Simple Xively access example with HTTPS
Dependencies: EthernetInterface HTTPClient mbed-rtos mbed
main.cpp@1:60e6225ef3e5, 2015-02-07 (annotated)
- Committer:
- wolfSSL
- Date:
- Sat Feb 07 19:29:59 2015 +0000
- Revision:
- 1:60e6225ef3e5
- Parent:
- 0:a6ee4ada0d57
Program Name changed
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
wolfSSL | 0:a6ee4ada0d57 | 1 | /* main.cpp |
wolfSSL | 0:a6ee4ada0d57 | 2 | * |
wolfSSL | 0:a6ee4ada0d57 | 3 | * Copyright (C) 2006-2014 wolfSSL Inc. |
wolfSSL | 0:a6ee4ada0d57 | 4 | * |
wolfSSL | 0:a6ee4ada0d57 | 5 | * This file is part of CyaSSL. |
wolfSSL | 0:a6ee4ada0d57 | 6 | * |
wolfSSL | 0:a6ee4ada0d57 | 7 | * CyaSSL is free software; you can redistribute it and/or modify |
wolfSSL | 0:a6ee4ada0d57 | 8 | * it under the terms of the GNU General Public License as published by |
wolfSSL | 0:a6ee4ada0d57 | 9 | * the Free Software Foundation; either version 2 of the License, or |
wolfSSL | 0:a6ee4ada0d57 | 10 | * (at your option) any later version. |
wolfSSL | 0:a6ee4ada0d57 | 11 | * |
wolfSSL | 0:a6ee4ada0d57 | 12 | * CyaSSL is distributed in the hope that it will be useful, |
wolfSSL | 0:a6ee4ada0d57 | 13 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
wolfSSL | 0:a6ee4ada0d57 | 14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
wolfSSL | 0:a6ee4ada0d57 | 15 | * GNU General Public License for more details. |
wolfSSL | 0:a6ee4ada0d57 | 16 | * |
wolfSSL | 0:a6ee4ada0d57 | 17 | * You should have received a copy of the GNU General Public License |
wolfSSL | 0:a6ee4ada0d57 | 18 | * along with this program; if not, write to the Free Software |
wolfSSL | 0:a6ee4ada0d57 | 19 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA |
wolfSSL | 0:a6ee4ada0d57 | 20 | */ |
wolfSSL | 0:a6ee4ada0d57 | 21 | |
wolfSSL | 0:a6ee4ada0d57 | 22 | #include "mbed.h" |
wolfSSL | 0:a6ee4ada0d57 | 23 | #include "EthernetInterface.h" |
wolfSSL | 0:a6ee4ada0d57 | 24 | #include "HTTPClient.h" |
wolfSSL | 0:a6ee4ada0d57 | 25 | |
wolfSSL | 1:60e6225ef3e5 | 26 | #define KEYS "https://SERVER_IP/574d76fcb/keys.txt" |
wolfSSL | 0:a6ee4ada0d57 | 27 | |
wolfSSL | 0:a6ee4ada0d57 | 28 | #define BUFFSIZE (50+1) |
wolfSSL | 0:a6ee4ada0d57 | 29 | |
wolfSSL | 0:a6ee4ada0d57 | 30 | extern void xively_main(char *feed_id, char *api_key, char *ch_name) ; |
wolfSSL | 0:a6ee4ada0d57 | 31 | |
wolfSSL | 0:a6ee4ada0d57 | 32 | extern HTTPClient http; |
wolfSSL | 0:a6ee4ada0d57 | 33 | EthernetInterface eth; |
wolfSSL | 0:a6ee4ada0d57 | 34 | |
wolfSSL | 0:a6ee4ada0d57 | 35 | void thread_main(void const *av) |
wolfSSL | 0:a6ee4ada0d57 | 36 | { |
wolfSSL | 0:a6ee4ada0d57 | 37 | int ret ; |
wolfSSL | 0:a6ee4ada0d57 | 38 | int i ; |
wolfSSL | 0:a6ee4ada0d57 | 39 | char recvBuff[BUFFSIZE*6] ; |
