Fork of the working HTTPClient adaptation using CyaSSL. This version adds a derivation of HTTPText called HTTPJson to emit JSON text properly. Additionally, the URL parser has defines that permit longer URLs to be utilized.

Dependencies:   mbedTLSLibrary

Dependents:   SalesforceInterface df-2014-heroku-thermostat-k64f SalesforceInterface

Fork of HTTPClient by wolf SSL

This is a fork of the working HTTPS/SSL library that contains two extensions:

- HTTPJson - a derivation of HTTPText for emitting JSON strings specifically. No JSON parsing/checking is accomplished - HTTPJson simply sets the right Content-Type for HTTP(S).

- Expanded internal buffers for longer URLs. This is set in HTTPClient.cpp and is tunable.

Committer:
sarahmarshy
Date:
Fri Jun 05 22:10:21 2015 +0000
Revision:
49:a564fc323921
Parent:
48:db30340571c9
Child:
50:a18a06b000f3
Rev

Who changed what in which revision?

UserRevisionLine numberNew contents of line
donatien 0:2ccb9960a044 1 /* HTTPClient.cpp */
donatien 10:e1351de84c16 2 /* Copyright (C) 2012 mbed.org, MIT License
donatien 10:e1351de84c16 3 *
donatien 10:e1351de84c16 4 * Permission is hereby granted, free of charge, to any person obtaining a copy of this software
donatien 10:e1351de84c16 5 * and associated documentation files (the "Software"), to deal in the Software without restriction,
donatien 10:e1351de84c16 6 * including without limitation the rights to use, copy, modify, merge, publish, distribute,
donatien 10:e1351de84c16 7 * sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is
donatien 10:e1351de84c16 8 * furnished to do so, subject to the following conditions:
donatien 10:e1351de84c16 9 *
donatien 10:e1351de84c16 10 * The above copyright notice and this permission notice shall be included in all copies or
donatien 10:e1351de84c16 11 * substantial portions of the Software.
donatien 10:e1351de84c16 12 *
donatien 10:e1351de84c16 13 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
donatien 10:e1351de84c16 14 * BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
donatien 10:e1351de84c16 15 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
donatien 10:e1351de84c16 16 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
donatien 10:e1351de84c16 17 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
donatien 10:e1351de84c16 18 */
ansond 29:2d96cc752d19 19
ansond 46:7cd69cc809b8 20 // RTOS for Thread definition
ansond 35:16f0a44cc53e 21 #include "rtos.h"
ansond 35:16f0a44cc53e 22
donatien 7:4e39864f7b15 23 //Debug is disabled by default
ansond 38:38720bd5dd16 24 #if 0
donatien 12:89d09a6db00a 25 //Enable debug
donatien 11:390362de8c3f 26 #include <cstdio>
ansond 37:29941a3bae90 27 #define DBG(x, ...) std::printf("[HTTPClient : DBG] "x"\r\n", ##__VA_ARGS__);
ansond 37:29941a3bae90 28 #define WARN(x, ...) std::printf("[HTTPClient : WARN] "x"\r\n", ##__VA_ARGS__);
ansond 37:29941a3bae90 29 #define ERR(x, ...) std::printf("[HTTPClient : ERR] "x"\r\n", ##__VA_ARGS__);
donatien 12:89d09a6db00a 30
donatien 12:89d09a6db00a 31 #else
donatien 12:89d09a6db00a 32 //Disable debug
wolfSSL 18:d89df40b4cf3 33 #define DBG(x, ...)
donatien 12:89d09a6db00a 34 #define WARN(x, ...)
wolfSSL 18:d89df40b4cf3 35 #define ERR(x, ...)
donatien 12:89d09a6db00a 36
donatien 7:4e39864f7b15 37 #endif
donatien 0:2ccb9960a044 38
donatien 0:2ccb9960a044 39 #define HTTP_PORT 80
wolfSSL 17:c73d8e61d391 40 #define HTTPS_PORT 443
donatien 0:2ccb9960a044 41
donatien 11:390362de8c3f 42 #define OK 0
donatien 11:390362de8c3f 43
donatien 11:390362de8c3f 44 #define MIN(x,y) (((x)<(y))?(x):(y))
donatien 11:390362de8c3f 45 #define MAX(x,y) (((x)>(y))?(x):(y))
donatien 11:390362de8c3f 46
wolfSSL 17:c73d8e61d391 47 #include <cstring>
donatien 0:2ccb9960a044 48
wolfSSL 17:c73d8e61d391 49 #include <../CyaSSL/cyassl/ctaocrypt/settings.h>
wolfSSL 17:c73d8e61d391 50 #include <../CyaSSL/cyassl/ctaocrypt/types.h>
wolfSSL 17:c73d8e61d391 51 #include <../CyaSSL/cyassl/internal.h>
wolfSSL 17:c73d8e61d391 52 #include <../CyaSSL/cyassl/ssl.h>
donatien 0:2ccb9960a044 53
donatien 11:390362de8c3f 54 #include "HTTPClient.h"
wolfSSL 17:c73d8e61d391 55 #include "TCPSocketConnection.h"
wolfSSL 17:c73d8e61d391 56
wolfSSL 19:1e2f05809eb1 57 static TCPSocketConnection m_sock;
ansond 40:c0a52a6bb50f 58
sarahmarshy 49:a564fc323921 59 // ************ should be a better way to adjust for platform limitations
ansond 40:c0a52a6bb50f 60
ansond 40:c0a52a6bb50f 61 #if defined (TARGET_K64F)
ansond 46:7cd69cc809b8 62 // can use larger buffers since we have (lots) more memory
ansond 46:7cd69cc809b8 63 #define BIG_MEMORY_CHUNK 4096
ansond 46:7cd69cc809b8 64 #define CHUNK_SIZE 768
ansond 46:7cd69cc809b8 65 #define SEND_BUF_SIZE BIG_MEMORY_CHUNK
ansond 46:7cd69cc809b8 66 #define MAX_URL_HOSTNAME_LENGTH 256
ansond 46:7cd69cc809b8 67 #define MAX_URL_PATH_LENGTH BIG_MEMORY_CHUNK
ansond 46:7cd69cc809b8 68 #define MAX_HEADER_VALUE_LENGTH BIG_MEMORY_CHUNK
