A HTTP/HTTPS Client for the mbed networking/CyaSSL ssl library

Dependents:   Anpi dropbox_access php_access_auth TwitterReader ... more

Fork of HTTPClient by Donatien Garnier

HTTP and HTTPS Client Class with wolfSSL, embedded SSL library.

/media/uploads/wolfSSL/wolfssl_logo.png

The class was forked from http://mbed.org/users/donatien/code/HTTPClient/

It, now, accepts url both with "http://" and "https://".

Allocate caller thread with 16kbytes or larger stack for "https" requests.

Rest of the API stays compatible with HTTPClient.

For more about the library, see http://www.wolfssl.com. http://wolfssl.com/yaSSL/Docs.html.

Extended methods:

  • HTTPResult basicAuth(const char* user, const char* password); /* set id/passwd for basic Authentication */
  • void setHeader(char *header) ; /* set http headers */
  • HTTPResult setSSLversion(int minorV) ; /* set SSL/TLS version. 0: SSL3, 1: TLS1.0, 2: TLS1.1, 3: TLS1.2 */
Committer:
wolfSSL
Date:
Tue Jul 21 01:07:25 2015 +0000
Revision:
33:77082c88748a
Parent:
32:9aadb8a34e80
Child:
34:76aa4f4021c1
Added dumpReqHeader, dumpResHeader

Who changed what in which revision?

UserRevisionLine numberNew contents of line
donatien 0:2ccb9960a044 1 /* HTTPClient.cpp */
donatien 10:e1351de84c16 2 /* Copyright (C) 2012 mbed.org, MIT License
donatien 10:e1351de84c16 3 *
donatien 10:e1351de84c16 4 * Permission is hereby granted, free of charge, to any person obtaining a copy of this software
donatien 10:e1351de84c16 5 * and associated documentation files (the "Software"), to deal in the Software without restriction,
donatien 10:e1351de84c16 6 * including without limitation the rights to use, copy, modify, merge, publish, distribute,
donatien 10:e1351de84c16 7 * sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is
donatien 10:e1351de84c16 8 * furnished to do so, subject to the following conditions:
donatien 10:e1351de84c16 9 *
donatien 10:e1351de84c16 10 * The above copyright notice and this permission notice shall be included in all copies or
donatien 10:e1351de84c16 11 * substantial portions of the Software.
donatien 10:e1351de84c16 12 *
donatien 10:e1351de84c16 13 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
donatien 10:e1351de84c16 14 * BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
donatien 10:e1351de84c16 15 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
donatien 10:e1351de84c16 16 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
donatien 10:e1351de84c16 17 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
donatien 10:e1351de84c16 18 */
donatien 0:2ccb9960a044 19
donatien 7:4e39864f7b15 20 //Debug is disabled by default
donatien 16:1f743885e7de 21 #if 0
donatien 12:89d09a6db00a 22 //Enable debug
donatien 11:390362de8c3f 23 #include <cstdio>
wolfSSL 18:d89df40b4cf3 24 #define DBG(x, ...) std::printf("[HTTPClient : DBG]"x"\r\n", ##__VA_ARGS__);
wolfSSL 32:9aadb8a34e80 25
wolfSSL 32:9aadb8a34e80 26 #define WOLF_DEBUG_ON // wolfSSL_Debugging_ON() ;
donatien 12:89d09a6db00a 27 #else
donatien 12:89d09a6db00a 28 //Disable debug
wolfSSL 18:d89df40b4cf3 29 #define DBG(x, ...)
wolfSSL 31:7fd621b83b60 30 #define WOLF_DEBUG_ON
wolfSSL 32:9aadb8a34e80 31 #endif
donatien 12:89d09a6db00a 32
wolfSSL 32:9aadb8a34e80 33 #define WARN(x, ...) std::printf("[HTTPClient : WARN]"x"\r\n", ##__VA_ARGS__);
wolfSSL 32:9aadb8a34e80 34 #define ERR(x, ...) std::printf("[HTTPClient : ERR]"x"\r\n", ##__VA_ARGS__);
donatien 0:2ccb9960a044 35
donatien 0:2ccb9960a044 36 #define HTTP_PORT 80
wolfSSL 17:c73d8e61d391 37 #define HTTPS_PORT 443
donatien 0:2ccb9960a044 38
donatien 11:390362de8c3f 39 #define OK 0
donatien 11:390362de8c3f 40
donatien 11:390362de8c3f 41 #define MIN(x,y) (((x)<(y))?(x):(y))
donatien 11:390362de8c3f 42 #define MAX(x,y) (((x)>(y))?(x):(y))
donatien 11:390362de8c3f 43
wolfSSL 17:c73d8e61d391 44 #include <cstring>
donatien 0:2ccb9960a044 45
wolfSSL 31:7fd621b83b60 46 #include <../wolfSSL/wolfssl/wolfcrypt/settings.h>
wolfSSL 31:7fd621b83b60 47 #include <../wolfSSL/wolfssl/wolfcrypt/types.h>
wolfSSL 31:7fd621b83b60 48 #include <../wolfSSL/wolfssl/internal.h>
wolfSSL 31:7fd621b83b60 49 #include <../wolfSSL/wolfssl/ssl.h>
donatien 0:2ccb9960a044 50
donatien 11:390362de8c3f 51 #include "HTTPClient.h"
wolfSSL 17:c73d8e61d391 52 #include "TCPSocketConnection.h"
wolfSSL 32:9aadb8a34e80 53 #include <string.h>
wolfSSL 17:c73d8e61d391 54
wolfSSL 19:1e2f05809eb1 55 static TCPSocketConnection m_sock;
wolfSSL 32:9aadb8a34e80 56 #define CHUNK_SIZE (256*4*8)
wolfSSL 17:c73d8e61d391 57 #define SEND_BUF_SIZE 512
wolfSSL 17:c73d8e61d391 58 static char send_buf[SEND_BUF_SIZE] ;
wolfSSL 17:c73d8e61d391 59 static char *send_buf_p ;
wolfSSL 17:c73d8e61d391 60
wolfSSL 31:7fd621b83b60 61 static int SocketReceive(WOLFSSL* ssl, char *buf, int sz, void *ctx)
wolfSSL 17:c73d8e61d391 62 {
wolfSSL 17:c73d8e61d391 63 int n ;
wolfSSL 17:c73d8e61d391 64 int i ;
wolfSSL 18:d89df40b4cf3 65 #define RECV_RETRY 3
wolfSSL 22:4b9a4151cc73 66
wolfSSL 17:c73d8e61d391 67 for(i=0; i<RECV_RETRY; i++) {
wolfSSL 17:c73d8e61d391 68 n = m_sock.receive(buf, sz) ;
wolfSSL 17:c73d8e61d391 69 if(n >= 0)return n ;
wolfSSL 32:9aadb8a34e80 70 WARN("Retrt Recv") ;
wolfSSL 22:4b9a4151cc73 71 wait(0.2) ;
wolfSSL 17:c73d8e61d391 72 }
wolfSSL 17:c73d8e61d391 73 ERR("SocketReceive:%d/%d\n", n, sz) ;
wolfSSL 17:c73d8e61d391 74 return n ;
wolfSSL 17:c73d8e61d391 75 }
wolfSSL 17:c73d8e61d391 76
wolfSSL 31:7fd621b83b60 77 static int SocketSend(WOLFSSL* ssl, char *buf, int sz, void *ctx)
wolfSSL 17:c73d8e61d391 78 {
wolfSSL 17:c73d8e61d391 79 int n ;
wolfSSL 30:a9ecee69c6b5 80
wolfSSL 22:4b9a4151cc73 81 wait(0.1) ;
wolfSSL 17:c73d8e61d391 82 n = m_sock.send(buf, sz);
wolfSSL 17:c73d8e61d391 83 if(n > 0) {
wolfSSL 22:4b9a4151cc73 84 wait(0.3) ;
wolfSSL 17:c73d8e61d391 85 return n ;