wolfSSL | 0:a6ee4ada0d57 | 40 | char dummy1[BUFFSIZE], dummy2[BUFFSIZE], dummy3[BUFFSIZE], dummy4[BUFFSIZE] ; |
wolfSSL | 0:a6ee4ada0d57 | 41 | char feed_id[BUFFSIZE] ; |
wolfSSL | 0:a6ee4ada0d57 | 42 | char api_key[BUFFSIZE] ; |
wolfSSL | 0:a6ee4ada0d57 | 43 | char ch_name[BUFFSIZE] ; |
wolfSSL | 0:a6ee4ada0d57 | 44 | |
wolfSSL | 0:a6ee4ada0d57 | 45 | memset(recvBuff, '\0', sizeof(recvBuff)) ; |
wolfSSL | 0:a6ee4ada0d57 | 46 | ret = http.get(KEYS, recvBuff, sizeof(recvBuff)); |
wolfSSL | 0:a6ee4ada0d57 | 47 | if (ret) { |
wolfSSL | 0:a6ee4ada0d57 | 48 | printf("Error - ret = %d - HTTP return code = %d\n", ret, http.getHTTPResponseCode()); |
wolfSSL | 0:a6ee4ada0d57 | 49 | return ; |
wolfSSL | 0:a6ee4ada0d57 | 50 | } |
wolfSSL | 0:a6ee4ada0d57 | 51 | |
wolfSSL | 0:a6ee4ada0d57 | 52 | sscanf(recvBuff, "%50s\n%50s\n%50s\n%50s\n%50s\n%50s", feed_id, api_key, |
wolfSSL | 0:a6ee4ada0d57 | 53 | dummy1, dummy2, dummy3, dummy4) ; |
wolfSSL | 0:a6ee4ada0d57 | 54 | printf("ID=%s\nKey=%s\n",feed_id, api_key) ; |
wolfSSL | 0:a6ee4ada0d57 | 55 | |
wolfSSL | 0:a6ee4ada0d57 | 56 | printf("Channel Name:") ; |
wolfSSL | 0:a6ee4ada0d57 | 57 | for(i=0; i<BUFFSIZE; i++) { |
wolfSSL | 0:a6ee4ada0d57 | 58 | if((ch_name[i] = getchar()) == '\r') { |
wolfSSL | 0:a6ee4ada0d57 | 59 | ch_name[i] = '\0' ; |
wolfSSL | 0:a6ee4ada0d57 | 60 | putchar('\n') ; |
wolfSSL | 0:a6ee4ada0d57 | 61 | break ; |
wolfSSL | 0:a6ee4ada0d57 | 62 | } else putchar(ch_name[i]) ; |
wolfSSL | 0:a6ee4ada0d57 | 63 | } |
wolfSSL | 0:a6ee4ada0d57 | 64 | |
wolfSSL | 0:a6ee4ada0d57 | 65 | xively_main(feed_id, api_key, ch_name) ; |
wolfSSL | 0:a6ee4ada0d57 | 66 | |
wolfSSL | 0:a6ee4ada0d57 | 67 | while (true) { |
wolfSSL | 0:a6ee4ada0d57 | 68 | Thread::wait(1000); |
wolfSSL | 0:a6ee4ada0d57 | 69 | } |
wolfSSL | 0:a6ee4ada0d57 | 70 | } |
wolfSSL | 0:a6ee4ada0d57 | 71 | |
wolfSSL | 0:a6ee4ada0d57 | 72 | int main() { |
wolfSSL | 0:a6ee4ada0d57 | 73 | int ret ; |
wolfSSL | 0:a6ee4ada0d57 | 74 | |
wolfSSL | 0:a6ee4ada0d57 | 75 | ret = eth.init(); //Use DHCP |
wolfSSL | 0:a6ee4ada0d57 | 76 | printf("Xively Starting,...\n") ; |
wolfSSL | 0:a6ee4ada0d57 | 77 | |
wolfSSL | 0:a6ee4ada0d57 | 78 | while(1) { |
wolfSSL | 0:a6ee4ada0d57 | 79 | ret = eth.connect(); |
wolfSSL | 0:a6ee4ada0d57 | 80 | if(ret == 0)break ; |
wolfSSL | 0:a6ee4ada0d57 | 81 | Thread::wait(100); |
wolfSSL | 0:a6ee4ada0d57 | 82 | } |
wolfSSL | 0:a6ee4ada0d57 | 83 | printf("IP = %s\n", eth.getIPAddress()); |
wolfSSL | 0:a6ee4ada0d57 | 84 | |
wolfSSL | 0:a6ee4ada0d57 | 85 | #define STACK_SIZE 20000 |
wolfSSL | 0:a6ee4ada0d57 | 86 | Thread t( thread_main, NULL, osPriorityNormal, STACK_SIZE); |
wolfSSL | 0:a6ee4ada0d57 | 87 | |
wolfSSL | 0:a6ee4ada0d57 | 88 | while(1) |
wolfSSL | 0:a6ee4ada0d57 | 89 | Thread::wait(1000) ; |
wolfSSL | 0:a6ee4ada0d57 | 90 | } |