcola 25:326f00faa092 45 int sent = -1;
vpcola 25:326f00faa092 46 TCPSocket *socket = static_cast<TCPSocket *>(ctx);
vpcola 25:326f00faa092 47 socket->set_timeout(DEFAULT_SOCKET_TIMEOUT);
vpcola 25:326f00faa092 48 sent = socket->send(buf, len);
vpcola 25:326f00faa092 49
vpcola 25:326f00faa092 50 if(NSAPI_ERROR_WOULD_BLOCK == sent) {
vpcola 25:326f00faa092 51 return MBEDTLS_ERR_SSL_WANT_WRITE;
vpcola 25:326f00faa092 52 } else if (sent < 0) {
vpcola 25:326f00faa092 53 return -1;
vpcola 25:326f00faa092 54 } else {
vpcola 25:326f00faa092 55 return sent;
vpcola 25:326f00faa092 56 }
vpcola 25:326f00faa092 57 }
vpcola 25:326f00faa092 58
vpcola 25:326f00faa092 59 #if DEBUG_LEVEL > 0
vpcola 25:326f00faa092 60 /**
vpcola 25:326f00faa092 61 * Debug callback for mbed TLS
vpcola 25:326f00faa092 62 * Just prints on the USB serial port
vpcola 25:326f00faa092 63 */
vpcola 25:326f00faa092 64 static void my_debug(void *ctx, int level, const char *file, int line,
vpcola 25:326f00faa092 65 const char *str)
vpcola 25:326f00faa092 66 {
vpcola 25:326f00faa092 67 const char *p, *basename;
vpcola 25:326f00faa092 68 (void) ctx;
vpcola 25:326f00faa092 69
vpcola 25:326f00faa092 70 /* Extract basename from file */
vpcola 25:326f00faa092 71 for(p = basename = file; *p != '\0'; p++) {
vpcola 25:326f00faa092 72 if(*p == '/' || *p == '\\') {
vpcola 25:326f00faa092 73 basename = p + 1;
vpcola 25:326f00faa092 74 }
vpcola 25:326f00faa092 75 }
vpcola 25:326f00faa092 76
vpcola 25:326f00faa092 77 if (_debug) {
vpcola 25:326f00faa092 78 mbedtls_printf("%s:%04d: |%d| %s", basename, line, level, str);
vpcola 25:326f00faa092 79 }
vpcola 25:326f00faa092 80 }
vpcola 25:326f00faa092 81
vpcola 25:326f00faa092 82 /**
vpcola 25:326f00faa092 83 * Certificate verification callback for mbed TLS
vpcola 25:326f00faa092 84 * Here we only use it to display information on each cert in the chain
vpcola 25:326f00faa092 85 */
vpcola 25:326f00faa092 86 static int my_verify(void *data, mbedtls_x509_crt *crt, int depth, uint32_t *flags)
vpcola 25:326f00faa092 87 {
vpcola 25:326f00faa092 88 const uint32_t buf_size = 1024;
vpcola 25:326f00faa092 89 char *buf = new char[buf_size];
vpcola 25:326f00faa092 90 (void) data;
vpcola 25:326f00faa092 91
vpcola 26:4b21de8043a5 92 if (_debug) mbedtls_printf("\nVerifying certificate at depth %d:\r\n", depth);
vpcola 25:326f00faa092 93 mbedtls_x509_crt_info(buf, buf_size - 1, " ", crt);
vpcola 25:326f00faa092 94 if (_debug) mbedtls_printf("%s", buf);
vpcola 25:326f00faa092 95
vpcola 25:326f00faa092 96 if (*flags == 0)
vpcola 26:4b21de8043a5 97 if (_debug) mbedtls_printf("No verification issue for this certificate\r\n");
vpcola 25:326f00faa092 98 else {
vpcola 25:326f00faa092 99 mbedtls_x509_crt_verify_info(buf, buf_size, " ! ", *flags);
vpcola 25:326f00faa092 100 if (_debug) mbedtls_printf("%s\n", buf);
vpcola 25:326f00faa092 101 }
vpcola 25:326f00faa092 102
vpcola 25:326f00faa092 103 delete[] buf;
vpcola 25:326f00faa092 104 return 0;
vpcola 25:326f00faa092 105 }
vpcola 25:326f00faa092 106 #endif
vpcola 25:326f00faa092 107
vpcola 25:326f00faa092 108
vpcola 25:326f00faa092 109 void MQTTThreadedClient::setupTLS()
vpcola 25:326f00faa092 110 {
vpcola 26:4b21de8043a5 111 if (useTLS)
vpcola 25:326f00faa092 112 {
vpcola 25:326f00faa092 113 mbedtls_entropy_init(&_entropy);
vpcola 25:326f00faa092 114 mbedtls_ctr_drbg_init(&_ctr_drbg);
vpcola 25:326f00faa092 115 mbedtls_x509_crt_init(&_cacert);
vpcola 25:326f00faa092 116 mbedtls_ssl_init(&_ssl);
vpcola 25:326f00faa092 117 mbedtls_ssl_config_init(&_ssl_conf);
vpcola 25:326f00faa092 118 memset( &saved_session, 0, sizeof( mbedtls_ssl_session ) );
vpcola 25:326f00faa092 119 }
vpcola 25:326f00faa092 120 }
vpcola 25:326f00faa092 121
vpcola 25:326f00faa092 122 void MQTTThreadedClient::freeTLS()
vpcola 25:326f00faa092 123 {
vpcola 26:4b21de8043a5 124 if (useTLS)
vpcola 25:326f00faa092 125 {
vpcola 25:326f00faa092 126 mbedtls_entropy_free(&_entropy);
vpcola 25:326f00faa092 127 mbedtls_ctr_drbg_free(&_ctr_drbg);
vpcola 25:326f00faa092 128 mbedtls_x509_crt_free(&_cacert);
vpcola 25:326f00faa092 129 mbedtls_ssl_free(&_ssl);
vpcola 25:326f00faa092 130 mbedtls_ssl_config_free(&_ssl_conf);
vpcola 25:326f00faa092 131 }
vpcola 25:326f00faa092 132 }
vpcola 25:326f00faa092 133
vpcola 25:326f00faa092 134 int MQTTThreadedClient::initTLS()
vpcola 25:326f00faa092 135 {
vpcola 25:326f00faa092 136 int ret;
vpcola 25:326f00faa092 137
vpcola 25:326f00faa092 138 printf("Initializing TLS ...\r\n");
vpcola 25:326f00faa092 139 printf("mbedtls_ctr_drdbg_seed ...\r\n");
vpcola 25:326f00faa092 140 if ((ret = mbedtls_ctr_drbg_seed(&_ctr_drbg, mbedtls_entropy_func, &_entropy,
vpcola 25:326f00faa092 141 (const unsigned char *) DRBG_PERS,
vpcola 25:326f00faa092 142 sizeof (DRBG_PERS))) != 0) {
vpcola 26:4b21de8043a5 143 mbedtls_printf("mbedtls_crt_drbg_init returned [%x]\r\n", ret);
vpcola 25:326f00faa092 144 _error = ret;
vpcola 25:326f00faa092 145 return -1;
vpcola 25:326f00faa092 146 }