wolfSSL 17:c73d8e61d391 86 } else ERR("SocketSend:%d/%d\n", n, sz);
wolfSSL 17:c73d8e61d391 87 return n ;
wolfSSL 17:c73d8e61d391 88 }
donatien 11:390362de8c3f 89
wolfSSL 30:a9ecee69c6b5 90 static void base64enc(char *out, const char *in)
wolfSSL 30:a9ecee69c6b5 91 {
wolfSSL 22:4b9a4151cc73 92 const char code[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=" ;
wolfSSL 22:4b9a4151cc73 93 int i = 0, x = 0, l = 0;
wolfSSL 22:4b9a4151cc73 94
wolfSSL 22:4b9a4151cc73 95 for (; *in; in++) {
wolfSSL 22:4b9a4151cc73 96 x = x << 8 | *in;
wolfSSL 22:4b9a4151cc73 97 for (l += 8; l >= 6; l -= 6) {
wolfSSL 22:4b9a4151cc73 98 out[i++] = code[(x >> (l - 6)) & 0x3f];
wolfSSL 22:4b9a4151cc73 99 }
wolfSSL 22:4b9a4151cc73 100 }
wolfSSL 22:4b9a4151cc73 101 if (l > 0) {
wolfSSL 22:4b9a4151cc73 102 x <<= 6 - l;
wolfSSL 22:4b9a4151cc73 103 out[i++] = code[x & 0x3f];
wolfSSL 22:4b9a4151cc73 104 }
wolfSSL 22:4b9a4151cc73 105 for (; i % 4;) {
wolfSSL 22:4b9a4151cc73 106 out[i++] = '=';
wolfSSL 22:4b9a4151cc73 107 }
wolfSSL 22:4b9a4151cc73 108 out[i] = '\0' ;
wolfSSL 22:4b9a4151cc73 109 }
wolfSSL 22:4b9a4151cc73 110
donatien 0:2ccb9960a044 111 HTTPClient::HTTPClient() :
wolfSSL 18:d89df40b4cf3 112 m_basicAuthUser(NULL), m_basicAuthPassword(NULL), m_httpResponseCode(0)
donatien 0:2ccb9960a044 113 {
wolfSSL 31:7fd621b83b60 114 WOLF_DEBUG_ON ;
wolfSSL 18:d89df40b4cf3 115 ctx = 0 ;
wolfSSL 18:d89df40b4cf3 116 ssl = 0 ;
wolfSSL 30:a9ecee69c6b5 117 SSLver = 3 ;
wolfSSL 27:5d4739eae63e 118 m_basicAuthUser = NULL ;
wolfSSL 27:5d4739eae63e 119 redirect_url = NULL ;
wolfSSL 27:5d4739eae63e 120 redirect = 0 ;
wolfSSL 27:5d4739eae63e 121 header = NULL ;
wolfSSL 33:77082c88748a 122 dumpReqH = false ;
wolfSSL 33:77082c88748a 123 dumpResH = false ;
donatien 0:2ccb9960a044 124 }
donatien 0:2ccb9960a044 125
donatien 0:2ccb9960a044 126 HTTPClient::~HTTPClient()
donatien 0:2ccb9960a044 127 {
donatien 0:2ccb9960a044 128
donatien 0:2ccb9960a044 129 }
donatien 0:2ccb9960a044 130
wolfSSL 22:4b9a4151cc73 131 HTTPResult HTTPClient::basicAuth(const char* user, const char* password) //Basic Authentification
donatien 0:2ccb9960a044 132 {
wolfSSL 30:a9ecee69c6b5 133 #define AUTHB_SIZE 128
wolfSSL 22:4b9a4151cc73 134 if((strlen(user) + strlen(password)) >= AUTHB_SIZE)
wolfSSL 22:4b9a4151cc73 135 return HTTP_ERROR ;
wolfSSL 18:d89df40b4cf3 136 m_basicAuthUser = user;
wolfSSL 18:d89df40b4cf3 137 m_basicAuthPassword = password;
wolfSSL 22:4b9a4151cc73 138 return HTTP_OK ;
donatien 0:2ccb9960a044 139 }
donatien 0:2ccb9960a044 140
donatien 12:89d09a6db00a 141 HTTPResult HTTPClient::get(const char* url, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 142 {
wolfSSL 32:9aadb8a34e80 143 HTTPResult ret ;
wolfSSL 32:9aadb8a34e80 144 ret = connect(url, HTTP_GET, NULL, pDataIn, timeout);
wolfSSL 32:9aadb8a34e80 145 return ret;
donatien 0:2ccb9960a044 146 }
donatien 0:2ccb9960a044 147
donatien 12:89d09a6db00a 148 HTTPResult HTTPClient::get(const char* url, char* result, size_t maxResultLen, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 149 {
wolfSSL 32:9aadb8a34e80 150 HTTPText str(result, maxResultLen);
wolfSSL 18:d89df40b4cf3 151 return get(url, &str, timeout);
donatien 0:2ccb9960a044 152 }
donatien 0:2ccb9960a044 153
donatien 12:89d09a6db00a 154 HTTPResult HTTPClient::post(const char* url, const IHTTPDataOut& dataOut, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 155 {
wolfSSL 18:d89df40b4cf3 156 return connect(url, HTTP_POST, (IHTTPDataOut*)&dataOut, pDataIn, timeout);
donatien 0:2ccb9960a044 157 }
donatien 0:2ccb9960a044 158
donatien 16:1f743885e7de 159 HTTPResult HTTPClient::put(const char* url, const IHTTPDataOut& dataOut, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 16:1f743885e7de 160 {
wolfSSL 18:d89df40b4cf3 161 return connect(url, HTTP_PUT, (IHTTPDataOut*)&dataOut, pDataIn, timeout);
donatien 16:1f743885e7de 162 }
donatien 16:1f743885e7de 163
donatien 16:1f743885e7de 164 HTTPResult HTTPClient::del(const char* url, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 16:1f743885e7de 165 {
wolfSSL 18:d89df40b4cf3 166 return connect(url, HTTP_DELETE, NULL, pDataIn, timeout);
donatien 16:1f743885e7de 167 }
donatien 16:1f743885e7de 168
donatien 16:1f743885e7de 169
donatien 0:2ccb9960a044 170 int HTTPClient::getHTTPResponseCode()
donatien 0:2ccb9960a044 171 {
wolfSSL 18:d89df40b4cf3 172 return m_httpResponseCode;
donatien 0:2ccb9960a044 173 }
donatien 0:2ccb9960a044 174
wolfSSL 27:5d4739eae63e 175 void HTTPClient::setHeader(const char * h)
wolfSSL 17:c73d8e61d391 176 {
wolfSSL 17:c73d8e61d391 177 header = h ;
wolfSSL 17:c73d8e61d391 178 }
wolfSSL 17:c73d8e61d391 179
wolfSSL 33:77082c88748a 180 void HTTPClient::dumpReqHeader(bool sw)
wolfSSL 33:77082c88748a 181 {
wolfSSL 33:77082c88748a 182 dumpReqH = sw ;
wolfSSL 33:77082c88748a 183 }
wolfSSL 33:77082c88748a 184
wolfSSL 33:77082c88748a 185 void HTTPClient::dumpResHeader(bool sw)
wolfSSL 33:77082c88748a 186 {
wolfSSL 33:77082c88748a 187 dumpResH = sw ;
wolfSSL 33:77082c88748a 188 }
wolfSSL 33:77082c88748a 189
wolfSSL 27:5d4739eae63e 190 void HTTPClient::setLocationBuf(char * url, int size)
wolfSSL 27:5d4739eae63e 191 {
wolfSSL 27:5d4739eae63e 192 redirect_url = url ;
wolfSSL 27:5d4739eae63e 193 redirect_url_size = size ;
wolfSSL 27:5d4739eae63e 194 }
wolfSSL 27:5d4739eae63e 195
wolfSSL 30:a9ecee69c6b5 196 HTTPResult HTTPClient::setSSLversion(int minorV)
wolfSSL 22:4b9a4151cc73 197 {
wolfSSL 30:a9ecee69c6b5 198 if((minorV>=0) && (minorV<=3))
wolfSSL 22:4b9a4151cc73 199 SSLver = minorV ;
wolfSSL 22:4b9a4151cc73 200 else return HTTP_ERROR ;
wolfSSL 22:4b9a4151cc73 201 return HTTP_OK ;
wolfSSL 22:4b9a4151cc73 202 }
wolfSSL 22:4b9a4151cc73 203
wolfSSL 17:c73d8e61d391 204
donatien 5:791fc3dcb6c4 205 #define CHECK_CONN_ERR(ret) \
donatien 5:791fc3dcb6c4 206 do{ \