ansond 46:7cd69cc809b8 69 #define MAX_HEADER_KEY_LENGTH 40
ansond 46:7cd69cc809b8 70 #define HEADER_SCANF_FORMAT "%40[^:]: %4096[^\r\n]" /* must align with BIG_MEMORY_CHUNK */
ansond 46:7cd69cc809b8 71 #define REDIRECT_SCANF_FORMAT "%40[^:]: %4096[^\r\n]" /* must align with BIG_MEMORY_CHUNK */
ansond 40:c0a52a6bb50f 72 #else
ansond 40:c0a52a6bb50f 73 // default smaller buffers
ansond 46:7cd69cc809b8 74 #define CHUNK_SIZE 256
ansond 46:7cd69cc809b8 75 #define SEND_BUF_SIZE 1100
ansond 46:7cd69cc809b8 76 #define MAX_URL_HOSTNAME_LENGTH 128
ansond 46:7cd69cc809b8 77 #define MAX_URL_PATH_LENGTH 128
ansond 46:7cd69cc809b8 78 #define MAX_HEADER_VALUE_LENGTH 41
ansond 46:7cd69cc809b8 79 #define MAX_HEADER_KEY_LENGTH 40
ansond 46:7cd69cc809b8 80 #define HEADER_SCANF_FORMAT "%40[^:]: %40[^\r\n]" /* must align with MAX_HEADER_VALUE_LENGTH */
ansond 46:7cd69cc809b8 81 #define REDIRECT_SCANF_FORMAT "%40[^:]: %128[^\r\n]" /* must align with MAX_URL_PATH_LENGTH */
ansond 40:c0a52a6bb50f 82 #endif
ansond 40:c0a52a6bb50f 83
ansond 40:c0a52a6bb50f 84 // ************ should be a better way to adjust for platform limitations
ansond 40:c0a52a6bb50f 85
wolfSSL 17:c73d8e61d391 86 static char send_buf[SEND_BUF_SIZE] ;
ansond 32:d9db238bb8a3 87 static char *send_buf_p = NULL;
wolfSSL 17:c73d8e61d391 88
wolfSSL 17:c73d8e61d391 89 static int SocketReceive(CYASSL* ssl, char *buf, int sz, void *ctx)
wolfSSL 17:c73d8e61d391 90 {
wolfSSL 17:c73d8e61d391 91 int n ;
wolfSSL 17:c73d8e61d391 92 int i ;
wolfSSL 18:d89df40b4cf3 93 #define RECV_RETRY 3
wolfSSL 22:4b9a4151cc73 94
wolfSSL 17:c73d8e61d391 95 for(i=0; i<RECV_RETRY; i++) {
wolfSSL 17:c73d8e61d391 96 n = m_sock.receive(buf, sz) ;
wolfSSL 17:c73d8e61d391 97 if(n >= 0)return n ;
ansond 35:16f0a44cc53e 98 Thread::wait(200) ;
wolfSSL 17:c73d8e61d391 99 }
wolfSSL 17:c73d8e61d391 100 ERR("SocketReceive:%d/%d\n", n, sz) ;
wolfSSL 17:c73d8e61d391 101 return n ;
wolfSSL 17:c73d8e61d391 102 }
wolfSSL 17:c73d8e61d391 103
wolfSSL 17:c73d8e61d391 104 static int SocketSend(CYASSL* ssl, char *buf, int sz, void *ctx)
wolfSSL 17:c73d8e61d391 105 {
wolfSSL 17:c73d8e61d391 106 int n ;
wolfSSL 22:4b9a4151cc73 107
ansond 35:16f0a44cc53e 108 Thread::wait(100) ;
wolfSSL 17:c73d8e61d391 109 n = m_sock.send(buf, sz);
wolfSSL 17:c73d8e61d391 110 if(n > 0) {
ansond 35:16f0a44cc53e 111 Thread::wait(300) ;
wolfSSL 17:c73d8e61d391 112 return n ;
wolfSSL 17:c73d8e61d391 113 } else ERR("SocketSend:%d/%d\n", n, sz);
wolfSSL 17:c73d8e61d391 114 return n ;
wolfSSL 17:c73d8e61d391 115 }
donatien 11:390362de8c3f 116
wolfSSL 22:4b9a4151cc73 117 static void base64enc(char *out, const char *in) {
wolfSSL 22:4b9a4151cc73 118 const char code[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=" ;
wolfSSL 22:4b9a4151cc73 119 int i = 0, x = 0, l = 0;
wolfSSL 22:4b9a4151cc73 120
wolfSSL 22:4b9a4151cc73 121 for (; *in; in++) {
wolfSSL 22:4b9a4151cc73 122 x = x << 8 | *in;
wolfSSL 22:4b9a4151cc73 123 for (l += 8; l >= 6; l -= 6) {
wolfSSL 22:4b9a4151cc73 124 out[i++] = code[(x >> (l - 6)) & 0x3f];
wolfSSL 22:4b9a4151cc73 125 }
wolfSSL 22:4b9a4151cc73 126 }
wolfSSL 22:4b9a4151cc73 127 if (l > 0) {
wolfSSL 22:4b9a4151cc73 128 x <<= 6 - l;
wolfSSL 22:4b9a4151cc73 129 out[i++] = code[x & 0x3f];
wolfSSL 22:4b9a4151cc73 130 }
wolfSSL 22:4b9a4151cc73 131 for (; i % 4;) {
wolfSSL 22:4b9a4151cc73 132 out[i++] = '=';
wolfSSL 22:4b9a4151cc73 133 }
wolfSSL 22:4b9a4151cc73 134 out[i] = '\0' ;
wolfSSL 22:4b9a4151cc73 135 }
wolfSSL 22:4b9a4151cc73 136
donatien 0:2ccb9960a044 137 HTTPClient::HTTPClient() :
ansond 36:debaeb6006a7 138 m_basicAuthUser(NULL), m_basicAuthPassword(NULL), m_httpResponseCode(0), m_oauthToken(NULL)
donatien 0:2ccb9960a044 139 {
ansond 37:29941a3bae90 140 // To DEBUG the underlying SSL - uncomment this...
ansond 38:38720bd5dd16 141 //CyaSSL_Debugging_ON();
wolfSSL 22:4b9a4151cc73 142
wolfSSL 18:d89df40b4cf3 143 ctx = 0 ;
wolfSSL 18:d89df40b4cf3 144 ssl = 0 ;
wolfSSL 22:4b9a4151cc73 145 SSLver = 3 ;
wolfSSL 27:5d4739eae63e 146 m_basicAuthUser = NULL ;
ansond 36:debaeb6006a7 147 m_basicAuthPassword = NULL;
ansond 36:debaeb6006a7 148 m_httpResponseCode = 0;
ansond 36:debaeb6006a7 149 m_oauthToken = NULL;
wolfSSL 27:5d4739eae63e 150 redirect_url = NULL ;
wolfSSL 27:5d4739eae63e 151 redirect = 0 ;
wolfSSL 27:5d4739eae63e 152 header = NULL ;
donatien 0:2ccb9960a044 153 }
donatien 0:2ccb9960a044 154
donatien 0:2ccb9960a044 155 HTTPClient::~HTTPClient()
donatien 0:2ccb9960a044 156 {
donatien 0:2ccb9960a044 157
donatien 0:2ccb9960a044 158 }
donatien 0:2ccb9960a044 159
ansond 36:debaeb6006a7 160 HTTPResult HTTPClient::oauthToken(const char *token) { // OAUTH2 Authentication
ansond 36:debaeb6006a7 161 // reset if called
ansond 36:debaeb6006a7 162 if (m_oauthToken != NULL) free((void *)m_oauthToken);
ansond 36:debaeb6006a7 163 m_oauthToken = NULL;
ansond 36:debaeb6006a7 164
ansond 36:debaeb6006a7 165 // fill in if able...