vpcola 25:326f00faa092 147 printf("mbedtls_x509_crt_parse ...\r\n");
vpcola 25:326f00faa092 148 if ((ret = mbedtls_x509_crt_parse(&_cacert, (const unsigned char *) ssl_ca_pem,
vpcola 25:326f00faa092 149 strlen(ssl_ca_pem) + 1)) != 0) {
vpcola 26:4b21de8043a5 150 mbedtls_printf("mbedtls_x509_crt_parse returned [%x]\r\n", ret);
vpcola 25:326f00faa092 151 _error = ret;
vpcola 25:326f00faa092 152 return -1;
vpcola 25:326f00faa092 153 }
vpcola 25:326f00faa092 154
vpcola 25:326f00faa092 155 printf("mbedtls_ssl_config_defaults ...\r\n");
vpcola 25:326f00faa092 156 if ((ret = mbedtls_ssl_config_defaults(&_ssl_conf,
vpcola 25:326f00faa092 157 MBEDTLS_SSL_IS_CLIENT,
vpcola 25:326f00faa092 158 MBEDTLS_SSL_TRANSPORT_STREAM,
vpcola 25:326f00faa092 159 MBEDTLS_SSL_PRESET_DEFAULT)) != 0) {
vpcola 26:4b21de8043a5 160 mbedtls_printf("mbedtls_ssl_config_defaults returned [%x]\r\n", ret);
vpcola 25:326f00faa092 161 _error = ret;
vpcola 25:326f00faa092 162 return -1;
vpcola 25:326f00faa092 163 }
vpcola 25:326f00faa092 164
vpcola 25:326f00faa092 165 printf("mbedtls_ssl_config_ca_chain ...\r\n");
vpcola 25:326f00faa092 166 mbedtls_ssl_conf_ca_chain(&_ssl_conf, &_cacert, NULL);
vpcola 25:326f00faa092 167 printf("mbedtls_ssl_conf_rng ...\r\n");
vpcola 25:326f00faa092 168 mbedtls_ssl_conf_rng(&_ssl_conf, mbedtls_ctr_drbg_random, &_ctr_drbg);
vpcola 25:326f00faa092 169
vpcola 25:326f00faa092 170 /* It is possible to disable authentication by passing
vpcola 25:326f00faa092 171 * MBEDTLS_SSL_VERIFY_NONE in the call to mbedtls_ssl_conf_authmode()
vpcola 25:326f00faa092 172 */
vpcola 25:326f00faa092 173 printf("mbedtls_ssl_conf_authmode ...\r\n");
vpcola 25:326f00faa092 174 mbedtls_ssl_conf_authmode(&_ssl_conf, MBEDTLS_SSL_VERIFY_REQUIRED);
vpcola 25:326f00faa092 175
vpcola 25:326f00faa092 176 #if DEBUG_LEVEL > 0
vpcola 25:326f00faa092 177 mbedtls_ssl_conf_verify(&_ssl_conf, my_verify, NULL);
vpcola 25:326f00faa092 178 mbedtls_ssl_conf_dbg(&_ssl_conf, my_debug, NULL);
vpcola 25:326f00faa092 179 mbedtls_debug_set_threshold(DEBUG_LEVEL);
vpcola 25:326f00faa092 180 #endif
vpcola 25:326f00faa092 181
vpcola 25:326f00faa092 182 printf("mbedtls_ssl_setup ...\r\n");
vpcola 25:326f00faa092 183 if ((ret = mbedtls_ssl_setup(&_ssl, &_ssl_conf)) != 0) {
vpcola 26:4b21de8043a5 184 mbedtls_printf("mbedtls_ssl_setup returned [%x]\r\n", ret);
vpcola 25:326f00faa092 185 _error = ret;
vpcola 25:326f00faa092 186 return -1;
vpcola 25:326f00faa092 187 }
vpcola 25:326f00faa092 188
vpcola 25:326f00faa092 189 return 0;
vpcola 25:326f00faa092 190 }
vpcola 25:326f00faa092 191
vpcola 25:326f00faa092 192 int MQTTThreadedClient::doTLSHandshake()
vpcola 25:326f00faa092 193 {
vpcola 25:326f00faa092 194 int ret;
vpcola 25:326f00faa092 195
vpcola 25:326f00faa092 196 /* Start the handshake, the rest will be done in onReceive() */
vpcola 25:326f00faa092 197 printf("Starting the TLS handshake...\r\n");
vpcola 25:326f00faa092 198 ret = mbedtls_ssl_handshake(&_ssl);
vpcola 25:326f00faa092 199 if (ret < 0)
vpcola 25:326f00faa092 200 {
vpcola 25:326f00faa092 201 if (ret != MBEDTLS_ERR_SSL_WANT_READ &&
vpcola 25:326f00faa092 202 ret != MBEDTLS_ERR_SSL_WANT_WRITE)
vpcola 26:4b21de8043a5 203 mbedtls_printf("mbedtls_ssl_handshake returned [%x]\r\n", ret);
vpcola 25:326f00faa092 204 else
vpcola 25:326f00faa092 205 {
vpcola 25:326f00faa092 206 // do not close the socket if timed out
vpcola 26:4b21de8043a5 207 ret = TIMEOUT;
vpcola 25:326f00faa092 208 }
vpcola 26:4b21de8043a5 209 return ret;
vpcola 25:326f00faa092 210 }
vpcola 25:326f00faa092 211
vpcola 25:326f00faa092 212 /* Handshake done, time to print info */
vpcola 25:326f00faa092 213 printf("TLS connection to %s:%d established\r\n",
vpcola 25:326f00faa092 214 host.c_str(), port);
vpcola 25:326f00faa092 215
vpcola 25:326f00faa092 216 const uint32_t buf_size = 1024;
vpcola 25:326f00faa092 217 char *buf = new char[buf_size];
vpcola 25:326f00faa092 218 mbedtls_x509_crt_info(buf, buf_size, "\r ",
vpcola 25:326f00faa092 219 mbedtls_ssl_get_peer_cert(&_ssl));
vpcola 25:326f00faa092 220
vpcola 25:326f00faa092 221 printf("Server certificate:\r\n%s\r", buf);
vpcola 25:326f00faa092 222 // Verify server cert ...
vpcola 25:326f00faa092 223 uint32_t flags = mbedtls_ssl_get_verify_result(&_ssl);
vpcola 25:326f00faa092 224 if( flags != 0 )
vpcola 25:326f00faa092 225 {
vpcola 25:326f00faa092 226 mbedtls_x509_crt_verify_info(buf, buf_size, "\r ! ", flags);
vpcola 25:326f00faa092 227 printf("Certificate verification failed:\r\n%s\r\r\n", buf);
vpcola 25:326f00faa092 228 // free server cert ... before error return
vpcola 25:326f00faa092 229 delete [] buf;
vpcola 25:326f00faa092 230 return -1;
vpcola 25:326f00faa092 231 }
vpcola 25:326f00faa092 232
vpcola 25:326f00faa092 233 printf("Certificate verification passed\r\n\r\n");
vpcola 25:326f00faa092 234 // delete server cert after verification
vpcola 25:326f00faa092 235 delete [] buf;
vpcola 25:326f00faa092 236
vpcola 25:326f00faa092 237 // TODO: Save the session here for reconnect.