donatien 7:4e39864f7b15 207 if(ret) { \
wolfSSL 31:7fd621b83b60 208 wolfssl_free() ;\
donatien 7:4e39864f7b15 209 m_sock.close(); \
donatien 5:791fc3dcb6c4 210 ERR("Connection error (%d)", ret); \
donatien 11:390362de8c3f 211 return HTTP_CONN; \
donatien 5:791fc3dcb6c4 212 } \
donatien 5:791fc3dcb6c4 213 } while(0)
donatien 5:791fc3dcb6c4 214
donatien 5:791fc3dcb6c4 215 #define PRTCL_ERR() \
donatien 5:791fc3dcb6c4 216 do{ \
wolfSSL 31:7fd621b83b60 217 wolfssl_free() ;\
donatien 7:4e39864f7b15 218 m_sock.close(); \
donatien 5:791fc3dcb6c4 219 ERR("Protocol error"); \
donatien 11:390362de8c3f 220 return HTTP_PRTCL; \
donatien 5:791fc3dcb6c4 221 } while(0)
donatien 0:2ccb9960a044 222
wolfSSL 33:77082c88748a 223 #define DUMP_REQ_HEADER(buff) \
wolfSSL 33:77082c88748a 224 if(dumpReqH)printf("%s", buff) ;
wolfSSL 33:77082c88748a 225 #define DUMP_RES_HEADER(buff) \
wolfSSL 33:77082c88748a 226 if(dumpResH)printf("%s\n", buff) ;
wolfSSL 33:77082c88748a 227
wolfSSL 31:7fd621b83b60 228 void HTTPClient::wolfssl_free(void)
wolfSSL 17:c73d8e61d391 229 {
wolfSSL 19:1e2f05809eb1 230 if(ssl) {
wolfSSL 31:7fd621b83b60 231 wolfSSL_free(ssl) ;
wolfSSL 19:1e2f05809eb1 232 ssl = NULL ;
wolfSSL 19:1e2f05809eb1 233 }
wolfSSL 19:1e2f05809eb1 234 if(ctx) {
wolfSSL 31:7fd621b83b60 235 wolfSSL_CTX_free(ctx) ;
wolfSSL 19:1e2f05809eb1 236 ctx = NULL ;
wolfSSL 19:1e2f05809eb1 237 }
wolfSSL 31:7fd621b83b60 238 wolfSSL_Cleanup() ;
wolfSSL 30:a9ecee69c6b5 239 }
wolfSSL 17:c73d8e61d391 240
donatien 12:89d09a6db00a 241 HTTPResult HTTPClient::connect(const char* url, HTTP_METH method, IHTTPDataOut* pDataOut, IHTTPDataIn* pDataIn, int timeout) //Execute request
wolfSSL 18:d89df40b4cf3 242 {
wolfSSL 31:7fd621b83b60 243 WOLFSSL_METHOD * SSLmethod ;
wolfSSL 18:d89df40b4cf3 244 m_httpResponseCode = 0; //Invalidate code
wolfSSL 18:d89df40b4cf3 245 m_timeout = timeout;
wolfSSL 27:5d4739eae63e 246 redirect = 0 ;
wolfSSL 30:a9ecee69c6b5 247
wolfSSL 18:d89df40b4cf3 248 pDataIn->writeReset();
wolfSSL 18:d89df40b4cf3 249 if( pDataOut ) {
wolfSSL 18:d89df40b4cf3 250 pDataOut->readReset();
wolfSSL 18:d89df40b4cf3 251 }
wolfSSL 17:c73d8e61d391 252
wolfSSL 18:d89df40b4cf3 253 char scheme[8];
wolfSSL 18:d89df40b4cf3 254 char host[32];
wolfSSL 31:7fd621b83b60 255 char path[160];
wolfSSL 18:d89df40b4cf3 256
wolfSSL 18:d89df40b4cf3 257 int ret ;
donatien 0:2ccb9960a044 258
wolfSSL 18:d89df40b4cf3 259 //First we need to parse the url (http[s]://host[:port][/[path]])
wolfSSL 18:d89df40b4cf3 260 HTTPResult res = parseURL(url, scheme, sizeof(scheme), host, sizeof(host), &port, path, sizeof(path));
wolfSSL 18:d89df40b4cf3 261 if(res != HTTP_OK) {
wolfSSL 18:d89df40b4cf3 262 ERR("parseURL returned %d", res);
wolfSSL 18:d89df40b4cf3 263 return res;
wolfSSL 18:d89df40b4cf3 264 }
donatien 0:2ccb9960a044 265
wolfSSL 22:4b9a4151cc73 266 if(port == 0) {
wolfSSL 18:d89df40b4cf3 267 if(strcmp(scheme, "http") == 0)
wolfSSL 18:d89df40b4cf3 268 port = HTTP_PORT ;
wolfSSL 18:d89df40b4cf3 269 else if(strcmp(scheme, "https") == 0)
wolfSSL 18:d89df40b4cf3 270 port = HTTPS_PORT ;
wolfSSL 18:d89df40b4cf3 271 }
donatien 0:2ccb9960a044 272
wolfSSL 18:d89df40b4cf3 273 DBG("Scheme: %s", scheme);
wolfSSL 18:d89df40b4cf3 274 DBG("Host: %s", host);
wolfSSL 18:d89df40b4cf3 275 DBG("Port: %d", port);
wolfSSL 18:d89df40b4cf3 276 DBG("Path: %s", path);
wolfSSL 33:77082c88748a 277 if(dumpReqH)printf("\nHTTP Request: %s://%s:%d\n", scheme, host, port) ;
wolfSSL 18:d89df40b4cf3 278 //Connect
wolfSSL 18:d89df40b4cf3 279 DBG("Connecting socket to server");
wolfSSL 18:d89df40b4cf3 280
wolfSSL 18:d89df40b4cf3 281 #define MAX_RETRY 5
wolfSSL 18:d89df40b4cf3 282 int retry ;
donatien 0:2ccb9960a044 283
wolfSSL 18:d89df40b4cf3 284 for(retry=0; retry<MAX_RETRY; retry++) {
wolfSSL 18:d89df40b4cf3 285 int ret = m_sock.connect(host, port);
wolfSSL 18:d89df40b4cf3 286 if(ret == 0)break ;
wolfSSL 17:c73d8e61d391 287 }
wolfSSL 18:d89df40b4cf3 288 if(retry == MAX_RETRY) {
wolfSSL 18:d89df40b4cf3 289 m_sock.close();
wolfSSL 18:d89df40b4cf3 290 ERR("Could not connect");
wolfSSL 18:d89df40b4cf3 291 return HTTP_CONN;
wolfSSL 17:c73d8e61d391 292 }
wolfSSL 17:c73d8e61d391 293
wolfSSL 18:d89df40b4cf3 294 if(port == HTTPS_PORT) {
wolfSSL 22:4b9a4151cc73 295
wolfSSL 18:d89df40b4cf3 296 /* Start SSL connect */
wolfSSL 27:5d4739eae63e 297 DBG("SSLver=%d", SSLver) ;
wolfSSL 19:1e2f05809eb1 298 if(ctx == NULL) {
wolfSSL 22:4b9a4151cc73 299 switch(SSLver) {
wolfSSL 30:a9ecee69c6b5 300 case 0 :
wolfSSL 31:7fd621b83b60 301 SSLmethod = wolfSSLv3_client_method() ;
wolfSSL 30:a9ecee69c6b5 302 break ;
wolfSSL 30:a9ecee69c6b5 303 case 1 :
wolfSSL 31:7fd621b83b60 304 SSLmethod = wolfTLSv1_client_method() ;
wolfSSL 30:a9ecee69c6b5 305 break ;
wolfSSL 30:a9ecee69c6b5 306 case 2 :
wolfSSL 31:7fd621b83b60 307 SSLmethod = wolfTLSv1_1_client_method() ;
wolfSSL 30:a9ecee69c6b5 308 break ;
wolfSSL 30:a9ecee69c6b5 309 case 3 :
wolfSSL 31:7fd621b83b60 310 SSLmethod = wolfTLSv1_2_client_method() ;
wolfSSL 30:a9ecee69c6b5 311 break ;
wolfSSL 22:4b9a4151cc73 312 }
wolfSSL 31:7fd621b83b60 313 ctx = wolfSSL_CTX_new((WOLFSSL_METHOD *)SSLmethod);
wolfSSL 19:1e2f05809eb1 314 if (ctx == NULL) {
wolfSSL 19:1e2f05809eb1 315 ERR("unable to get ctx");
wolfSSL 19:1e2f05809eb1 316 return HTTP_CONN;
wolfSSL 19:1e2f05809eb1 317 }
wolfSSL 31:7fd621b83b60 318 wolfSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0);
wolfSSL 31:7fd621b83b60 319 wolfSSL_SetIORecv(ctx, SocketReceive) ;
wolfSSL 31:7fd621b83b60 320 wolfSSL_SetIOSend(ctx, SocketSend) ;
wolfSSL 18:d89df40b4cf3 321 }
wolfSSL 18:d89df40b4cf3 322 if (ssl == NULL) {
wolfSSL 31:7fd621b83b60 323 ssl = wolfSSL_new(ctx);
wolfSSL 19:1e2f05809eb1 324 if (ssl == NULL) {
wolfSSL 19:1e2f05809eb1 325 ERR("unable to get SSL object");
wolfSSL 31:7fd621b83b60 326 wolfssl_free() ;