ansond 36:debaeb6006a7 166 if (token != NULL && strlen(token) > 0) {
ansond 36:debaeb6006a7 167 m_oauthToken = (char *)malloc(strlen(token)+1);
ansond 36:debaeb6006a7 168 memset((void *)m_oauthToken,0,strlen(token)+1);
ansond 36:debaeb6006a7 169 strcpy((char *)m_oauthToken,token);
ansond 36:debaeb6006a7 170 this->basicAuth(NULL,NULL);
ansond 36:debaeb6006a7 171 }
ansond 36:debaeb6006a7 172
ansond 36:debaeb6006a7 173 return HTTP_OK ;
ansond 36:debaeb6006a7 174 }
ansond 36:debaeb6006a7 175
wolfSSL 22:4b9a4151cc73 176 HTTPResult HTTPClient::basicAuth(const char* user, const char* password) //Basic Authentification
donatien 0:2ccb9960a044 177 {
wolfSSL 22:4b9a4151cc73 178 #define AUTHB_SIZE 128
wolfSSL 22:4b9a4151cc73 179 if((strlen(user) + strlen(password)) >= AUTHB_SIZE)
wolfSSL 22:4b9a4151cc73 180 return HTTP_ERROR ;
ansond 30:6fef375c94e6 181
ansond 30:6fef375c94e6 182 if (m_basicAuthUser) free((void *)m_basicAuthUser);
ansond 30:6fef375c94e6 183 if (user != NULL) {
ansond 30:6fef375c94e6 184 m_basicAuthUser = (char *)malloc(strlen(user)+1);
ansond 30:6fef375c94e6 185 strcpy((char *)m_basicAuthUser, user);
ansond 36:debaeb6006a7 186 this->oauthToken(NULL);
ansond 30:6fef375c94e6 187 }
ansond 30:6fef375c94e6 188
ansond 30:6fef375c94e6 189 if (m_basicAuthPassword) free((void *)m_basicAuthPassword);
ansond 30:6fef375c94e6 190 if (password != NULL) {
ansond 30:6fef375c94e6 191 m_basicAuthPassword = (char *)malloc(strlen(password)+1);
ansond 30:6fef375c94e6 192 strcpy((char *)m_basicAuthPassword, password);
ansond 36:debaeb6006a7 193 this->oauthToken(NULL);
ansond 30:6fef375c94e6 194 }
ansond 30:6fef375c94e6 195
wolfSSL 22:4b9a4151cc73 196 return HTTP_OK ;
donatien 0:2ccb9960a044 197 }
donatien 0:2ccb9960a044 198
donatien 12:89d09a6db00a 199 HTTPResult HTTPClient::get(const char* url, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 200 {
wolfSSL 18:d89df40b4cf3 201 return connect(url, HTTP_GET, NULL, pDataIn, timeout);
donatien 0:2ccb9960a044 202 }
donatien 0:2ccb9960a044 203
donatien 12:89d09a6db00a 204 HTTPResult HTTPClient::get(const char* url, char* result, size_t maxResultLen, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 205 {
wolfSSL 18:d89df40b4cf3 206 HTTPText str(result, maxResultLen);
wolfSSL 18:d89df40b4cf3 207 return get(url, &str, timeout);
donatien 0:2ccb9960a044 208 }
donatien 0:2ccb9960a044 209
donatien 12:89d09a6db00a 210 HTTPResult HTTPClient::post(const char* url, const IHTTPDataOut& dataOut, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 0:2ccb9960a044 211 {
wolfSSL 18:d89df40b4cf3 212 return connect(url, HTTP_POST, (IHTTPDataOut*)&dataOut, pDataIn, timeout);
donatien 0:2ccb9960a044 213 }
donatien 0:2ccb9960a044 214
donatien 16:1f743885e7de 215 HTTPResult HTTPClient::put(const char* url, const IHTTPDataOut& dataOut, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 16:1f743885e7de 216 {
wolfSSL 18:d89df40b4cf3 217 return connect(url, HTTP_PUT, (IHTTPDataOut*)&dataOut, pDataIn, timeout);
donatien 16:1f743885e7de 218 }
donatien 16:1f743885e7de 219
donatien 16:1f743885e7de 220 HTTPResult HTTPClient::del(const char* url, IHTTPDataIn* pDataIn, int timeout /*= HTTP_CLIENT_DEFAULT_TIMEOUT*/) //Blocking
donatien 16:1f743885e7de 221 {
wolfSSL 18:d89df40b4cf3 222 return connect(url, HTTP_DELETE, NULL, pDataIn, timeout);
donatien 16:1f743885e7de 223 }
donatien 16:1f743885e7de 224
donatien 16:1f743885e7de 225
donatien 0:2ccb9960a044 226 int HTTPClient::getHTTPResponseCode()
donatien 0:2ccb9960a044 227 {
wolfSSL 18:d89df40b4cf3 228 return m_httpResponseCode;
donatien 0:2ccb9960a044 229 }
donatien 0:2ccb9960a044 230
wolfSSL 27:5d4739eae63e 231 void HTTPClient::setHeader(const char * h)
wolfSSL 17:c73d8e61d391 232 {
wolfSSL 17:c73d8e61d391 233 header = h ;
wolfSSL 17:c73d8e61d391 234 }
wolfSSL 17:c73d8e61d391 235
wolfSSL 27:5d4739eae63e 236 void HTTPClient::setLocationBuf(char * url, int size)
wolfSSL 27:5d4739eae63e 237 {
wolfSSL 27:5d4739eae63e 238 redirect_url = url ;
wolfSSL 27:5d4739eae63e 239 redirect_url_size = size ;
wolfSSL 27:5d4739eae63e 240 }
wolfSSL 27:5d4739eae63e 241
wolfSSL 22:4b9a4151cc73 242 HTTPResult HTTPClient::setSSLversion(int minorV)