vpcola 25:326f00faa092 238 if( ( ret = mbedtls_ssl_get_session( &_ssl, &saved_session ) ) != 0 )
vpcola 25:326f00faa092 239 {
vpcola 26:4b21de8043a5 240 mbedtls_printf( "mbedtls_ssl_get_session returned -0x%x\n\n", -ret );
vpcola 26:4b21de8043a5 241 hasSavedSession = false;
vpcola 25:326f00faa092 242 return -1;
vpcola 25:326f00faa092 243 }
vpcola 25:326f00faa092 244
vpcola 25:326f00faa092 245 printf("Session saved for reconnect ...\r\n");
vpcola 26:4b21de8043a5 246 hasSavedSession = true;
vpcola 26:4b21de8043a5 247
vpcola 25:326f00faa092 248 return 0;
vpcola 25:326f00faa092 249 }
vpcola 25:326f00faa092 250
vpcola 23:06fac173529e 251 int MQTTThreadedClient::readBytesToBuffer(char * buffer, size_t size, int timeout)
vpcola 23:06fac173529e 252 {
vpcola 23:06fac173529e 253 int rc;
vpcola 25:326f00faa092 254
vpcola 23:06fac173529e 255 if (tcpSocket == NULL)
vpcola 23:06fac173529e 256 return -1;
vpcola 25:326f00faa092 257
vpcola 26:4b21de8043a5 258 if (useTLS)
vpcola 25:326f00faa092 259 {
vpcola 25:326f00faa092 260 // Do SSL/TLS read
vpcola 25:326f00faa092 261 rc = mbedtls_ssl_read(&_ssl, (unsigned char *) buffer, size);
vpcola 25:326f00faa092 262 if (MBEDTLS_ERR_SSL_WANT_READ == rc)
vpcola 25:326f00faa092 263 return TIMEOUT;
vpcola 25:326f00faa092 264 else
vpcola 25:326f00faa092 265 return rc;
vpcola 25:326f00faa092 266 } else {
vpcola 25:326f00faa092 267 // non-blocking socket ...
vpcola 25:326f00faa092 268 tcpSocket->set_timeout(timeout);
vpcola 25:326f00faa092 269 rc = tcpSocket->recv( (void *) buffer, size);
vpcola 25:326f00faa092 270
vpcola 25:326f00faa092 271 // return 0 bytes if timeout ...
vpcola 25:326f00faa092 272 if (NSAPI_ERROR_WOULD_BLOCK == rc)
vpcola 25:326f00faa092 273 return TIMEOUT;
vpcola 25:326f00faa092 274 else
vpcola 25:326f00faa092 275 return rc; // return the number of bytes received or error
vpcola 25:326f00faa092 276 }
vpcola 23:06fac173529e 277 }
vpcola 23:06fac173529e 278
vpcola 23:06fac173529e 279 int MQTTThreadedClient::sendBytesFromBuffer(char * buffer, size_t size, int timeout)
vpcola 23:06fac173529e 280 {
vpcola 23:06fac173529e 281 int rc;
vpcola 23:06fac173529e 282
vpcola 23:06fac173529e 283 if (tcpSocket == NULL)
vpcola 23:06fac173529e 284 return -1;
vpcola 23:06fac173529e 285
vpcola 26:4b21de8043a5 286 if (useTLS) {
vpcola 25:326f00faa092 287 // Do SSL/TLS write
vpcola 25:326f00faa092 288 rc = mbedtls_ssl_write(&_ssl, (const unsigned char *) buffer, size);
vpcola 25:326f00faa092 289 if (MBEDTLS_ERR_SSL_WANT_WRITE == rc)
vpcola 25:326f00faa092 290 return TIMEOUT;
vpcola 25:326f00faa092 291 else
vpcola 25:326f00faa092 292 return rc;
vpcola 25:326f00faa092 293 } else {
vpcola 25:326f00faa092 294
vpcola 25:326f00faa092 295 // set the write timeout
vpcola 25:326f00faa092 296 tcpSocket->set_timeout(timeout);
vpcola 25:326f00faa092 297 rc = tcpSocket->send(buffer, size);
vpcola 25:326f00faa092 298
vpcola 25:326f00faa092 299 if ( NSAPI_ERROR_WOULD_BLOCK == rc)
vpcola 25:326f00faa092 300 return TIMEOUT;
vpcola 25:326f00faa092 301 else
vpcola 25:326f00faa092 302 return rc;
vpcola 25:326f00faa092 303 }
vpcola 23:06fac173529e 304 }
vpcola 23:06fac173529e 305
vpcola 23:06fac173529e 306 int MQTTThreadedClient::readPacketLength(int* value)
vpcola 23:06fac173529e 307 {
vpcola 23:06fac173529e 308 int rc = MQTTPACKET_READ_ERROR;
vpcola 23:06fac173529e 309 unsigned char c;
vpcola 23:06fac173529e 310 int multiplier = 1;
vpcola 23:06fac173529e 311 int len = 0;
vpcola 23:06fac173529e 312 const int MAX_NO_OF_REMAINING_LENGTH_BYTES = 4;
vpcola 23:06fac173529e 313
vpcola 23:06fac173529e 314 *value = 0;
vpcola 23:06fac173529e 315 do
vpcola 23:06fac173529e 316 {
vpcola 23:06fac173529e 317 if (++len > MAX_NO_OF_REMAINING_LENGTH_BYTES)
vpcola 23:06fac173529e 318 {
vpcola 23:06fac173529e 319 rc = MQTTPACKET_READ_ERROR; /* bad data */
vpcola 23:06fac173529e 320 goto exit;
vpcola 23:06fac173529e 321 }
vpcola 23:06fac173529e 322
vpcola 23:06fac173529e 323 rc = readBytesToBuffer((char *) &c, 1, DEFAULT_SOCKET_TIMEOUT);
vpcola 23:06fac173529e 324 if (rc != 1)
vpcola 23:06fac173529e 325 {
vpcola 23:06fac173529e 326 rc = MQTTPACKET_READ_ERROR;
vpcola 23:06fac173529e 327 goto exit;
vpcola 23:06fac173529e 328 }
vpcola 23:06fac173529e 329
vpcola 23:06fac173529e 330 *value += (c & 127) * multiplier;
vpcola 23:06fac173529e 331 multiplier *= 128;
vpcola 23:06fac173529e 332 } while ((c & 128) != 0);
vpcola 23:06fac173529e 333
vpcola 23:06fac173529e 334 rc = MQTTPACKET_READ_COMPLETE;
vpcola 23:06fac173529e 335
vpcola 23:06fac173529e 336 exit:
vpcola 23:06fac173529e 337 if (rc == MQTTPACKET_READ_ERROR )
vpcola 23:06fac173529e 338 len = -1;
vpcola 23:06fac173529e 339
vpcola 23:06fac173529e 340 return len;
vpcola 23:06fac173529e 341 }
vpcola 23:06fac173529e 342
vpcola 23:06fac173529e 343 int MQTTThreadedClient::sendPacket(size_t length)
vpcola 23:06fac173529e 344 {
vpcola 23:06fac173529e 345 int rc = FAILURE;
vpcola 23:06fac173529e 346 int sent = 0;
vpcola 23:06fac173529e 347
vpcola 23:06fac173529e 348 while (sent < length)
vpcola 23:06fac173529e 349 {
vpcola 23:06fac173529e 350 rc = sendBytesFromBuffer((char *) &sendbuf[sent], length - sent, DEFAULT_SOCKET_TIMEOUT);
vpcola 23:06fac173529e 351 if (rc < 0) // there was an error writing the data
vpcola 23:06fac173529e 352 break;
vpcola 23:06fac173529e 353 sent += rc;
vpcola 23:06fac173529e 354 }
vpcola 23:06fac173529e 355
vpcola 23:06fac173529e 356 if (sent == length)
vpcola 23:06fac173529e 357 rc = SUCCESS;
vpcola 23:06fac173529e 358 else
vpcola 23:06fac173529e 359 rc = FAILURE;
vpcola 23:06fac173529e 360
vpcola 23:06fac173529e 361 return rc;
vpcola 23:06fac173529e 362 }
vpcola 23:06fac173529e 363 /**
vpcola 23:06fac173529e 364 * Reads the entire packet to readbuf and returns
vpcola 23:06fac173529e 365 * the type of packet when successful, otherwise
vpcola 23:06fac173529e 366 * a negative error code is returned.