wolfSSL 19:1e2f05809eb1 327 return HTTP_CONN;
wolfSSL 19:1e2f05809eb1 328 }
wolfSSL 18:d89df40b4cf3 329 }
donatien 0:2ccb9960a044 330
wolfSSL 18:d89df40b4cf3 331 DBG("ctx=%x, ssl=%x, ssl->ctx->CBIORecv, CBIOSend=%x, %x\n",
wolfSSL 18:d89df40b4cf3 332 ctx, ssl, SocketReceive, SocketSend ) ;
wolfSSL 31:7fd621b83b60 333 if (wolfSSL_connect(ssl) != SSL_SUCCESS) {
wolfSSL 18:d89df40b4cf3 334 ERR("SSL_connect failed");
wolfSSL 31:7fd621b83b60 335 wolfssl_free() ;
wolfSSL 18:d89df40b4cf3 336 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 337 }
wolfSSL 18:d89df40b4cf3 338 } /* SSL connect complete */
donatien 0:2ccb9960a044 339
wolfSSL 18:d89df40b4cf3 340 //Send request
wolfSSL 18:d89df40b4cf3 341 DBG("Sending request");
wolfSSL 18:d89df40b4cf3 342 char buf[CHUNK_SIZE];
wolfSSL 18:d89df40b4cf3 343 send_buf_p = send_buf ; // Reset send buffer ;
wolfSSL 18:d89df40b4cf3 344
wolfSSL 18:d89df40b4cf3 345 const char* meth = (method==HTTP_GET)?"GET":(method==HTTP_POST)?"POST":(method==HTTP_PUT)?"PUT":(method==HTTP_DELETE)?"DELETE":"";
wolfSSL 18:d89df40b4cf3 346 snprintf(buf, sizeof(buf), "%s %s HTTP/1.1\r\nHost: %s\r\n", meth, path, host); //Write request
wolfSSL 33:77082c88748a 347 DUMP_REQ_HEADER(buf) ;
wolfSSL 18:d89df40b4cf3 348 ret = send(buf);
wolfSSL 18:d89df40b4cf3 349 if(ret) {
wolfSSL 18:d89df40b4cf3 350 m_sock.close();
wolfSSL 18:d89df40b4cf3 351 ERR("Could not write request");
wolfSSL 18:d89df40b4cf3 352 return HTTP_CONN;
donatien 0:2ccb9960a044 353 }
wolfSSL 17:c73d8e61d391 354
wolfSSL 28:25b5d3720bd1 355 wait(0.1) ;
wolfSSL 30:a9ecee69c6b5 356
wolfSSL 18:d89df40b4cf3 357 //Send all headers
donatien 0:2ccb9960a044 358
wolfSSL 18:d89df40b4cf3 359 //Send default headers
wolfSSL 18:d89df40b4cf3 360 DBG("Sending headers");
wolfSSL 27:5d4739eae63e 361 if(m_basicAuthUser) {
wolfSSL 30:a9ecee69c6b5 362 bAuth() ; /* send out Basic Auth header */
wolfSSL 27:5d4739eae63e 363 }
wolfSSL 18:d89df40b4cf3 364 if( pDataOut != NULL ) {
wolfSSL 18:d89df40b4cf3 365 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 366 ret = send("Transfer-Encoding: chunked\r\n");
wolfSSL 33:77082c88748a 367 DUMP_REQ_HEADER("Transfer-Encoding: chunked\r\n") ;
wolfSSL 18:d89df40b4cf3 368 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 369 } else {
wolfSSL 18:d89df40b4cf3 370 snprintf(buf, sizeof(buf), "Content-Length: %d\r\n", pDataOut->getDataLen());
wolfSSL 33:77082c88748a 371 DUMP_REQ_HEADER(buf) ;
wolfSSL 22:4b9a4151cc73 372 DBG("Content buf:%s", buf) ;
wolfSSL 18:d89df40b4cf3 373 ret = send(buf);
wolfSSL 18:d89df40b4cf3 374 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 375 }
wolfSSL 18:d89df40b4cf3 376 char type[48];
wolfSSL 18:d89df40b4cf3 377 if( pDataOut->getDataType(type, 48) == HTTP_OK ) {
wolfSSL 18:d89df40b4cf3 378 snprintf(buf, sizeof(buf), "Content-Type: %s\r\n", type);
wolfSSL 33:77082c88748a 379 DUMP_REQ_HEADER(buf) ;
wolfSSL 18:d89df40b4cf3 380 ret = send(buf);
wolfSSL 18:d89df40b4cf3 381 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 382 }
wolfSSL 18:d89df40b4cf3 383 }
wolfSSL 18:d89df40b4cf3 384
wolfSSL 18:d89df40b4cf3 385 //Add user headers
wolfSSL 18:d89df40b4cf3 386 if(header) {
wolfSSL 27:5d4739eae63e 387 ret = send((char *)header);
wolfSSL 33:77082c88748a 388 DUMP_REQ_HEADER(header) ;
donatien 5:791fc3dcb6c4 389 CHECK_CONN_ERR(ret);
donatien 0:2ccb9960a044 390 }
donatien 0:2ccb9960a044 391
wolfSSL 18:d89df40b4cf3 392 //Close headers
wolfSSL 18:d89df40b4cf3 393 DBG("Headers sent");
wolfSSL 18:d89df40b4cf3 394 ret = send("\r\n");
wolfSSL 18:d89df40b4cf3 395 CHECK_CONN_ERR(ret);
wolfSSL 17:c73d8e61d391 396
wolfSSL 18:d89df40b4cf3 397 size_t trfLen;
donatien 0:2ccb9960a044 398
wolfSSL 18:d89df40b4cf3 399 //Send data (if available)
wolfSSL 33:77082c88748a 400 DUMP_REQ_HEADER("\n") ;
wolfSSL 18:d89df40b4cf3 401 if( pDataOut != NULL ) {
wolfSSL 18:d89df40b4cf3 402 DBG("Sending data");
wolfSSL 18:d89df40b4cf3 403 while(true) {
wolfSSL 18:d89df40b4cf3 404 size_t writtenLen = 0;
wolfSSL 18:d89df40b4cf3 405 pDataOut->read(buf, CHUNK_SIZE, &trfLen);
wolfSSL 18:d89df40b4cf3 406 buf[trfLen] = 0x0 ;
wolfSSL 18:d89df40b4cf3 407 DBG("buf:%s", buf) ;
wolfSSL 18:d89df40b4cf3 408 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 409 //Write chunk header
wolfSSL 22:4b9a4151cc73 410 char chunkHeader[64];
wolfSSL 18:d89df40b4cf3 411 snprintf(chunkHeader, sizeof(chunkHeader), "%X\r\n", trfLen); //In hex encoding
wolfSSL 18:d89df40b4cf3 412 ret = send(chunkHeader);
wolfSSL 18:d89df40b4cf3 413 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 414 } else if( trfLen == 0 ) {
wolfSSL 22:4b9a4151cc73 415 DBG("trfLen==0") ;
wolfSSL 18:d89df40b4cf3 416 break;
wolfSSL 18:d89df40b4cf3 417 }
wolfSSL 22:4b9a4151cc73 418 DBG("trfLen 1=%d", trfLen) ;
wolfSSL 18:d89df40b4cf3 419 if( trfLen != 0 ) {
wolfSSL 22:4b9a4151cc73 420 DBG("Sending 1") ;
wolfSSL 33:77082c88748a 421 DUMP_REQ_HEADER(buf) ;
wolfSSL 18:d89df40b4cf3 422 ret = send(buf, trfLen);
wolfSSL 22:4b9a4151cc73 423 DBG("Sent 1") ;
wolfSSL 18:d89df40b4cf3 424 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 425 }
donatien 0:2ccb9960a044 426
wolfSSL 18:d89df40b4cf3 427 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 428 ret = send("\r\n"); //Chunk-terminating CRLF
wolfSSL 18:d89df40b4cf3 429 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 430 } else {
wolfSSL 18:d89df40b4cf3 431 writtenLen += trfLen;
wolfSSL 18:d89df40b4cf3 432 if( writtenLen >= pDataOut->getDataLen() ) {
wolfSSL 22:4b9a4151cc73 433 DBG("writtenLen=%d", writtenLen) ;
wolfSSL 18:d89df40b4cf3 434 break;
wolfSSL 18:d89df40b4cf3 435 }
wolfSSL 22:4b9a4151cc73 436 DBG("writtenLen+=trfLen = %d", writtenLen) ;
wolfSSL 18:d89df40b4cf3 437 }
wolfSSL 22:4b9a4151cc73 438 DBG("trfLen 2=%d", trfLen) ;
wolfSSL 18:d89df40b4cf3 439 if( trfLen == 0 ) {
wolfSSL 22:4b9a4151cc73 440 DBG("trfLen == 0") ;