wolfSSL 22:4b9a4151cc73 243 {
wolfSSL 22:4b9a4151cc73 244 if((minorV>=0) && (minorV<=3))
wolfSSL 22:4b9a4151cc73 245 SSLver = minorV ;
wolfSSL 22:4b9a4151cc73 246 else return HTTP_ERROR ;
wolfSSL 22:4b9a4151cc73 247 return HTTP_OK ;
wolfSSL 22:4b9a4151cc73 248 }
wolfSSL 22:4b9a4151cc73 249
wolfSSL 17:c73d8e61d391 250
donatien 5:791fc3dcb6c4 251 #define CHECK_CONN_ERR(ret) \
donatien 5:791fc3dcb6c4 252 do{ \
donatien 7:4e39864f7b15 253 if(ret) { \
wolfSSL 17:c73d8e61d391 254 cyassl_free() ;\
donatien 7:4e39864f7b15 255 m_sock.close(); \
donatien 5:791fc3dcb6c4 256 ERR("Connection error (%d)", ret); \
donatien 11:390362de8c3f 257 return HTTP_CONN; \
donatien 5:791fc3dcb6c4 258 } \
donatien 5:791fc3dcb6c4 259 } while(0)
donatien 5:791fc3dcb6c4 260
donatien 5:791fc3dcb6c4 261 #define PRTCL_ERR() \
donatien 5:791fc3dcb6c4 262 do{ \
wolfSSL 17:c73d8e61d391 263 cyassl_free() ;\
donatien 7:4e39864f7b15 264 m_sock.close(); \
donatien 5:791fc3dcb6c4 265 ERR("Protocol error"); \
donatien 11:390362de8c3f 266 return HTTP_PRTCL; \
donatien 5:791fc3dcb6c4 267 } while(0)
donatien 0:2ccb9960a044 268
wolfSSL 17:c73d8e61d391 269 void HTTPClient::cyassl_free(void)
wolfSSL 17:c73d8e61d391 270 {
wolfSSL 19:1e2f05809eb1 271 if(ssl) {
wolfSSL 17:c73d8e61d391 272 CyaSSL_free(ssl) ;
wolfSSL 19:1e2f05809eb1 273 ssl = NULL ;
wolfSSL 19:1e2f05809eb1 274 }
wolfSSL 19:1e2f05809eb1 275 if(ctx) {
wolfSSL 17:c73d8e61d391 276 CyaSSL_CTX_free(ctx) ;
wolfSSL 19:1e2f05809eb1 277 ctx = NULL ;
wolfSSL 19:1e2f05809eb1 278 }
wolfSSL 22:4b9a4151cc73 279 CyaSSL_Cleanup() ;
wolfSSL 22:4b9a4151cc73 280 }
wolfSSL 17:c73d8e61d391 281
donatien 12:89d09a6db00a 282 HTTPResult HTTPClient::connect(const char* url, HTTP_METH method, IHTTPDataOut* pDataOut, IHTTPDataIn* pDataIn, int timeout) //Execute request
wolfSSL 18:d89df40b4cf3 283 {
ansond 46:7cd69cc809b8 284 CYASSL_METHOD * SSLmethod = NULL;
wolfSSL 18:d89df40b4cf3 285 m_httpResponseCode = 0; //Invalidate code
wolfSSL 18:d89df40b4cf3 286 m_timeout = timeout;
wolfSSL 27:5d4739eae63e 287 redirect = 0 ;
wolfSSL 27:5d4739eae63e 288
ansond 46:7cd69cc809b8 289 // reset the send buffer
ansond 46:7cd69cc809b8 290 memset(send_buf,0,SEND_BUF_SIZE);
ansond 46:7cd69cc809b8 291
wolfSSL 18:d89df40b4cf3 292 pDataIn->writeReset();
wolfSSL 18:d89df40b4cf3 293 if( pDataOut ) {
wolfSSL 18:d89df40b4cf3 294 pDataOut->readReset();
wolfSSL 18:d89df40b4cf3 295 }
wolfSSL 17:c73d8e61d391 296
wolfSSL 18:d89df40b4cf3 297 char scheme[8];
ansond 29:2d96cc752d19 298 char host[MAX_URL_HOSTNAME_LENGTH];
ansond 29:2d96cc752d19 299 char path[MAX_URL_PATH_LENGTH];
wolfSSL 18:d89df40b4cf3 300
wolfSSL 18:d89df40b4cf3 301 int ret ;
donatien 0:2ccb9960a044 302
wolfSSL 18:d89df40b4cf3 303 //First we need to parse the url (http[s]://host[:port][/[path]])
wolfSSL 18:d89df40b4cf3 304 HTTPResult res = parseURL(url, scheme, sizeof(scheme), host, sizeof(host), &port, path, sizeof(path));
wolfSSL 18:d89df40b4cf3 305 if(res != HTTP_OK) {
wolfSSL 18:d89df40b4cf3 306 ERR("parseURL returned %d", res);
wolfSSL 18:d89df40b4cf3 307 return res;
wolfSSL 18:d89df40b4cf3 308 }
donatien 0:2ccb9960a044 309
wolfSSL 22:4b9a4151cc73 310 if(port == 0) {
wolfSSL 18:d89df40b4cf3 311 if(strcmp(scheme, "http") == 0)
wolfSSL 18:d89df40b4cf3 312 port = HTTP_PORT ;
wolfSSL 18:d89df40b4cf3 313 else if(strcmp(scheme, "https") == 0)
wolfSSL 18:d89df40b4cf3 314 port = HTTPS_PORT ;
wolfSSL 18:d89df40b4cf3 315 }
donatien 0:2ccb9960a044 316
wolfSSL 18:d89df40b4cf3 317 DBG("Scheme: %s", scheme);
wolfSSL 18:d89df40b4cf3 318 DBG("Host: %s", host);
wolfSSL 18:d89df40b4cf3 319 DBG("Port: %d", port);
wolfSSL 18:d89df40b4cf3 320 DBG("Path: %s", path);
wolfSSL 17:c73d8e61d391 321
wolfSSL 18:d89df40b4cf3 322 //Connect
wolfSSL 18:d89df40b4cf3 323 DBG("Connecting socket to server");
wolfSSL 18:d89df40b4cf3 324
wolfSSL 18:d89df40b4cf3 325 #define MAX_RETRY 5
wolfSSL 18:d89df40b4cf3 326 int retry ;
donatien 0:2ccb9960a044 327
wolfSSL 18:d89df40b4cf3 328 for(retry=0; retry<MAX_RETRY; retry++) {
wolfSSL 18:d89df40b4cf3 329 int ret = m_sock.connect(host, port);
wolfSSL 18:d89df40b4cf3 330 if(ret == 0)break ;
wolfSSL 17:c73d8e61d391 331 }
wolfSSL 18:d89df40b4cf3 332 if(retry == MAX_RETRY) {