vpcola 23:06fac173529e 367 **/
vpcola 23:06fac173529e 368 int MQTTThreadedClient::readPacket()
vpcola 23:06fac173529e 369 {
vpcola 23:06fac173529e 370 int rc = FAILURE;
vpcola 23:06fac173529e 371 MQTTHeader header = {0};
vpcola 23:06fac173529e 372 int len = 0;
vpcola 23:06fac173529e 373 int rem_len = 0;
vpcola 23:06fac173529e 374
vpcola 23:06fac173529e 375 /* 1. read the header byte. This has the packet type in it */
vpcola 23:06fac173529e 376 if ( (rc = readBytesToBuffer((char *) &readbuf[0], 1, DEFAULT_SOCKET_TIMEOUT)) != 1)
vpcola 23:06fac173529e 377 goto exit;
vpcola 23:06fac173529e 378
vpcola 23:06fac173529e 379 len = 1;
vpcola 23:06fac173529e 380 /* 2. read the remaining length. This is variable in itself */
vpcola 23:06fac173529e 381 if ( readPacketLength(&rem_len) < 0 )
vpcola 23:06fac173529e 382 goto exit;
vpcola 23:06fac173529e 383
vpcola 23:06fac173529e 384 len += MQTTPacket_encode(readbuf + 1, rem_len); /* put the original remaining length into the buffer */
vpcola 23:06fac173529e 385
vpcola 23:06fac173529e 386 if (rem_len > (MAX_MQTT_PACKET_SIZE - len))
vpcola 23:06fac173529e 387 {
vpcola 23:06fac173529e 388 rc = BUFFER_OVERFLOW;
vpcola 23:06fac173529e 389 goto exit;
vpcola 23:06fac173529e 390 }
vpcola 23:06fac173529e 391
vpcola 23:06fac173529e 392 /* 3. read the rest of the buffer using a callback to supply the rest of the data */
vpcola 23:06fac173529e 393 if (rem_len > 0 && (readBytesToBuffer((char *) (readbuf + len), rem_len, DEFAULT_SOCKET_TIMEOUT) != rem_len))
vpcola 23:06fac173529e 394 goto exit;
vpcola 23:06fac173529e 395
vpcola 23:06fac173529e 396 // Convert the header to type
vpcola 23:06fac173529e 397 // and update rc
vpcola 23:06fac173529e 398 header.byte = readbuf[0];
vpcola 23:06fac173529e 399 rc = header.bits.type;
vpcola 23:06fac173529e 400
vpcola 23:06fac173529e 401 exit:
vpcola 23:06fac173529e 402
vpcola 23:06fac173529e 403 return rc;
vpcola 23:06fac173529e 404 }
vpcola 23:06fac173529e 405
vpcola 23:06fac173529e 406 /**
vpcola 23:06fac173529e 407 * Read until a specified packet type is received, or untill the specified
vpcola 23:06fac173529e 408 * timeout dropping packets along the way.
vpcola 23:06fac173529e 409 **/
vpcola 23:06fac173529e 410 int MQTTThreadedClient::readUntil(int packetType, int timeout)
vpcola 23:06fac173529e 411 {
vpcola 23:06fac173529e 412 int pType = FAILURE;
vpcola 23:06fac173529e 413 Timer timer;
vpcola 23:06fac173529e 414
vpcola 23:06fac173529e 415 timer.start();
vpcola 23:06fac173529e 416 do {
vpcola 23:06fac173529e 417 pType = readPacket();
vpcola 23:06fac173529e 418 if (pType < 0)
vpcola 23:06fac173529e 419 break;
vpcola 23:06fac173529e 420
vpcola 23:06fac173529e 421 if (timer.read_ms() > timeout)
vpcola 23:06fac173529e 422 {
vpcola 23:06fac173529e 423 pType = FAILURE;
vpcola 23:06fac173529e 424 break;
vpcola 23:06fac173529e 425 }
vpcola 23:06fac173529e 426 }while(pType != packetType);
vpcola 23:06fac173529e 427
vpcola 23:06fac173529e 428 return pType;
vpcola 23:06fac173529e 429 }
vpcola 23:06fac173529e 430
vpcola 23:06fac173529e 431
vpcola 26:4b21de8043a5 432 int MQTTThreadedClient::login()
vpcola 23:06fac173529e 433 {
vpcola 23:06fac173529e 434 int rc = FAILURE;
vpcola 23:06fac173529e 435 int len = 0;
vpcola 23:06fac173529e 436
vpcola 26:4b21de8043a5 437 if (!isConnected)
vpcola 23:06fac173529e 438 {
vpcola 26:4b21de8043a5 439 printf("Session not connected! \r\n");
vpcola 23:06fac173529e 440 return rc;
vpcola 23:06fac173529e 441 }
vpcola 23:06fac173529e 442
vpcola 23:06fac173529e 443 // Copy the keepAliveInterval value to local
vpcola 23:06fac173529e 444 // MQTT specifies in seconds, we have to multiply that
vpcola 23:06fac173529e 445 // amount for our 32 bit timers which accepts ms.
vpcola 26:4b21de8043a5 446 keepAliveInterval = (connect_options.keepAliveInterval * 1000);
vpcola 23:06fac173529e 447
vpcola 26:4b21de8043a5 448 printf("Login with: \r\n");
vpcola 26:4b21de8043a5 449 printf("\tUsername: [%s]\r\n", connect_options.username.cstring);
vpcola 26:4b21de8043a5 450 printf("\tPassword: [%s]\r\n", connect_options.password.cstring);
vpcola 23:06fac173529e 451
vpcola 26:4b21de8043a5 452 if ((len = MQTTSerialize_connect(sendbuf, MAX_MQTT_PACKET_SIZE, &connect_options)) <= 0)
vpcola 23:06fac173529e 453 {
vpcola 23:06fac173529e 454 printf("Error serializing connect packet ...\r\n");
vpcola 23:06fac173529e 455 return rc;
vpcola 23:06fac173529e 456 }
vpcola 23:06fac173529e 457 if ((rc = sendPacket((size_t) len)) != SUCCESS) // send the connect packet
vpcola 23:06fac173529e 458 {
vpcola 23:06fac173529e 459 printf("Error sending the connect request packet ...\r\n");
vpcola 23:06fac173529e 460 return rc;
vpcola 23:06fac173529e 461 }
vpcola 23:06fac173529e 462
vpcola 23:06fac173529e 463 // Wait for the CONNACK
vpcola 23:06fac173529e 464 if (readUntil(CONNACK, COMMAND_TIMEOUT) == CONNACK)
vpcola 23:06fac173529e 465 {
vpcola 23:06fac173529e 466 unsigned char connack_rc = 255;
vpcola 23:06fac173529e 467 bool sessionPresent = false;
vpcola 23:06fac173529e 468 printf("Connection acknowledgement received ... deserializing respones ...\r\n");
vpcola 23:06fac173529e 469 if (MQTTDeserialize_connack((unsigned char*)&sessionPresent, &connack_rc, readbuf, MAX_MQTT_PACKET_SIZE) == 1)
vpcola 23:06fac173529e 470 rc = connack_rc;
vpcola 23:06fac173529e 471 else
vpcola 23:06fac173529e 472 rc = FAILURE;
vpcola 23:06fac173529e 473 }
vpcola 23:06fac173529e 474 else
vpcola 23:06fac173529e 475 rc = FAILURE;
vpcola 23:06fac173529e 476
vpcola 23:06fac173529e 477 if (rc == SUCCESS)
vpcola 23:06fac173529e 478 {
vpcola 23:06fac173529e 479 printf("Connected!!! ... starting connection timers ...\r\n");
vpcola 23:06fac173529e 480 resetConnectionTimer();
vpcola 23:06fac173529e 481 }
vpcola 23:06fac173529e 482
vpcola 23:06fac173529e 483 printf("Returning with rc = %d\r\n", rc);
vpcola 23:06fac173529e 484
vpcola 23:06fac173529e 485 return rc;
vpcola 23:06fac173529e 486 }
vpcola 23:06fac173529e 487
vpcola 25:326f00faa092 488
vpcola 25:326f00faa092 489 void MQTTThreadedClient::disconnect()
vpcola 25:326f00faa092 490 {
vpcola 25:326f00faa092 491 if (isConnected)
vpcola 25:326f00faa092 492 {
vpcola 26:4b21de8043a5 493 if( useTLS
vpcola 26:4b21de8043a5 494 && ( mbedtls_ssl_session_reset( &_ssl ) != 0 )
vpcola 26:4b21de8043a5 495 )