wolfSSL 18:d89df40b4cf3 441 break;
wolfSSL 18:d89df40b4cf3 442 }
wolfSSL 18:d89df40b4cf3 443 }
donatien 0:2ccb9960a044 444
wolfSSL 18:d89df40b4cf3 445 }
wolfSSL 33:77082c88748a 446 DUMP_REQ_HEADER("\n") ;
wolfSSL 18:d89df40b4cf3 447 ret = flush() ; // flush the send buffer ;
wolfSSL 18:d89df40b4cf3 448 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 449
wolfSSL 18:d89df40b4cf3 450 //Receive response
wolfSSL 33:77082c88748a 451 DBG("Receiving response:");
wolfSSL 18:d89df40b4cf3 452
wolfSSL 18:d89df40b4cf3 453 ret = recv(buf, CHUNK_SIZE - 1, CHUNK_SIZE - 1, &trfLen); //Read n bytes
wolfSSL 18:d89df40b4cf3 454 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 455
wolfSSL 18:d89df40b4cf3 456 buf[trfLen] = '\0';
wolfSSL 18:d89df40b4cf3 457
wolfSSL 18:d89df40b4cf3 458 char* crlfPtr = strstr(buf, "\r\n");
wolfSSL 18:d89df40b4cf3 459 if(crlfPtr == NULL) {
donatien 5:791fc3dcb6c4 460 PRTCL_ERR();
donatien 0:2ccb9960a044 461 }
donatien 0:2ccb9960a044 462
wolfSSL 18:d89df40b4cf3 463 int crlfPos = crlfPtr - buf;
donatien 0:2ccb9960a044 464 buf[crlfPos] = '\0';
wolfSSL 33:77082c88748a 465 DUMP_RES_HEADER("\nHTTP Response:") ;
wolfSSL 33:77082c88748a 466 DUMP_RES_HEADER(buf) ;
donatien 0:2ccb9960a044 467
wolfSSL 18:d89df40b4cf3 468 //Parse HTTP response
wolfSSL 18:d89df40b4cf3 469 if( sscanf(buf, "HTTP/%*d.%*d %d %*[^\r\n]", &m_httpResponseCode) != 1 ) {
wolfSSL 18:d89df40b4cf3 470 //Cannot match string, error
wolfSSL 18:d89df40b4cf3 471 ERR("Not a correct HTTP answer : %s\n", buf);
wolfSSL 18:d89df40b4cf3 472 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 473 }
donatien 4:c071b05ac026 474
wolfSSL 27:5d4739eae63e 475 if( (m_httpResponseCode < 200) || (m_httpResponseCode >= 400) ) {
wolfSSL 18:d89df40b4cf3 476 //Did not return a 2xx code; TODO fetch headers/(&data?) anyway and implement a mean of writing/reading headers
wolfSSL 18:d89df40b4cf3 477 WARN("Response code %d", m_httpResponseCode);
wolfSSL 18:d89df40b4cf3 478 PRTCL_ERR();
donatien 0:2ccb9960a044 479 }
donatien 0:2ccb9960a044 480
wolfSSL 18:d89df40b4cf3 481 DBG("Reading headers");
donatien 0:2ccb9960a044 482
wolfSSL 18:d89df40b4cf3 483 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2) + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 484 trfLen -= (crlfPos + 2);
donatien 0:2ccb9960a044 485
wolfSSL 18:d89df40b4cf3 486 size_t recvContentLength = 0;
wolfSSL 18:d89df40b4cf3 487 bool recvChunked = false;
wolfSSL 18:d89df40b4cf3 488 //Now get headers
wolfSSL 18:d89df40b4cf3 489 while( true ) {
wolfSSL 18:d89df40b4cf3 490 crlfPtr = strstr(buf, "\r\n");
wolfSSL 18:d89df40b4cf3 491 if(crlfPtr == NULL) {
wolfSSL 18:d89df40b4cf3 492 if( trfLen < CHUNK_SIZE - 1 ) {
wolfSSL 18:d89df40b4cf3 493 size_t newTrfLen;
wolfSSL 18:d89df40b4cf3 494 ret = recv(buf + trfLen, 1, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 495 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 496 buf[trfLen] = '\0';
wolfSSL 18:d89df40b4cf3 497 DBG("Read %d chars; In buf: [%s]", newTrfLen, buf);
wolfSSL 18:d89df40b4cf3 498 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 499 continue;
wolfSSL 30:a9ecee69c6b5 500 } else { // Too large header. Skip to the next.
wolfSSL 30:a9ecee69c6b5 501 WARN("Header too large [%20s]. Skip to the next.\n", buf) ;
wolfSSL 30:a9ecee69c6b5 502 while(true) {
wolfSSL 30:a9ecee69c6b5 503 ret = recv(buf, 1, CHUNK_SIZE-1, &trfLen);
wolfSSL 30:a9ecee69c6b5 504 buf[trfLen] = '\0' ;
wolfSSL 30:a9ecee69c6b5 505 crlfPtr = strstr(buf, "\r\n");
wolfSSL 30:a9ecee69c6b5 506 if(crlfPtr != NULL) {
wolfSSL 30:a9ecee69c6b5 507 crlfPos = crlfPtr - buf;
wolfSSL 30:a9ecee69c6b5 508 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2) + 1); //Be sure to move NULL-terminating char as well
wolfSSL 30:a9ecee69c6b5 509 trfLen -= (crlfPos + 2);
wolfSSL 30:a9ecee69c6b5 510 DBG("Got next header(%d)[%s]", trfLen, buf) ;
wolfSSL 30:a9ecee69c6b5 511 break ;
wolfSSL 30:a9ecee69c6b5 512 } else {
wolfSSL 30:a9ecee69c6b5 513 DBG("Skipped[%s]\n", buf) ;
wolfSSL 30:a9ecee69c6b5 514 continue ;
wolfSSL 30:a9ecee69c6b5 515 }
wolfSSL 30:a9ecee69c6b5 516 }
wolfSSL 30:a9ecee69c6b5 517 continue ; // to fill out rest of buff
donatien 14:2744e0c0e527 518 }
wolfSSL 18:d89df40b4cf3 519 }
wolfSSL 18:d89df40b4cf3 520
wolfSSL 18:d89df40b4cf3 521 crlfPos = crlfPtr - buf;
wolfSSL 30:a9ecee69c6b5 522 DBG("crlfPos=%d", crlfPos) ;
wolfSSL 18:d89df40b4cf3 523 if(crlfPos == 0) { //End of headers
wolfSSL 18:d89df40b4cf3 524 DBG("Headers read");
wolfSSL 18:d89df40b4cf3 525 memmove(buf, &buf[2], trfLen - 2 + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 526 trfLen -= 2;
wolfSSL 18:d89df40b4cf3 527 break;
donatien 0:2ccb9960a044 528 }
wolfSSL 18:d89df40b4cf3 529
wolfSSL 18:d89df40b4cf3 530 buf[crlfPos] = '\0';
wolfSSL 33:77082c88748a 531 DUMP_RES_HEADER(buf) ;
wolfSSL 33:77082c88748a 532
wolfSSL 18:d89df40b4cf3 533 char key[32];
wolfSSL 18:d89df40b4cf3 534 char value[32];
wolfSSL 18:d89df40b4cf3 535
wolfSSL 18:d89df40b4cf3 536 key[31] = '\0';
wolfSSL 18:d89df40b4cf3 537 value[31] = '\0';
wolfSSL 18:d89df40b4cf3 538
wolfSSL 18:d89df40b4cf3 539 int n = sscanf(buf, "%31[^:]: %31[^\r\n]", key, value);
wolfSSL 30:a9ecee69c6b5 540 DBG("Read header(%d) : %s: %s\n", n, key, value);
wolfSSL 18:d89df40b4cf3 541 if ( n == 2 ) {
wolfSSL 30:a9ecee69c6b5 542 char *k, *v ;
wolfSSL 30:a9ecee69c6b5 543 for(k=key ; *k != '\0'; k++)*k = toupper(*k) ;
wolfSSL 30:a9ecee69c6b5 544 for(v=value ; *v != '\0'; v++)*v = toupper(*v) ;
wolfSSL 30:a9ecee69c6b5 545 if( !strcmp(key, "CONTENT-LENGTH") ) {
wolfSSL 18:d89df40b4cf3 546 sscanf(value, "%d", &recvContentLength);
wolfSSL 18:d89df40b4cf3 547 pDataIn->setDataLen(recvContentLength);
wolfSSL 30:a9ecee69c6b5 548 } else if( !strcmp(key, "TRANSFER-ENCODING") ) {
wolfSSL 30:a9ecee69c6b5 549 if( !strcmp(value, "CHUNKED") ) {