wolfSSL 18:d89df40b4cf3 333 m_sock.close();
wolfSSL 18:d89df40b4cf3 334 ERR("Could not connect");
wolfSSL 18:d89df40b4cf3 335 return HTTP_CONN;
wolfSSL 17:c73d8e61d391 336 }
wolfSSL 17:c73d8e61d391 337
wolfSSL 18:d89df40b4cf3 338 if(port == HTTPS_PORT) {
wolfSSL 22:4b9a4151cc73 339
wolfSSL 18:d89df40b4cf3 340 /* Start SSL connect */
wolfSSL 27:5d4739eae63e 341 DBG("SSLver=%d", SSLver) ;
wolfSSL 19:1e2f05809eb1 342 if(ctx == NULL) {
wolfSSL 22:4b9a4151cc73 343 switch(SSLver) {
wolfSSL 22:4b9a4151cc73 344 case 0 : SSLmethod = CyaSSLv3_client_method() ; break ;
wolfSSL 22:4b9a4151cc73 345 case 1 : SSLmethod = CyaTLSv1_client_method() ; break ;
wolfSSL 22:4b9a4151cc73 346 case 2 : SSLmethod = CyaTLSv1_1_client_method() ; break ;
wolfSSL 22:4b9a4151cc73 347 case 3 : SSLmethod = CyaTLSv1_2_client_method() ; break ;
wolfSSL 22:4b9a4151cc73 348 }
wolfSSL 22:4b9a4151cc73 349 ctx = CyaSSL_CTX_new((CYASSL_METHOD *)SSLmethod);
wolfSSL 19:1e2f05809eb1 350 if (ctx == NULL) {
wolfSSL 19:1e2f05809eb1 351 ERR("unable to get ctx");
wolfSSL 19:1e2f05809eb1 352 return HTTP_CONN;
wolfSSL 19:1e2f05809eb1 353 }
wolfSSL 19:1e2f05809eb1 354 CyaSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0);
wolfSSL 19:1e2f05809eb1 355 CyaSSL_SetIORecv(ctx, SocketReceive) ;
wolfSSL 19:1e2f05809eb1 356 CyaSSL_SetIOSend(ctx, SocketSend) ;
wolfSSL 18:d89df40b4cf3 357 }
wolfSSL 18:d89df40b4cf3 358 if (ssl == NULL) {
wolfSSL 19:1e2f05809eb1 359 ssl = CyaSSL_new(ctx);
wolfSSL 19:1e2f05809eb1 360 if (ssl == NULL) {
wolfSSL 19:1e2f05809eb1 361 ERR("unable to get SSL object");
wolfSSL 19:1e2f05809eb1 362 cyassl_free() ;
wolfSSL 19:1e2f05809eb1 363 return HTTP_CONN;
wolfSSL 19:1e2f05809eb1 364 }
wolfSSL 18:d89df40b4cf3 365 }
ansond 33:b663a5bab72d 366
ansond 37:29941a3bae90 367 DBG("ctx=%x, ssl=%x, ssl->ctx->CBIORecv, CBIOSend=%x, %x\n",ctx, ssl, SocketReceive, SocketSend ) ;
ansond 33:b663a5bab72d 368 int result = CyaSSL_connect(ssl);
ansond 33:b663a5bab72d 369 if (result != SSL_SUCCESS) {
wolfSSL 18:d89df40b4cf3 370 ERR("SSL_connect failed");
ansond 33:b663a5bab72d 371 int err = CyaSSL_get_error(ssl, result);
ansond 33:b663a5bab72d 372 char errorString[80];
ansond 33:b663a5bab72d 373 CyaSSL_ERR_error_string(err, errorString);
ansond 33:b663a5bab72d 374 ERR("SSL Error: %s (err=%d,status=%d)",errorString,err,result);
wolfSSL 18:d89df40b4cf3 375 cyassl_free() ;
wolfSSL 18:d89df40b4cf3 376 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 377 }
wolfSSL 18:d89df40b4cf3 378 } /* SSL connect complete */
donatien 0:2ccb9960a044 379
wolfSSL 18:d89df40b4cf3 380 //Send request
wolfSSL 18:d89df40b4cf3 381 DBG("Sending request");
wolfSSL 18:d89df40b4cf3 382 char buf[CHUNK_SIZE];
ansond 30:6fef375c94e6 383 memset(buf,0,CHUNK_SIZE);
wolfSSL 18:d89df40b4cf3 384 send_buf_p = send_buf ; // Reset send buffer ;
wolfSSL 18:d89df40b4cf3 385
wolfSSL 18:d89df40b4cf3 386 const char* meth = (method==HTTP_GET)?"GET":(method==HTTP_POST)?"POST":(method==HTTP_PUT)?"PUT":(method==HTTP_DELETE)?"DELETE":"";
ansond 31:0675a342e45c 387 snprintf(buf, sizeof(buf), "%s %s HTTP/1.1\r\nHost: %s\r\nConnection: keep-alive\r\n", meth, path, host); //Write request
wolfSSL 18:d89df40b4cf3 388 ret = send(buf);
wolfSSL 18:d89df40b4cf3 389 if(ret) {
wolfSSL 18:d89df40b4cf3 390 m_sock.close();
wolfSSL 18:d89df40b4cf3 391 ERR("Could not write request");
wolfSSL 18:d89df40b4cf3 392 return HTTP_CONN;
donatien 0:2ccb9960a044 393 }
wolfSSL 17:c73d8e61d391 394
wolfSSL 18:d89df40b4cf3 395 //Send all headers
donatien 0:2ccb9960a044 396
wolfSSL 18:d89df40b4cf3 397 //Send default headers
wolfSSL 18:d89df40b4cf3 398 DBG("Sending headers");
ansond 31:0675a342e45c 399 if(m_basicAuthUser && m_basicAuthPassword) {
ansond 36:debaeb6006a7 400 DBG("Sending basic auth header");
ansond 36:debaeb6006a7 401 bAuth() ; /* send out Basic Auth header */
ansond 36:debaeb6006a7 402 }
ansond 36:debaeb6006a7 403 else if (m_oauthToken) {
ansond 36:debaeb6006a7 404 DBG("Sending OAUTH header");
ansond 36:debaeb6006a7 405 tokenAuth(); /* send out OAUTH header */
wolfSSL 27:5d4739eae63e 406 }
wolfSSL 18:d89df40b4cf3 407 if( pDataOut != NULL ) {