vpcola 26:4b21de8043a5 496 {
vpcola 26:4b21de8043a5 497 printf( "Session reset returned an error \r\n");
vpcola 26:4b21de8043a5 498 }
vpcola 25:326f00faa092 499
vpcola 25:326f00faa092 500 isConnected = false;
vpcola 25:326f00faa092 501 tcpSocket->close();
vpcola 25:326f00faa092 502 }
vpcola 25:326f00faa092 503 }
vpcola 25:326f00faa092 504
vpcola 26:4b21de8043a5 505 int MQTTThreadedClient::connect()
vpcola 23:06fac173529e 506 {
vpcola 25:326f00faa092 507 int ret = FAILURE;
vpcola 26:4b21de8043a5 508
vpcola 26:4b21de8043a5 509 if ((network == NULL) || (tcpSocket == NULL)
vpcola 26:4b21de8043a5 510 || host.empty())
vpcola 26:4b21de8043a5 511 {
vpcola 26:4b21de8043a5 512 printf("Network settings not set! \r\n");
vpcola 26:4b21de8043a5 513 return ret;
vpcola 26:4b21de8043a5 514 }
vpcola 25:326f00faa092 515
vpcola 26:4b21de8043a5 516 if (useTLS)
vpcola 26:4b21de8043a5 517 {
vpcola 26:4b21de8043a5 518 if( ( ret = mbedtls_ssl_session_reset( &_ssl ) ) != 0 ) {
vpcola 26:4b21de8043a5 519 mbedtls_printf( " failed\n ! mbedtls_ssl_session_reset returned -0x%x\n\n", -ret );
vpcola 26:4b21de8043a5 520 return ret;
vpcola 26:4b21de8043a5 521 }
vpcola 26:4b21de8043a5 522
vpcola 26:4b21de8043a5 523 if ( hasSavedSession && (( ret = mbedtls_ssl_set_session( &_ssl, &saved_session ) ) != 0 )) {
vpcola 26:4b21de8043a5 524 mbedtls_printf( " failed\n ! mbedtls_ssl_conf_session returned %d\n\n", ret );
vpcola 26:4b21de8043a5 525 return ret;
vpcola 26:4b21de8043a5 526 }
vpcola 26:4b21de8043a5 527 }
vpcola 26:4b21de8043a5 528
vpcola 23:06fac173529e 529 tcpSocket->open(network);
vpcola 26:4b21de8043a5 530 if (useTLS)
vpcola 25:326f00faa092 531 {
vpcola 25:326f00faa092 532 printf("mbedtls_ssl_set_hostname ...\r\n");
vpcola 25:326f00faa092 533 mbedtls_ssl_set_hostname(&_ssl, host.c_str());
vpcola 25:326f00faa092 534 printf("mbedtls_ssl_set_bio ...\r\n");
vpcola 25:326f00faa092 535 mbedtls_ssl_set_bio(&_ssl, static_cast<void *>(tcpSocket),
vpcola 25:326f00faa092 536 ssl_send, ssl_recv, NULL );
vpcola 25:326f00faa092 537 }
vpcola 25:326f00faa092 538
vpcola 25:326f00faa092 539 if (( ret = tcpSocket->connect(host.c_str(), port)) < 0 )
vpcola 23:06fac173529e 540 {
vpcola 25:326f00faa092 541 printf("Error connecting to %s:%d with %d\r\n", host.c_str(), port, ret);
vpcola 23:06fac173529e 542 return ret;
vpcola 26:4b21de8043a5 543 }else
vpcola 26:4b21de8043a5 544 isConnected = true;
vpcola 25:326f00faa092 545
vpcola 26:4b21de8043a5 546 if (useTLS)
vpcola 25:326f00faa092 547 {
vpcola 26:4b21de8043a5 548
vpcola 26:4b21de8043a5 549 if (doTLSHandshake() < 0)
vpcola 26:4b21de8043a5 550 {
vpcola 26:4b21de8043a5 551 printf("TLS Handshake failed! \r\n");
vpcola 26:4b21de8043a5 552 return FAILURE;
vpcola 26:4b21de8043a5 553 }else
vpcola 26:4b21de8043a5 554 printf("TLS Handshake complete!! \r\n");
vpcola 25:326f00faa092 555 }
vpcola 25:326f00faa092 556
vpcola 26:4b21de8043a5 557 return login();
vpcola 26:4b21de8043a5 558 }
vpcola 26:4b21de8043a5 559
vpcola 26:4b21de8043a5 560 void MQTTThreadedClient::setConnectionParameters(const char * chost, uint16_t cport, MQTTPacket_connectData & options)
vpcola 26:4b21de8043a5 561 {
vpcola 26:4b21de8043a5 562 // Copy the settings for reconnection
vpcola 26:4b21de8043a5 563 host = chost;
vpcola 26:4b21de8043a5 564 port = cport;
vpcola 26:4b21de8043a5 565 connect_options = options;
vpcola 23:06fac173529e 566 }
vpcola 23:06fac173529e 567
vpcola 23:06fac173529e 568 int MQTTThreadedClient::publish(PubMessage& msg)
vpcola 23:06fac173529e 569 {
vpcola 23:06fac173529e 570 #if 0
vpcola 23:06fac173529e 571 int id = queue.call(mbed::callback(this, &MQTTThreadedClient::sendPublish), topic, message);
vpcola 23:06fac173529e 572 // TODO: handle id values when the function is called later
vpcola 23:06fac173529e 573 if (id == 0)
vpcola 23:06fac173529e 574 return FAILURE;
vpcola 23:06fac173529e 575 else
vpcola 23:06fac173529e 576 return SUCCESS;
vpcola 23:06fac173529e 577 #endif
vpcola 23:06fac173529e 578 PubMessage *message = mpool.alloc();
vpcola 23:06fac173529e 579 // Simple copy
vpcola 23:06fac173529e 580 *message = msg;
vpcola 23:06fac173529e 581
vpcola 23:06fac173529e 582 // Push the data to the thread
vpcola 25:326f00faa092 583 printf("[Thread:%d] Pushing data to consumer thread ...\r\n", Thread::gettid());
vpcola 23:06fac173529e 584 mqueue.put(message);
vpcola 23:06fac173529e 585
vpcola 23:06fac173529e 586 return SUCCESS;
vpcola 23:06fac173529e 587 }
vpcola 23:06fac173529e 588
vpcola 23:06fac173529e 589 int MQTTThreadedClient::sendPublish(PubMessage& message)
vpcola 23:06fac173529e 590 {
vpcola 23:06fac173529e 591 MQTTString topicString = MQTTString_initializer;
vpcola 23:06fac173529e 592
vpcola 23:06fac173529e 593 if (!isConnected)
vpcola 23:06fac173529e 594 {
vpcola 25:326f00faa092 595 printf("[Thread:%d] Not connected!!! ...\r\n", Thread::gettid());
vpcola 23:06fac173529e 596 return FAILURE;
vpcola 23:06fac173529e 597 }
vpcola 23:06fac173529e 598
vpcola 23:06fac173529e 599 topicString.cstring = (char*) &message.topic[0];
vpcola 23:06fac173529e 600 int len = MQTTSerialize_publish(sendbuf, MAX_MQTT_PACKET_SIZE, 0, message.qos, false, message.id,
vpcola 23:06fac173529e 601 topicString, (unsigned char*) &message.payload[0], (int) message.payloadlen);
vpcola 23:06fac173529e 602 if (len <= 0)
vpcola 23:06fac173529e 603 {
vpcola 25:326f00faa092 604 printf("[Thread:%d]Failed serializing message ...\r\n", Thread::gettid());
vpcola 23:06fac173529e 605 return FAILURE;
vpcola 23:06fac173529e 606 }
vpcola 23:06fac173529e 607
vpcola 23:06fac173529e 608 if (sendPacket(len) == SUCCESS)
vpcola 23:06fac173529e 609 {
vpcola 25:326f00faa092 610 printf("[Thread:%d]Successfully sent publish packet to server ...\r\n", Thread::gettid());
vpcola 23:06fac173529e 611 return SUCCESS;
vpcola 23:06fac173529e 612 }
vpcola 23:06fac173529e 613
vpcola 25:326f00faa092 614 printf("[Thread:%d]Failed to send publish packet to server ...\r\n", Thread::gettid());
vpcola 23:06fac173529e 615 return FAILURE;
vpcola 23:06fac173529e 616 }
vpcola 25:326f00faa092 617
vpcola 25:326f00faa092 618 void MQTTThreadedClient::addTopicHandler(const char * topicstr, void (*function)(MessageData &))
vpcola 25:326f00faa092 619 {
vpcola 25:326f00faa092 620 // Push the subscription into the map ...