wolfSSL 18:d89df40b4cf3 550 recvChunked = true;
wolfSSL 18:d89df40b4cf3 551 pDataIn->setIsChunked(true);
wolfSSL 18:d89df40b4cf3 552 }
wolfSSL 30:a9ecee69c6b5 553 } else if( !strcmp(key, "CONTENT-TYPE") ) {
wolfSSL 18:d89df40b4cf3 554 pDataIn->setDataType(value);
wolfSSL 30:a9ecee69c6b5 555 } else if( !strcmp(key, "LOCATION") && redirect_url) {
wolfSSL 27:5d4739eae63e 556 sscanf(buf, "%31[^:]: %128[^\r\n]", key, redirect_url);
wolfSSL 27:5d4739eae63e 557 DBG("Redirect %s: %s", key, redirect_url) ;
wolfSSL 27:5d4739eae63e 558 redirect = 1 ;
wolfSSL 18:d89df40b4cf3 559 }
wolfSSL 18:d89df40b4cf3 560 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2) + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 561 trfLen -= (crlfPos + 2);
wolfSSL 30:a9ecee69c6b5 562 DBG("next header(trfLen:%d)[%s]", trfLen, buf) ;
wolfSSL 18:d89df40b4cf3 563 } else {
wolfSSL 18:d89df40b4cf3 564 ERR("Could not parse header");
donatien 14:2744e0c0e527 565 PRTCL_ERR();
donatien 0:2ccb9960a044 566 }
donatien 0:2ccb9960a044 567
donatien 0:2ccb9960a044 568 }
donatien 0:2ccb9960a044 569
wolfSSL 18:d89df40b4cf3 570 //Receive data
wolfSSL 18:d89df40b4cf3 571 DBG("Receiving data");
wolfSSL 18:d89df40b4cf3 572
wolfSSL 18:d89df40b4cf3 573 while(true) {
wolfSSL 18:d89df40b4cf3 574 size_t readLen = 0;
donatien 0:2ccb9960a044 575
wolfSSL 18:d89df40b4cf3 576 if( recvChunked ) {
wolfSSL 18:d89df40b4cf3 577 //Read chunk header
wolfSSL 18:d89df40b4cf3 578 bool foundCrlf;
wolfSSL 18:d89df40b4cf3 579 do {
wolfSSL 18:d89df40b4cf3 580 foundCrlf = false;
wolfSSL 18:d89df40b4cf3 581 crlfPos=0;
wolfSSL 18:d89df40b4cf3 582 buf[trfLen]=0;
wolfSSL 18:d89df40b4cf3 583 if(trfLen >= 2) {
wolfSSL 32:9aadb8a34e80 584 crlfPtr = strstr(buf, "\r\n") ;
wolfSSL 32:9aadb8a34e80 585 if(crlfPtr != NULL){
wolfSSL 32:9aadb8a34e80 586 foundCrlf = true;
wolfSSL 32:9aadb8a34e80 587 crlfPos = crlfPtr - buf;
wolfSSL 32:9aadb8a34e80 588 break ;
wolfSSL 32:9aadb8a34e80 589 }
wolfSSL 32:9aadb8a34e80 590 /*for(; crlfPos < trfLen - 2; crlfPos++) {
wolfSSL 18:d89df40b4cf3 591 if( buf[crlfPos] == '\r' && buf[crlfPos + 1] == '\n' ) {
wolfSSL 18:d89df40b4cf3 592 foundCrlf = true;
wolfSSL 18:d89df40b4cf3 593 break;
wolfSSL 18:d89df40b4cf3 594 }
wolfSSL 32:9aadb8a34e80 595 }*/
wolfSSL 18:d89df40b4cf3 596 }
wolfSSL 18:d89df40b4cf3 597 if(!foundCrlf) { //Try to read more
wolfSSL 18:d89df40b4cf3 598 if( trfLen < CHUNK_SIZE ) {
wolfSSL 18:d89df40b4cf3 599 size_t newTrfLen;
wolfSSL 18:d89df40b4cf3 600 ret = recv(buf + trfLen, 0, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 601 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 602 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 603 continue;
wolfSSL 18:d89df40b4cf3 604 } else {
wolfSSL 18:d89df40b4cf3 605 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 606 }
wolfSSL 18:d89df40b4cf3 607 }
wolfSSL 18:d89df40b4cf3 608 } while(!foundCrlf);
wolfSSL 18:d89df40b4cf3 609 buf[crlfPos] = '\0';
wolfSSL 32:9aadb8a34e80 610 if(((buf[crlfPos-2] == 0x0a) && (buf[crlfPos-1] == 0x0a))){
wolfSSL 32:9aadb8a34e80 611 WARN("null chunck\n") ;
wolfSSL 32:9aadb8a34e80 612 readLen = 0 ;
wolfSSL 32:9aadb8a34e80 613 } else {
wolfSSL 32:9aadb8a34e80 614 int n = sscanf(buf, "%x", &readLen);
wolfSSL 32:9aadb8a34e80 615 if(n!=1) {
wolfSSL 32:9aadb8a34e80 616 ERR("Could not read chunk length:%02x,%02x,%02x,%02x,\"%s\"",
wolfSSL 32:9aadb8a34e80 617 buf[crlfPos-4],buf[crlfPos-3],buf[crlfPos-2],buf[crlfPos-1],buf);
wolfSSL 32:9aadb8a34e80 618 PRTCL_ERR();
wolfSSL 32:9aadb8a34e80 619 }
wolfSSL 18:d89df40b4cf3 620 }
wolfSSL 18:d89df40b4cf3 621 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2)); //Not need to move NULL-terminating char any more
wolfSSL 18:d89df40b4cf3 622 trfLen -= (crlfPos + 2);
donatien 0:2ccb9960a044 623
wolfSSL 18:d89df40b4cf3 624 if( readLen == 0 ) {
wolfSSL 18:d89df40b4cf3 625 //Last chunk
wolfSSL 18:d89df40b4cf3 626 break;
wolfSSL 18:d89df40b4cf3 627 }
wolfSSL 18:d89df40b4cf3 628 } else {
wolfSSL 18:d89df40b4cf3 629 readLen = recvContentLength;
wolfSSL 18:d89df40b4cf3 630 }
wolfSSL 18:d89df40b4cf3 631
wolfSSL 18:d89df40b4cf3 632 DBG("Retrieving %d bytes", readLen);
wolfSSL 18:d89df40b4cf3 633
wolfSSL 18:d89df40b4cf3 634 do {
wolfSSL 18:d89df40b4cf3 635 pDataIn->write(buf, MIN(trfLen, readLen));
wolfSSL 18:d89df40b4cf3 636 if( trfLen > readLen ) {
wolfSSL 18:d89df40b4cf3 637 memmove(buf, &buf[readLen], trfLen - readLen);
wolfSSL 18:d89df40b4cf3 638 trfLen -= readLen;
wolfSSL 18:d89df40b4cf3 639 readLen = 0;
wolfSSL 18:d89df40b4cf3 640 } else {
wolfSSL 18:d89df40b4cf3 641 readLen -= trfLen;
wolfSSL 18:d89df40b4cf3 642 }
donatien 0:2ccb9960a044 643
wolfSSL 18:d89df40b4cf3 644 if(readLen) {
wolfSSL 18:d89df40b4cf3 645 ret = recv(buf, 1, CHUNK_SIZE - trfLen - 1, &trfLen);
wolfSSL 18:d89df40b4cf3 646 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 647 }
wolfSSL 18:d89df40b4cf3 648 } while(readLen);
wolfSSL 18:d89df40b4cf3 649
wolfSSL 18:d89df40b4cf3 650 if( recvChunked ) {
wolfSSL 18:d89df40b4cf3 651 if(trfLen < 2) {
wolfSSL 18:d89df40b4cf3 652 size_t newTrfLen;
wolfSSL 18:d89df40b4cf3 653 //Read missing chars to find end of chunk
wolfSSL 18:d89df40b4cf3 654 ret = recv(buf + trfLen, 2 - trfLen, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 655 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 656 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 657 }
wolfSSL 32:9aadb8a34e80 658 if(strcmp(buf, "\r\n") == 0) {
wolfSSL 32:9aadb8a34e80 659 WARN("Null Chunck 2\n") ;
wolfSSL 32:9aadb8a34e80 660 break ;
wolfSSL 18:d89df40b4cf3 661 }
wolfSSL 18:d89df40b4cf3 662 memmove(buf, &buf[2], trfLen - 2);
wolfSSL 18:d89df40b4cf3 663 trfLen -= 2;
wolfSSL 18:d89df40b4cf3 664 } else {
wolfSSL 18:d89df40b4cf3 665 break;
wolfSSL 18:d89df40b4cf3 666 }
wolfSSL 18:d89df40b4cf3 667
donatien 0:2ccb9960a044 668 }