wolfSSL 18:d89df40b4cf3 408 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 409 ret = send("Transfer-Encoding: chunked\r\n");
wolfSSL 18:d89df40b4cf3 410 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 411 } else {
wolfSSL 18:d89df40b4cf3 412 snprintf(buf, sizeof(buf), "Content-Length: %d\r\n", pDataOut->getDataLen());
wolfSSL 22:4b9a4151cc73 413 DBG("Content buf:%s", buf) ;
wolfSSL 18:d89df40b4cf3 414 ret = send(buf);
wolfSSL 18:d89df40b4cf3 415 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 416 }
wolfSSL 18:d89df40b4cf3 417 char type[48];
wolfSSL 18:d89df40b4cf3 418 if( pDataOut->getDataType(type, 48) == HTTP_OK ) {
wolfSSL 18:d89df40b4cf3 419 snprintf(buf, sizeof(buf), "Content-Type: %s\r\n", type);
wolfSSL 18:d89df40b4cf3 420 ret = send(buf);
wolfSSL 18:d89df40b4cf3 421 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 422 }
wolfSSL 18:d89df40b4cf3 423 }
wolfSSL 18:d89df40b4cf3 424
wolfSSL 18:d89df40b4cf3 425 //Add user headers
wolfSSL 18:d89df40b4cf3 426 if(header) {
wolfSSL 27:5d4739eae63e 427 ret = send((char *)header);
donatien 5:791fc3dcb6c4 428 CHECK_CONN_ERR(ret);
donatien 0:2ccb9960a044 429 }
donatien 0:2ccb9960a044 430
wolfSSL 18:d89df40b4cf3 431 //Close headers
wolfSSL 18:d89df40b4cf3 432 DBG("Headers sent");
wolfSSL 18:d89df40b4cf3 433 ret = send("\r\n");
wolfSSL 18:d89df40b4cf3 434 CHECK_CONN_ERR(ret);
wolfSSL 17:c73d8e61d391 435
wolfSSL 18:d89df40b4cf3 436 size_t trfLen;
donatien 0:2ccb9960a044 437
wolfSSL 18:d89df40b4cf3 438 //Send data (if available)
wolfSSL 18:d89df40b4cf3 439 if( pDataOut != NULL ) {
wolfSSL 18:d89df40b4cf3 440 DBG("Sending data");
wolfSSL 18:d89df40b4cf3 441 while(true) {
wolfSSL 18:d89df40b4cf3 442 size_t writtenLen = 0;
wolfSSL 18:d89df40b4cf3 443 pDataOut->read(buf, CHUNK_SIZE, &trfLen);
wolfSSL 18:d89df40b4cf3 444 buf[trfLen] = 0x0 ;
wolfSSL 18:d89df40b4cf3 445 DBG("buf:%s", buf) ;
wolfSSL 18:d89df40b4cf3 446 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 447 //Write chunk header
wolfSSL 22:4b9a4151cc73 448 char chunkHeader[64];
wolfSSL 18:d89df40b4cf3 449 snprintf(chunkHeader, sizeof(chunkHeader), "%X\r\n", trfLen); //In hex encoding
wolfSSL 18:d89df40b4cf3 450 ret = send(chunkHeader);
wolfSSL 18:d89df40b4cf3 451 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 452 } else if( trfLen == 0 ) {
wolfSSL 22:4b9a4151cc73 453 DBG("trfLen==0") ;
wolfSSL 18:d89df40b4cf3 454 break;
wolfSSL 18:d89df40b4cf3 455 }
wolfSSL 22:4b9a4151cc73 456 DBG("trfLen 1=%d", trfLen) ;
wolfSSL 18:d89df40b4cf3 457 if( trfLen != 0 ) {
wolfSSL 22:4b9a4151cc73 458 DBG("Sending 1") ;
wolfSSL 18:d89df40b4cf3 459 ret = send(buf, trfLen);
wolfSSL 22:4b9a4151cc73 460 DBG("Sent 1") ;
wolfSSL 18:d89df40b4cf3 461 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 462 }
donatien 0:2ccb9960a044 463
wolfSSL 18:d89df40b4cf3 464 if( pDataOut->getIsChunked() ) {
wolfSSL 18:d89df40b4cf3 465 ret = send("\r\n"); //Chunk-terminating CRLF
wolfSSL 18:d89df40b4cf3 466 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 467 } else {
wolfSSL 18:d89df40b4cf3 468 writtenLen += trfLen;
wolfSSL 18:d89df40b4cf3 469 if( writtenLen >= pDataOut->getDataLen() ) {
wolfSSL 22:4b9a4151cc73 470 DBG("writtenLen=%d", writtenLen) ;
wolfSSL 18:d89df40b4cf3 471 break;
wolfSSL 18:d89df40b4cf3 472 }
wolfSSL 22:4b9a4151cc73 473 DBG("writtenLen+=trfLen = %d", writtenLen) ;
wolfSSL 18:d89df40b4cf3 474 }
wolfSSL 22:4b9a4151cc73 475 DBG("trfLen 2=%d", trfLen) ;
wolfSSL 18:d89df40b4cf3 476 if( trfLen == 0 ) {
wolfSSL 22:4b9a4151cc73 477 DBG("trfLen == 0") ;
wolfSSL 18:d89df40b4cf3 478 break;
wolfSSL 18:d89df40b4cf3 479 }
wolfSSL 18:d89df40b4cf3 480 }
donatien 0:2ccb9960a044 481
wolfSSL 18:d89df40b4cf3 482 }
wolfSSL 18:d89df40b4cf3 483 ret = flush() ; // flush the send buffer ;
wolfSSL 18:d89df40b4cf3 484 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 485
wolfSSL 18:d89df40b4cf3 486 //Receive response
wolfSSL 18:d89df40b4cf3 487 DBG("Receiving response");
wolfSSL 18:d89df40b4cf3 488
wolfSSL 18:d89df40b4cf3 489 ret = recv(buf, CHUNK_SIZE - 1, CHUNK_SIZE - 1, &trfLen); //Read n bytes
wolfSSL 18:d89df40b4cf3 490 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 491
wolfSSL 18:d89df40b4cf3 492 buf[trfLen] = '\0';