vpcola 25:326f00faa092 621 FP<void,MessageData &> fp;
vpcola 25:326f00faa092 622 fp.attach(function);
vpcola 23:06fac173529e 623
vpcola 26:4b21de8043a5 624 topicCBMap.insert(std::pair<std::string, FP<void,MessageData &> >(std::string(topicstr),fp));
vpcola 25:326f00faa092 625 }
vpcola 25:326f00faa092 626
vpcola 25:326f00faa092 627 int MQTTThreadedClient::processSubscriptions()
vpcola 25:326f00faa092 628 {
vpcola 25:326f00faa092 629 int numsubscribed = 0;
vpcola 25:326f00faa092 630
vpcola 25:326f00faa092 631 if (!isConnected)
vpcola 25:326f00faa092 632 {
vpcola 25:326f00faa092 633 printf("Session not connected!!\r\n");
vpcola 25:326f00faa092 634 return 0;
vpcola 25:326f00faa092 635 }
vpcola 25:326f00faa092 636
vpcola 26:4b21de8043a5 637 printf("Processing subscribed topics ....\r\n");
vpcola 26:4b21de8043a5 638
vpcola 25:326f00faa092 639 std::map<std::string, FP<void, MessageData &> >::iterator it;
vpcola 26:4b21de8043a5 640 for(it = topicCBMap.begin(); it != topicCBMap.end(); it++)
vpcola 25:326f00faa092 641 {
vpcola 25:326f00faa092 642 int rc = FAILURE;
vpcola 25:326f00faa092 643 int len = 0;
vpcola 25:326f00faa092 644 //TODO: We only subscribe to QoS = 0 for now
vpcola 25:326f00faa092 645 QoS qos = QOS0;
vpcola 25:326f00faa092 646
vpcola 25:326f00faa092 647 MQTTString topic = {(char*)it->first.c_str(), {0, 0}};
vpcola 25:326f00faa092 648 printf("Subscribing to topic [%s]\r\n", topic.cstring);
vpcola 25:326f00faa092 649
vpcola 25:326f00faa092 650
vpcola 25:326f00faa092 651 len = MQTTSerialize_subscribe(sendbuf, MAX_MQTT_PACKET_SIZE, 0, packetid.getNext(), 1, &topic, (int*)&qos);
vpcola 25:326f00faa092 652 if (len <= 0) {
vpcola 25:326f00faa092 653 printf("Error serializing subscribe packet ...\r\n");
vpcola 25:326f00faa092 654 continue;
vpcola 25:326f00faa092 655 }
vpcola 25:326f00faa092 656
vpcola 25:326f00faa092 657 if ((rc = sendPacket(len)) != SUCCESS) {
vpcola 25:326f00faa092 658 printf("Error sending subscribe packet [%d]\r\n", rc);
vpcola 25:326f00faa092 659 continue;
vpcola 25:326f00faa092 660 }
vpcola 25:326f00faa092 661
vpcola 25:326f00faa092 662 printf("Waiting for subscription ack ...\r\n");
vpcola 25:326f00faa092 663 // Wait for SUBACK, dropping packets read along the way ...
vpcola 25:326f00faa092 664 if (readUntil(SUBACK, COMMAND_TIMEOUT) == SUBACK) { // wait for suback
vpcola 25:326f00faa092 665 int count = 0, grantedQoS = -1;
vpcola 25:326f00faa092 666 unsigned short mypacketid;
vpcola 25:326f00faa092 667 if (MQTTDeserialize_suback(&mypacketid, 1, &count, &grantedQoS, readbuf, MAX_MQTT_PACKET_SIZE) == 1)
vpcola 25:326f00faa092 668 rc = grantedQoS; // 0, 1, 2 or 0x80
vpcola 25:326f00faa092 669 // For as long as we do not get 0x80 ..
vpcola 25:326f00faa092 670 if (rc != 0x80)
vpcola 25:326f00faa092 671 {
vpcola 25:326f00faa092 672 // Reset connection timers here ...