wolfSSL 31:7fd621b83b60 669 wolfssl_free() ;
wolfSSL 18:d89df40b4cf3 670 m_sock.close();
wolfSSL 18:d89df40b4cf3 671 DBG("Completed HTTP transaction");
wolfSSL 27:5d4739eae63e 672 if(redirect)return HTTP_REDIRECT ;
wolfSSL 27:5d4739eae63e 673 else return HTTP_OK;
donatien 0:2ccb9960a044 674 }
donatien 0:2ccb9960a044 675
wolfSSL 19:1e2f05809eb1 676 HTTPResult HTTPClient::recv(char* buf, size_t minLen, size_t maxLen, size_t* pReadLen) //0 on success, err code on failure
donatien 0:2ccb9960a044 677 {
wolfSSL 18:d89df40b4cf3 678 DBG("Trying to read between %d and %d bytes", minLen, maxLen);
wolfSSL 18:d89df40b4cf3 679 size_t readLen = 0;
wolfSSL 28:25b5d3720bd1 680 maxLen = maxLen == 0 ? 1 : maxLen ;
wolfSSL 18:d89df40b4cf3 681 if(!m_sock.is_connected()) {
wolfSSL 18:d89df40b4cf3 682 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 683 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 18:d89df40b4cf3 684 }
wolfSSL 18:d89df40b4cf3 685
wolfSSL 18:d89df40b4cf3 686 int ret;
wolfSSL 18:d89df40b4cf3 687
wolfSSL 18:d89df40b4cf3 688 if(port == HTTPS_PORT) {
wolfSSL 31:7fd621b83b60 689 DBG("Enter wolfSSL_read") ;
wolfSSL 18:d89df40b4cf3 690
wolfSSL 18:d89df40b4cf3 691 m_sock.set_blocking(false, m_timeout);
wolfSSL 31:7fd621b83b60 692 readLen = wolfSSL_read(ssl, buf, maxLen);
wolfSSL 18:d89df40b4cf3 693 if (readLen > 0) {
wolfSSL 18:d89df40b4cf3 694 buf[readLen] = 0;
wolfSSL 31:7fd621b83b60 695 DBG("wolfSSL_read:%s\n", buf);
wolfSSL 18:d89df40b4cf3 696 } else {
wolfSSL 31:7fd621b83b60 697 ERR("wolfSSL_read, ret = %d", readLen) ;
wolfSSL 18:d89df40b4cf3 698 return HTTP_ERROR ;
wolfSSL 18:d89df40b4cf3 699 }
wolfSSL 18:d89df40b4cf3 700 DBG("Read %d bytes", readLen);
wolfSSL 18:d89df40b4cf3 701 *pReadLen = readLen;
wolfSSL 18:d89df40b4cf3 702 return HTTP_OK;
wolfSSL 18:d89df40b4cf3 703 }
wolfSSL 18:d89df40b4cf3 704
wolfSSL 18:d89df40b4cf3 705 while(readLen < maxLen) {
wolfSSL 18:d89df40b4cf3 706 if(readLen < minLen) {
wolfSSL 18:d89df40b4cf3 707 DBG("Trying to read at most %d bytes [Blocking]", minLen - readLen);
wolfSSL 18:d89df40b4cf3 708 m_sock.set_blocking(false, m_timeout);
wolfSSL 18:d89df40b4cf3 709 ret = m_sock.receive_all(buf + readLen, minLen - readLen);
wolfSSL 18:d89df40b4cf3 710 } else {
wolfSSL 18:d89df40b4cf3 711 DBG("Trying to read at most %d bytes [Not blocking]", maxLen - readLen);
wolfSSL 18:d89df40b4cf3 712 m_sock.set_blocking(false, 0);
wolfSSL 18:d89df40b4cf3 713 ret = m_sock.receive(buf + readLen, maxLen - readLen);
wolfSSL 18:d89df40b4cf3 714 }
wolfSSL 18:d89df40b4cf3 715
wolfSSL 18:d89df40b4cf3 716 if( ret > 0) {
wolfSSL 18:d89df40b4cf3 717 readLen += ret;
wolfSSL 18:d89df40b4cf3 718 } else if( ret == 0 ) {
wolfSSL 18:d89df40b4cf3 719 break;
wolfSSL 18:d89df40b4cf3 720 } else {
wolfSSL 18:d89df40b4cf3 721 if(!m_sock.is_connected()) {
wolfSSL 18:d89df40b4cf3 722 ERR("Connection error (recv returned %d)", ret);
wolfSSL 18:d89df40b4cf3 723 *pReadLen = readLen;
wolfSSL 18:d89df40b4cf3 724 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 725 } else {
wolfSSL 18:d89df40b4cf3 726 break;
wolfSSL 18:d89df40b4cf3 727 }
wolfSSL 18:d89df40b4cf3 728 }
wolfSSL 18:d89df40b4cf3 729
wolfSSL 18:d89df40b4cf3 730 if(!m_sock.is_connected()) {
wolfSSL 18:d89df40b4cf3 731 break;
wolfSSL 18:d89df40b4cf3 732 }
wolfSSL 17:c73d8e61d391 733 }
wolfSSL 17:c73d8e61d391 734 DBG("Read %d bytes", readLen);
wolfSSL 17:c73d8e61d391 735 *pReadLen = readLen;
wolfSSL 17:c73d8e61d391 736 return HTTP_OK;
donatien 7:4e39864f7b15 737 }
donatien 7:4e39864f7b15 738
wolfSSL 19:1e2f05809eb1 739 HTTPResult HTTPClient::send(char* buf, size_t len) //0 on success, err code on failure
donatien 7:4e39864f7b15 740 {
wolfSSL 18:d89df40b4cf3 741 HTTPResult ret ;
wolfSSL 18:d89df40b4cf3 742 int cp_len ;
wolfSSL 18:d89df40b4cf3 743
wolfSSL 18:d89df40b4cf3 744 if(len == 0) {
wolfSSL 18:d89df40b4cf3 745 len = strlen(buf);
wolfSSL 17:c73d8e61d391 746 }
wolfSSL 17:c73d8e61d391 747
wolfSSL 18:d89df40b4cf3 748 do {
wolfSSL 22:4b9a4151cc73 749
wolfSSL 18:d89df40b4cf3 750 if((SEND_BUF_SIZE - (send_buf_p - send_buf)) >= len) {
wolfSSL 18:d89df40b4cf3 751 cp_len = len ;
wolfSSL 18:d89df40b4cf3 752 } else {
wolfSSL 22:4b9a4151cc73 753 cp_len = SEND_BUF_SIZE - (send_buf_p - send_buf) ;
wolfSSL 18:d89df40b4cf3 754 }
wolfSSL 22:4b9a4151cc73 755 DBG("send_buf_p:%x. send_buf+SIZE:%x, len=%d, cp_len=%d", send_buf_p, send_buf+SEND_BUF_SIZE, len, cp_len) ;
wolfSSL 18:d89df40b4cf3 756 memcpy(send_buf_p, buf, cp_len) ;
wolfSSL 18:d89df40b4cf3 757 send_buf_p += cp_len ;
wolfSSL 18:d89df40b4cf3 758 len -= cp_len ;
wolfSSL 18:d89df40b4cf3 759
wolfSSL 18:d89df40b4cf3 760 if(send_buf_p == send_buf + SEND_BUF_SIZE) {
wolfSSL 30:a9ecee69c6b5 761 if(port == HTTPS_PORT) {
wolfSSL 22:4b9a4151cc73 762 ERR("HTTPClient::send buffer overflow");
wolfSSL 22:4b9a4151cc73 763 return HTTP_ERROR ;
wolfSSL 22:4b9a4151cc73 764 }
wolfSSL 18:d89df40b4cf3 765 ret = flush() ;
wolfSSL 18:d89df40b4cf3 766 if(ret)return(ret) ;
wolfSSL 18:d89df40b4cf3 767 }
wolfSSL 18:d89df40b4cf3 768 } while(len) ;
wolfSSL 18:d89df40b4cf3 769 return HTTP_OK ;
wolfSSL 17:c73d8e61d391 770 }
wolfSSL 17:c73d8e61d391 771
wolfSSL 19:1e2f05809eb1 772 HTTPResult HTTPClient::flush() //0 on success, err code on failure
wolfSSL 17:c73d8e61d391 773 {
wolfSSL 18:d89df40b4cf3 774 int len ;
wolfSSL 18:d89df40b4cf3 775 char * buf ;
wolfSSL 18:d89df40b4cf3 776
wolfSSL 18:d89df40b4cf3 777 buf = send_buf ;
wolfSSL 18:d89df40b4cf3 778 len = send_buf_p - send_buf ;
wolfSSL 18:d89df40b4cf3 779 send_buf_p = send_buf ; // reset send buffer
wolfSSL 18:d89df40b4cf3 780
wolfSSL 18:d89df40b4cf3 781 DBG("Trying to write %d bytes:%s\n", len, buf);
wolfSSL 18:d89df40b4cf3 782 size_t writtenLen = 0;
wolfSSL 18:d89df40b4cf3 783
wolfSSL 18:d89df40b4cf3 784 if(!m_sock.is_connected()) {