wolfSSL 18:d89df40b4cf3 493
wolfSSL 18:d89df40b4cf3 494 char* crlfPtr = strstr(buf, "\r\n");
wolfSSL 18:d89df40b4cf3 495 if(crlfPtr == NULL) {
donatien 5:791fc3dcb6c4 496 PRTCL_ERR();
donatien 0:2ccb9960a044 497 }
donatien 0:2ccb9960a044 498
wolfSSL 18:d89df40b4cf3 499 int crlfPos = crlfPtr - buf;
donatien 0:2ccb9960a044 500 buf[crlfPos] = '\0';
donatien 0:2ccb9960a044 501
wolfSSL 18:d89df40b4cf3 502 //Parse HTTP response
wolfSSL 18:d89df40b4cf3 503 if( sscanf(buf, "HTTP/%*d.%*d %d %*[^\r\n]", &m_httpResponseCode) != 1 ) {
wolfSSL 18:d89df40b4cf3 504 //Cannot match string, error
wolfSSL 18:d89df40b4cf3 505 ERR("Not a correct HTTP answer : %s\n", buf);
wolfSSL 18:d89df40b4cf3 506 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 507 }
donatien 4:c071b05ac026 508
wolfSSL 27:5d4739eae63e 509 if( (m_httpResponseCode < 200) || (m_httpResponseCode >= 400) ) {
wolfSSL 18:d89df40b4cf3 510 //Did not return a 2xx code; TODO fetch headers/(&data?) anyway and implement a mean of writing/reading headers
wolfSSL 18:d89df40b4cf3 511 WARN("Response code %d", m_httpResponseCode);
wolfSSL 18:d89df40b4cf3 512 PRTCL_ERR();
donatien 0:2ccb9960a044 513 }
donatien 0:2ccb9960a044 514
wolfSSL 18:d89df40b4cf3 515 DBG("Reading headers");
donatien 0:2ccb9960a044 516
wolfSSL 18:d89df40b4cf3 517 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2) + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 518 trfLen -= (crlfPos + 2);
donatien 0:2ccb9960a044 519
wolfSSL 18:d89df40b4cf3 520 size_t recvContentLength = 0;
wolfSSL 18:d89df40b4cf3 521 bool recvChunked = false;
wolfSSL 18:d89df40b4cf3 522 //Now get headers
wolfSSL 18:d89df40b4cf3 523 while( true ) {
wolfSSL 18:d89df40b4cf3 524 crlfPtr = strstr(buf, "\r\n");
wolfSSL 18:d89df40b4cf3 525 if(crlfPtr == NULL) {
wolfSSL 18:d89df40b4cf3 526 if( trfLen < CHUNK_SIZE - 1 ) {
ansond 30:6fef375c94e6 527 size_t newTrfLen = 0;
wolfSSL 18:d89df40b4cf3 528 ret = recv(buf + trfLen, 1, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 529 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 530 buf[trfLen] = '\0';
wolfSSL 18:d89df40b4cf3 531 DBG("Read %d chars; In buf: [%s]", newTrfLen, buf);
wolfSSL 18:d89df40b4cf3 532 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 533 continue;
wolfSSL 18:d89df40b4cf3 534 } else {
wolfSSL 18:d89df40b4cf3 535 PRTCL_ERR();
donatien 14:2744e0c0e527 536 }
wolfSSL 18:d89df40b4cf3 537 }
wolfSSL 18:d89df40b4cf3 538
wolfSSL 18:d89df40b4cf3 539 crlfPos = crlfPtr - buf;
wolfSSL 18:d89df40b4cf3 540
wolfSSL 18:d89df40b4cf3 541 if(crlfPos == 0) { //End of headers
wolfSSL 18:d89df40b4cf3 542 DBG("Headers read");
wolfSSL 18:d89df40b4cf3 543 memmove(buf, &buf[2], trfLen - 2 + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 544 trfLen -= 2;
wolfSSL 18:d89df40b4cf3 545 break;
donatien 0:2ccb9960a044 546 }
wolfSSL 18:d89df40b4cf3 547
wolfSSL 18:d89df40b4cf3 548 buf[crlfPos] = '\0';
wolfSSL 18:d89df40b4cf3 549
ansond 46:7cd69cc809b8 550 char key[MAX_HEADER_KEY_LENGTH+1];
ansond 46:7cd69cc809b8 551 memset(key,0,MAX_HEADER_KEY_LENGTH+1);
ansond 46:7cd69cc809b8 552
ansond 46:7cd69cc809b8 553 char value[MAX_HEADER_VALUE_LENGTH+1];
ansond 46:7cd69cc809b8 554 memset(value,0,MAX_HEADER_VALUE_LENGTH+1);
ansond 46:7cd69cc809b8 555
ansond 46:7cd69cc809b8 556 int n = sscanf(buf, HEADER_SCANF_FORMAT, key, value);
wolfSSL 18:d89df40b4cf3 557 if ( n == 2 ) {
wolfSSL 18:d89df40b4cf3 558 DBG("Read header : %s: %s\n", key, value);
wolfSSL 18:d89df40b4cf3 559 if( !strcmp(key, "Content-Length") ) {
wolfSSL 18:d89df40b4cf3 560 sscanf(value, "%d", &recvContentLength);
wolfSSL 18:d89df40b4cf3 561 pDataIn->setDataLen(recvContentLength);
wolfSSL 18:d89df40b4cf3 562 } else if( !strcmp(key, "Transfer-Encoding") ) {
wolfSSL 18:d89df40b4cf3 563 if( !strcmp(value, "Chunked") || !strcmp(value, "chunked") ) {
wolfSSL 18:d89df40b4cf3 564 recvChunked = true;
wolfSSL 18:d89df40b4cf3 565 pDataIn->setIsChunked(true);
wolfSSL 18:d89df40b4cf3 566 }
wolfSSL 18:d89df40b4cf3 567 } else if( !strcmp(key, "Content-Type") ) {
wolfSSL 18:d89df40b4cf3 568 pDataIn->setDataType(value);
ansond 46:7cd69cc809b8 569 } else if( !strcmp(key, "Location") && redirect_url) { // Location is capitalized...