vpcola 25:326f00faa092 673 resetConnectionTimer();
vpcola 25:326f00faa092 674 printf("Successfully subscribed to %s ...\r\n", it->first.c_str());
vpcola 25:326f00faa092 675 numsubscribed++;
vpcola 25:326f00faa092 676 } else {
vpcola 25:326f00faa092 677 printf("Failed to subscribe to topic %s ... (not authorized?)\r\n", it->first.c_str());
vpcola 25:326f00faa092 678 }
vpcola 25:326f00faa092 679 } else
vpcola 25:326f00faa092 680 printf("Failed to subscribe to topic %s (ack not received) ...\r\n", it->first.c_str());
vpcola 25:326f00faa092 681 } // end for loop
vpcola 25:326f00faa092 682
vpcola 25:326f00faa092 683 return numsubscribed;
vpcola 25:326f00faa092 684 }
vpcola 25:326f00faa092 685
vpcola 23:06fac173529e 686 bool MQTTThreadedClient::isTopicMatched(char* topicFilter, MQTTString& topicName)
vpcola 23:06fac173529e 687 {
vpcola 23:06fac173529e 688 char* curf = topicFilter;
vpcola 23:06fac173529e 689 char* curn = topicName.lenstring.data;
vpcola 23:06fac173529e 690 char* curn_end = curn + topicName.lenstring.len;
vpcola 23:06fac173529e 691
vpcola 23:06fac173529e 692 while (*curf && curn < curn_end)
vpcola 23:06fac173529e 693 {
vpcola 23:06fac173529e 694 if (*curn == '/' && *curf != '/')
vpcola 23:06fac173529e 695 break;
vpcola 23:06fac173529e 696 if (*curf != '+' && *curf != '#' && *curf != *curn)
vpcola 23:06fac173529e 697 break;
vpcola 23:06fac173529e 698 if (*curf == '+')
vpcola 23:06fac173529e 699 { // skip until we meet the next separator, or end of string
vpcola 23:06fac173529e 700 char* nextpos = curn + 1;
vpcola 23:06fac173529e 701 while (nextpos < curn_end && *nextpos != '/')
vpcola 23:06fac173529e 702 nextpos = ++curn + 1;
vpcola 23:06fac173529e 703 }
vpcola 23:06fac173529e 704 else if (*curf == '#')
vpcola 23:06fac173529e 705 curn = curn_end - 1; // skip until end of string
vpcola 23:06fac173529e 706 curf++;
vpcola 23:06fac173529e 707 curn++;
vpcola 23:06fac173529e 708 };
vpcola 23:06fac173529e 709
vpcola 23:06fac173529e 710 return (curn == curn_end) && (*curf == '\0');
vpcola 23:06fac173529e 711 }
vpcola 23:06fac173529e 712
vpcola 23:06fac173529e 713 int MQTTThreadedClient::handlePublishMsg()
vpcola 23:06fac173529e 714 {
vpcola 23:06fac173529e 715 MQTTString topicName = MQTTString_initializer;
vpcola 23:06fac173529e 716 Message msg;
vpcola 23:06fac173529e 717 int intQoS;
vpcola 25:326f00faa092 718 printf("[Thread:%d]Deserializing publish message ...\r\n", Thread::gettid());
vpcola 23:06fac173529e 719 if (MQTTDeserialize_publish((unsigned char*)&msg.dup,
vpcola 23:06fac173529e 720 &intQoS,
vpcola 23:06fac173529e 721 (unsigned char*)&msg.retained,
vpcola 23:06fac173529e 722 (unsigned short*)&msg.id,
vpcola 23:06fac173529e 723 &topicName,
vpcola 23:06fac173529e 724 (unsigned char**)&msg.payload,
vpcola 23:06fac173529e 725 (int*)&msg.payloadlen, readbuf, MAX_MQTT_PACKET_SIZE) != 1)
vpcola 23:06fac173529e 726 {
vpcola 25:326f00faa092 727 printf("[Thread:%d]Error deserializing published message ...\r\n", Thread::gettid());
vpcola 23:06fac173529e 728 return -1;
vpcola 23:06fac173529e 729 }
vpcola 23:06fac173529e 730
vpcola 23:06fac173529e 731 std::string topic;
vpcola 23:06fac173529e 732 if (topicName.lenstring.len > 0)
vpcola 23:06fac173529e 733 {
vpcola 23:06fac173529e 734 topic = std::string((const char *) topicName.lenstring.data, (size_t) topicName.lenstring.len);
vpcola 23:06fac173529e 735 }else
vpcola 23:06fac173529e 736 topic = (const char *) topicName.cstring;
vpcola 23:06fac173529e 737
vpcola 25:326f00faa092 738 printf("[Thread:%d]Got message for topic [%s], QoS [%d] ...\r\n", Thread::gettid(), topic.c_str(), intQoS);
vpcola 23:06fac173529e 739
vpcola 23:06fac173529e 740 msg.qos = (QoS) intQoS;
vpcola 23:06fac173529e 741
vpcola 23:06fac173529e 742
vpcola 23:06fac173529e 743 // Call the handlers for each topic
vpcola 23:06fac173529e 744 if (topicCBMap.find(topic) != topicCBMap.end())
vpcola 23:06fac173529e 745 {
vpcola 23:06fac173529e 746 // Call the callback function
vpcola 23:06fac173529e 747 if (topicCBMap[topic].attached())
vpcola 23:06fac173529e 748 {
vpcola 25:326f00faa092 749 printf("[Thread:%d]Invoking function handler for topic ...\r\n", Thread::gettid());
vpcola 23:06fac173529e 750 MessageData md(topicName, msg);
vpcola 23:06fac173529e 751 topicCBMap[topic](md);
vpcola 23:06fac173529e 752
vpcola 23:06fac173529e 753 return 1;
vpcola 23:06fac173529e 754 }
vpcola 23:06fac173529e 755 }
vpcola 23:06fac173529e 756
vpcola 23:06fac173529e 757 // TODO: depending on the QoS
vpcola 23:06fac173529e 758 // we send data to the server = PUBACK or PUBREC
vpcola 23:06fac173529e 759 switch(intQoS)
vpcola 23:06fac173529e 760 {
vpcola 23:06fac173529e 761 case QOS0:
vpcola 23:06fac173529e 762 // We send back nothing ...
vpcola 23:06fac173529e 763 break;
vpcola 23:06fac173529e 764 case QOS1:
vpcola 23:06fac173529e 765 // TODO: implement
vpcola 23:06fac173529e 766 break;
vpcola 23:06fac173529e 767 case QOS2:
vpcola 23:06fac173529e 768 // TODO: implement
vpcola 23:06fac173529e 769 break;
vpcola 23:06fac173529e 770 default:
vpcola 23:06fac173529e 771 break;
vpcola 23:06fac173529e 772 }
vpcola 23:06fac173529e 773
vpcola 23:06fac173529e 774 return 0;
vpcola 23:06fac173529e 775 }
vpcola 23:06fac173529e 776
vpcola 23:06fac173529e 777 void MQTTThreadedClient::resetConnectionTimer()
vpcola 23:06fac173529e 778 {
vpcola 23:06fac173529e 779 if (keepAliveInterval > 0)
vpcola 23:06fac173529e 780 {
vpcola 23:06fac173529e 781 comTimer.reset();
vpcola 23:06fac173529e 782 comTimer.start();
vpcola 23:06fac173529e 783 }
vpcola 23:06fac173529e 784 }
vpcola 23:06fac173529e 785
vpcola 23:06fac173529e 786 bool MQTTThreadedClient::hasConnectionTimedOut()
vpcola 23:06fac173529e 787 {
vpcola 23:06fac173529e 788 if (keepAliveInterval > 0 ) {
vpcola 23:06fac173529e 789 // Check connection timer
vpcola 23:06fac173529e 790 if (comTimer.read_ms() > keepAliveInterval)
vpcola 23:06fac173529e 791 return true;
vpcola 23:06fac173529e 792 else
vpcola 23:06fac173529e 793 return false;
vpcola 23:06fac173529e 794 }
vpcola 23:06fac173529e 795
vpcola 23:06fac173529e 796 return false;
vpcola 23:06fac173529e 797 }
vpcola 23:06fac173529e 798
vpcola 23:06fac173529e 799 void MQTTThreadedClient::sendPingRequest()
vpcola 23:06fac173529e 800 {
vpcola 23:06fac173529e 801 int len = MQTTSerialize_pingreq(sendbuf, MAX_MQTT_PACKET_SIZE);
vpcola 23:06fac173529e 802 if (len > 0 && (sendPacket(len) == SUCCESS)) // send the ping packet
vpcola 23:06fac173529e 803 {
vpcola 25:326f00faa092 804 printf("[Thread:%d]Ping request sent successfully ...\r\n", Thread::gettid());
vpcola 23:06fac173529e 805 }
vpcola 23:06fac173529e 806 }
vpcola 23:06fac173529e 807
vpcola 23:06fac173529e 808 void MQTTThreadedClient::startListener()
vpcola 23:06fac173529e 809 {
vpcola 23:06fac173529e 810 int pType;
vpcola 26:4b21de8043a5 811 int numsubs;
vpcola 23:06fac173529e 812 // Continuesly listens for packets and dispatch
vpcola 23:06fac173529e 813 // message handlers ...