wolfSSL 18:d89df40b4cf3 785 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 786 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 17:c73d8e61d391 787 }
wolfSSL 18:d89df40b4cf3 788
wolfSSL 18:d89df40b4cf3 789 if(port == HTTPS_PORT) {
wolfSSL 31:7fd621b83b60 790 DBG("Enter wolfSSL_write") ;
wolfSSL 31:7fd621b83b60 791 if (wolfSSL_write(ssl, buf, len) != len) {
wolfSSL 18:d89df40b4cf3 792 ERR("SSL_write failed");
wolfSSL 18:d89df40b4cf3 793 return HTTP_ERROR ;
wolfSSL 18:d89df40b4cf3 794 }
wolfSSL 18:d89df40b4cf3 795 DBG("Written %d bytes", writtenLen);
wolfSSL 18:d89df40b4cf3 796 return HTTP_OK;
wolfSSL 18:d89df40b4cf3 797 }
wolfSSL 18:d89df40b4cf3 798 m_sock.set_blocking(false, m_timeout);
wolfSSL 18:d89df40b4cf3 799 int ret = m_sock.send_all(buf, len);
wolfSSL 18:d89df40b4cf3 800 if(ret > 0) {
wolfSSL 18:d89df40b4cf3 801 writtenLen += ret;
wolfSSL 18:d89df40b4cf3 802 } else if( ret == 0 ) {
wolfSSL 18:d89df40b4cf3 803 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 804 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 18:d89df40b4cf3 805 } else {
wolfSSL 18:d89df40b4cf3 806 ERR("Connection error (send returned %d)", ret);
wolfSSL 18:d89df40b4cf3 807 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 808 }
wolfSSL 18:d89df40b4cf3 809
wolfSSL 17:c73d8e61d391 810 DBG("Written %d bytes", writtenLen);
wolfSSL 17:c73d8e61d391 811 return HTTP_OK;
donatien 0:2ccb9960a044 812 }
donatien 0:2ccb9960a044 813
wolfSSL 19:1e2f05809eb1 814 HTTPResult HTTPClient::parseURL(const char* url, char* scheme, size_t maxSchemeLen, char* host, size_t maxHostLen, uint16_t* port, char* path, size_t maxPathLen) //Parse URL
donatien 0:2ccb9960a044 815 {
wolfSSL 18:d89df40b4cf3 816 char* schemePtr = (char*) url;
wolfSSL 18:d89df40b4cf3 817 char* hostPtr = (char*) strstr(url, "://");
wolfSSL 18:d89df40b4cf3 818 if(hostPtr == NULL) {
wolfSSL 18:d89df40b4cf3 819 WARN("Could not find host");
wolfSSL 18:d89df40b4cf3 820 return HTTP_PARSE; //URL is invalid
wolfSSL 18:d89df40b4cf3 821 }
wolfSSL 18:d89df40b4cf3 822
wolfSSL 18:d89df40b4cf3 823 if( maxSchemeLen < hostPtr - schemePtr + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 824 WARN("Scheme str is too small (%d >= %d)", maxSchemeLen, hostPtr - schemePtr + 1);
wolfSSL 18:d89df40b4cf3 825 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 826 }
wolfSSL 18:d89df40b4cf3 827 memcpy(scheme, schemePtr, hostPtr - schemePtr);
wolfSSL 18:d89df40b4cf3 828 scheme[hostPtr - schemePtr] = '\0';
donatien 0:2ccb9960a044 829
wolfSSL 18:d89df40b4cf3 830 hostPtr+=3;
donatien 0:2ccb9960a044 831
wolfSSL 18:d89df40b4cf3 832 size_t hostLen = 0;
donatien 0:2ccb9960a044 833
wolfSSL 18:d89df40b4cf3 834 char* portPtr = strchr(hostPtr, ':');
wolfSSL 18:d89df40b4cf3 835 if( portPtr != NULL ) {
wolfSSL 18:d89df40b4cf3 836 hostLen = portPtr - hostPtr;
wolfSSL 18:d89df40b4cf3 837 portPtr++;
wolfSSL 18:d89df40b4cf3 838 if( sscanf(portPtr, "%hu", port) != 1) {
wolfSSL 18:d89df40b4cf3 839 WARN("Could not find port");
wolfSSL 18:d89df40b4cf3 840 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 841 }
wolfSSL 18:d89df40b4cf3 842 } else {
wolfSSL 18:d89df40b4cf3 843 *port=0;
donatien 0:2ccb9960a044 844 }
wolfSSL 18:d89df40b4cf3 845 char* pathPtr = strchr(hostPtr, '/');
wolfSSL 18:d89df40b4cf3 846 if( hostLen == 0 ) {
wolfSSL 18:d89df40b4cf3 847 hostLen = pathPtr - hostPtr;
wolfSSL 18:d89df40b4cf3 848 }
donatien 0:2ccb9960a044 849
wolfSSL 18:d89df40b4cf3 850 if( maxHostLen < hostLen + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 851 WARN("Host str is too small (%d >= %d)", maxHostLen, hostLen + 1);
wolfSSL 18:d89df40b4cf3 852 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 853 }
wolfSSL 18:d89df40b4cf3 854 memcpy(host, hostPtr, hostLen);
wolfSSL 18:d89df40b4cf3 855 host[hostLen] = '\0';
donatien 0:2ccb9960a044 856
wolfSSL 18:d89df40b4cf3 857 size_t pathLen;
wolfSSL 18:d89df40b4cf3 858 char* fragmentPtr = strchr(hostPtr, '#');
wolfSSL 18:d89df40b4cf3 859 if(fragmentPtr != NULL) {
wolfSSL 18:d89df40b4cf3 860 pathLen = fragmentPtr - pathPtr;
wolfSSL 18:d89df40b4cf3 861 } else {
wolfSSL 18:d89df40b4cf3 862 pathLen = strlen(pathPtr);
wolfSSL 18:d89df40b4cf3 863 }
donatien 0:2ccb9960a044 864
wolfSSL 18:d89df40b4cf3 865 if( maxPathLen < pathLen + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 866 WARN("Path str is too small (%d >= %d)", maxPathLen, pathLen + 1);
wolfSSL 18:d89df40b4cf3 867 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 868 }
wolfSSL 18:d89df40b4cf3 869 memcpy(path, pathPtr, pathLen);
wolfSSL 18:d89df40b4cf3 870 path[pathLen] = '\0';
donatien 0:2ccb9960a044 871
wolfSSL 18:d89df40b4cf3 872 return HTTP_OK;
donatien 0:2ccb9960a044 873 }
wolfSSL 22:4b9a4151cc73 874
wolfSSL 22:4b9a4151cc73 875 HTTPResult HTTPClient::bAuth(void)
wolfSSL 22:4b9a4151cc73 876 {
wolfSSL 22:4b9a4151cc73 877 HTTPResult ret ;
wolfSSL 22:4b9a4151cc73 878 char b_auth[(int)((AUTHB_SIZE+3)*4/3+1)] ;
wolfSSL 22:4b9a4151cc73 879 char base64buff[AUTHB_SIZE+3] ;
wolfSSL 30:a9ecee69c6b5 880
wolfSSL 22:4b9a4151cc73 881 ret = send("Authorization: Basic ") ;
wolfSSL 33:77082c88748a 882 DUMP_REQ_HEADER("Authorization: Basic ") ;
wolfSSL 22:4b9a4151cc73 883 CHECK_CONN_ERR(ret);
wolfSSL 22:4b9a4151cc73 884 sprintf(base64buff, "%s:%s", m_basicAuthUser, m_basicAuthPassword) ;
wolfSSL 33:77082c88748a 885 DUMP_REQ_HEADER(base64buff) ;
wolfSSL 27:5d4739eae63e 886 DBG("bAuth: %s", base64buff) ;
wolfSSL 22:4b9a4151cc73 887 base64enc(b_auth, base64buff) ;
wolfSSL 22:4b9a4151cc73 888 b_auth[strlen(b_auth)+1] = '\0' ;
wolfSSL 22:4b9a4151cc73 889 b_auth[strlen(b_auth)] = '\n' ;
wolfSSL 22:4b9a4151cc73 890 DBG("b_auth:%s", b_auth) ;
wolfSSL 22:4b9a4151cc73 891 ret = send(b_auth) ;
wolfSSL 30:a9ecee69c6b5 892 CHECK_CONN_ERR(ret);
wolfSSL 22:4b9a4151cc73 893 return HTTP_OK ;
wolfSSL 22:4b9a4151cc73 894 }