vpcola 26:4b21de8043a5 814 if (useTLS)
vpcola 26:4b21de8043a5 815 {
vpcola 26:4b21de8043a5 816 initTLS();
vpcola 26:4b21de8043a5 817 }
vpcola 26:4b21de8043a5 818
vpcola 26:4b21de8043a5 819 while(true)
vpcola 26:4b21de8043a5 820 {
vpcola 26:4b21de8043a5 821
vpcola 26:4b21de8043a5 822 // Attempt to reconnect and login
vpcola 26:4b21de8043a5 823 if ( connect() < 0 )
vpcola 23:06fac173529e 824 {
vpcola 26:4b21de8043a5 825 disconnect();
vpcola 26:4b21de8043a5 826 // Wait for a few secs and reconnect ...
vpcola 26:4b21de8043a5 827 Thread::wait(6000);
vpcola 26:4b21de8043a5 828 continue;
vpcola 23:06fac173529e 829 }
vpcola 23:06fac173529e 830
vpcola 26:4b21de8043a5 831 numsubs = processSubscriptions();
vpcola 26:4b21de8043a5 832 printf("Subscribed %d topics ...\r\n", numsubs);
vpcola 26:4b21de8043a5 833
vpcola 26:4b21de8043a5 834 // loop read
vpcola 26:4b21de8043a5 835 while(true)
vpcola 26:4b21de8043a5 836 {
vpcola 25:326f00faa092 837 pType = readPacket();
vpcola 26:4b21de8043a5 838 switch(pType)
vpcola 26:4b21de8043a5 839 {
vpcola 25:326f00faa092 840 case TIMEOUT:
vpcola 25:326f00faa092 841 // No data available from the network ...
vpcola 25:326f00faa092 842 break;
vpcola 25:326f00faa092 843 case FAILURE:
vpcola 26:4b21de8043a5 844 {
vpcola 26:4b21de8043a5 845 printf("readPacket returned failure \r\n");
vpcola 26:4b21de8043a5 846 goto reconnect;
vpcola 26:4b21de8043a5 847 }
vpcola 25:326f00faa092 848 case BUFFER_OVERFLOW:
vpcola 25:326f00faa092 849 {
vpcola 25:326f00faa092 850 // TODO: Network error, do we disconnect and reconnect?
vpcola 25:326f00faa092 851 printf("[Thread:%d]Failure or buffer overflow problem ... \r\n", Thread::gettid());
vpcola 25:326f00faa092 852 MBED_ASSERT(false);
vpcola 25:326f00faa092 853 }
vpcola 25:326f00faa092 854 break;
vpcola 25:326f00faa092 855 /**
vpcola 25:326f00faa092 856 * The rest of the return codes below (all positive) is about MQTT
vpcola 25:326f00faa092 857 * response codes
vpcola 25:326f00faa092 858 **/
vpcola 25:326f00faa092 859 case CONNACK:
vpcola 25:326f00faa092 860 case PUBACK:
vpcola 25:326f00faa092 861 case SUBACK:
vpcola 25:326f00faa092 862 break;
vpcola 25:326f00faa092 863 case PUBLISH:
vpcola 25:326f00faa092 864 {
vpcola 25:326f00faa092 865 printf("[Thread:%d]Publish received!....\r\n", Thread::gettid());
vpcola 25:326f00faa092 866 // We receive data from the MQTT server ..
vpcola 25:326f00faa092 867 if (handlePublishMsg() < 0) {
vpcola 25:326f00faa092 868 printf("[Thread:%d]Error handling PUBLISH message ... \r\n", Thread::gettid());
vpcola 25:326f00faa092 869 break;
vpcola 25:326f00faa092 870 }
vpcola 25:326f00faa092 871 }
vpcola 25:326f00faa092 872 break;
vpcola 25:326f00faa092 873 case PINGRESP:
vpcola 25:326f00faa092 874 {
vpcola 25:326f00faa092 875 printf("[Thread:%d]Got ping response ...\r\n", Thread::gettid());
vpcola 25:326f00faa092 876 resetConnectionTimer();
vpcola 25:326f00faa092 877 }
vpcola 25:326f00faa092 878 break;
vpcola 25:326f00faa092 879 default:
vpcola 25:326f00faa092 880 printf("[Thread:%d]Unknown/Not handled message from server pType[%d]\r\n", Thread::gettid(), pType);
vpcola 25:326f00faa092 881 }
vpcola 25:326f00faa092 882
vpcola 25:326f00faa092 883 // Check if its time to send a keepAlive packet
vpcola 25:326f00faa092 884 if (hasConnectionTimedOut()) {
vpcola 25:326f00faa092 885 // Queue the ping request so that other
vpcola 25:326f00faa092 886 // pending operations queued above will go first
vpcola 25:326f00faa092 887 queue.call(this, &MQTTThreadedClient::sendPingRequest);
vpcola 25:326f00faa092 888 }
vpcola 25:326f00faa092 889
vpcola 25:326f00faa092 890 // Check if we have messages on the message queue
vpcola 25:326f00faa092 891 osEvent evt = mqueue.get(10);
vpcola 25:326f00faa092 892 if (evt.status == osEventMessage) {
vpcola 25:326f00faa092 893
vpcola 25:326f00faa092 894 printf("[Thread:%d]Got message to publish! ... \r\n", Thread::gettid());
vpcola 25:326f00faa092 895
vpcola 25:326f00faa092 896 // Unpack the message
vpcola 25:326f00faa092 897 PubMessage * message = (PubMessage *)evt.value.p;
vpcola 25:326f00faa092 898
vpcola 25:326f00faa092 899 // Send the packet, do not queue the call
vpcola 25:326f00faa092 900 // like the ping above ..
vpcola 25:326f00faa092 901 if ( sendPublish(*message) == SUCCESS) {
vpcola 25:326f00faa092 902 // Reset timers if we have been able to send successfully
vpcola 25:326f00faa092 903 resetConnectionTimer();
vpcola 25:326f00faa092 904 } else {
vpcola 25:326f00faa092 905 // Disconnected?
vpcola 25:326f00faa092 906 goto reconnect;
vpcola 25:326f00faa092 907 }
vpcola 25:326f00faa092 908
vpcola 25:326f00faa092 909 // Free the message from mempool after using
vpcola 25:326f00faa092 910 mpool.free(message);
vpcola 25:326f00faa092 911 }
vpcola 25:326f00faa092 912
vpcola 25:326f00faa092 913 // Dispatch any queued events ...
vpcola 25:326f00faa092 914 queue.dispatch(100);
vpcola 25:326f00faa092 915 } // end while loop
vpcola 25:326f00faa092 916
vpcola 25:326f00faa092 917 reconnect:
vpcola 26:4b21de8043a5 918 // reconnect?
vpcola 26:4b21de8043a5 919 disconnect();
vpcola 26:4b21de8043a5 920
vpcola 26:4b21de8043a5 921 };
vpcola 23:06fac173529e 922 }
vpcola 26:4b21de8043a5 923
vpcola 26:4b21de8043a5 924 void MQTTThreadedClient::stopListener()
vpcola 26:4b21de8043a5 925 {
vpcola 26:4b21de8043a5 926 // TODO: Set a signal/flag that the running thread
vpcola 26:4b21de8043a5 927 // will check if its ok to stop ...
vpcola 26:4b21de8043a5 928 }