ansond 46:7cd69cc809b8 570 sscanf(buf, REDIRECT_SCANF_FORMAT, key, redirect_url);
wolfSSL 27:5d4739eae63e 571 DBG("Redirect %s: %s", key, redirect_url) ;
wolfSSL 27:5d4739eae63e 572 redirect = 1 ;
wolfSSL 18:d89df40b4cf3 573 }
wolfSSL 18:d89df40b4cf3 574 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2) + 1); //Be sure to move NULL-terminating char as well
wolfSSL 18:d89df40b4cf3 575 trfLen -= (crlfPos + 2);
wolfSSL 18:d89df40b4cf3 576
wolfSSL 18:d89df40b4cf3 577 } else {
wolfSSL 18:d89df40b4cf3 578 ERR("Could not parse header");
donatien 14:2744e0c0e527 579 PRTCL_ERR();
donatien 0:2ccb9960a044 580 }
donatien 0:2ccb9960a044 581
donatien 0:2ccb9960a044 582 }
donatien 0:2ccb9960a044 583
wolfSSL 18:d89df40b4cf3 584 //Receive data
wolfSSL 18:d89df40b4cf3 585 DBG("Receiving data");
wolfSSL 18:d89df40b4cf3 586
wolfSSL 18:d89df40b4cf3 587 while(true) {
wolfSSL 18:d89df40b4cf3 588 size_t readLen = 0;
donatien 0:2ccb9960a044 589
wolfSSL 18:d89df40b4cf3 590 if( recvChunked ) {
wolfSSL 18:d89df40b4cf3 591 //Read chunk header
wolfSSL 18:d89df40b4cf3 592 bool foundCrlf;
wolfSSL 18:d89df40b4cf3 593 do {
wolfSSL 18:d89df40b4cf3 594 foundCrlf = false;
wolfSSL 18:d89df40b4cf3 595 crlfPos=0;
wolfSSL 18:d89df40b4cf3 596 buf[trfLen]=0;
wolfSSL 18:d89df40b4cf3 597 if(trfLen >= 2) {
wolfSSL 18:d89df40b4cf3 598 for(; crlfPos < trfLen - 2; crlfPos++) {
wolfSSL 18:d89df40b4cf3 599 if( buf[crlfPos] == '\r' && buf[crlfPos + 1] == '\n' ) {
wolfSSL 18:d89df40b4cf3 600 foundCrlf = true;
wolfSSL 18:d89df40b4cf3 601 break;
wolfSSL 18:d89df40b4cf3 602 }
wolfSSL 18:d89df40b4cf3 603 }
wolfSSL 18:d89df40b4cf3 604 }
wolfSSL 18:d89df40b4cf3 605 if(!foundCrlf) { //Try to read more
wolfSSL 18:d89df40b4cf3 606 if( trfLen < CHUNK_SIZE ) {
ansond 30:6fef375c94e6 607 size_t newTrfLen = 0;
wolfSSL 18:d89df40b4cf3 608 ret = recv(buf + trfLen, 0, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 609 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 610 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 611 continue;
wolfSSL 18:d89df40b4cf3 612 } else {
wolfSSL 18:d89df40b4cf3 613 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 614 }
wolfSSL 18:d89df40b4cf3 615 }
wolfSSL 18:d89df40b4cf3 616 } while(!foundCrlf);
wolfSSL 18:d89df40b4cf3 617 buf[crlfPos] = '\0';
wolfSSL 18:d89df40b4cf3 618 int n = sscanf(buf, "%x", &readLen);
wolfSSL 18:d89df40b4cf3 619 if(n!=1) {
wolfSSL 18:d89df40b4cf3 620 ERR("Could not read chunk length");
wolfSSL 18:d89df40b4cf3 621 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 622 }
wolfSSL 18:d89df40b4cf3 623
wolfSSL 18:d89df40b4cf3 624 memmove(buf, &buf[crlfPos+2], trfLen - (crlfPos + 2)); //Not need to move NULL-terminating char any more
wolfSSL 18:d89df40b4cf3 625 trfLen -= (crlfPos + 2);
donatien 0:2ccb9960a044 626
wolfSSL 18:d89df40b4cf3 627 if( readLen == 0 ) {
wolfSSL 18:d89df40b4cf3 628 //Last chunk
wolfSSL 18:d89df40b4cf3 629 break;
wolfSSL 18:d89df40b4cf3 630 }
wolfSSL 18:d89df40b4cf3 631 } else {
wolfSSL 18:d89df40b4cf3 632 readLen = recvContentLength;
wolfSSL 18:d89df40b4cf3 633 }
wolfSSL 18:d89df40b4cf3 634
wolfSSL 18:d89df40b4cf3 635 DBG("Retrieving %d bytes", readLen);
wolfSSL 18:d89df40b4cf3 636
wolfSSL 18:d89df40b4cf3 637 do {
wolfSSL 18:d89df40b4cf3 638 pDataIn->write(buf, MIN(trfLen, readLen));
wolfSSL 18:d89df40b4cf3 639 if( trfLen > readLen ) {
wolfSSL 18:d89df40b4cf3 640 memmove(buf, &buf[readLen], trfLen - readLen);
wolfSSL 18:d89df40b4cf3 641 trfLen -= readLen;
wolfSSL 18:d89df40b4cf3 642 readLen = 0;
wolfSSL 18:d89df40b4cf3 643 } else {
wolfSSL 18:d89df40b4cf3 644 readLen -= trfLen;
wolfSSL 18:d89df40b4cf3 645 }
donatien 0:2ccb9960a044 646
wolfSSL 18:d89df40b4cf3 647 if(readLen) {
wolfSSL 18:d89df40b4cf3 648 ret = recv(buf, 1, CHUNK_SIZE - trfLen - 1, &trfLen);
wolfSSL 18:d89df40b4cf3 649 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 650 }
wolfSSL 18:d89df40b4cf3 651 } while(readLen);
wolfSSL 18:d89df40b4cf3 652
wolfSSL 18:d89df40b4cf3 653 if( recvChunked ) {
wolfSSL 18:d89df40b4cf3 654 if(trfLen < 2) {
ansond 30:6fef375c94e6 655 size_t newTrfLen = 0;
wolfSSL 18:d89df40b4cf3 656 //Read missing chars to find end of chunk
wolfSSL 18:d89df40b4cf3 657 ret = recv(buf + trfLen, 2 - trfLen, CHUNK_SIZE - trfLen - 1, &newTrfLen);
wolfSSL 18:d89df40b4cf3 658 CHECK_CONN_ERR(ret);
wolfSSL 18:d89df40b4cf3 659 trfLen += newTrfLen;
wolfSSL 18:d89df40b4cf3 660 }
wolfSSL 18:d89df40b4cf3 661 if( (buf[0] != '\r') || (buf[1] != '\n') ) {
wolfSSL 18:d89df40b4cf3 662 ERR("Format error");
wolfSSL 18:d89df40b4cf3 663 PRTCL_ERR();
wolfSSL 18:d89df40b4cf3 664 }
wolfSSL 18:d89df40b4cf3 665 memmove(buf, &buf[2], trfLen - 2);
wolfSSL 18:d89df40b4cf3 666 trfLen -= 2;
wolfSSL 18:d89df40b4cf3 667 } else {
wolfSSL 18:d89df40b4cf3 668 break;
wolfSSL 18:d89df40b4cf3 669 }
wolfSSL 18:d89df40b4cf3 670
donatien 0:2ccb9960a044 671 }
wolfSSL 20:bec882d85856 672 cyassl_free() ;
wolfSSL 18:d89df40b4cf3 673 m_sock.close();
wolfSSL 18:d89df40b4cf3 674 DBG("Completed HTTP transaction");
wolfSSL 27:5d4739eae63e 675 if(redirect)return HTTP_REDIRECT ;
wolfSSL 27:5d4739eae63e 676 else return HTTP_OK;
donatien 0:2ccb9960a044 677 }
donatien 0:2ccb9960a044 678
wolfSSL 19:1e2f05809eb1 679 HTTPResult HTTPClient::recv(char* buf, size_t minLen, size_t maxLen, size_t* pReadLen) //0 on success, err code on failure
donatien 0:2ccb9960a044 680 {
wolfSSL 18:d89df40b4cf3 681 DBG("Trying to read between %d and %d bytes", minLen, maxLen);
wolfSSL 18:d89df40b4cf3 682 size_t readLen = 0;
wolfSSL 18:d89df40b4cf3 683
wolfSSL 18:d89df40b4cf3 684 if(!m_sock.is_connected()) {
wolfSSL 18:d89df40b4cf3 685 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 686 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 18:d89df40b4cf3 687 }
wolfSSL 18:d89df40b4cf3 688
wolfSSL 18:d89df40b4cf3 689 int ret;
wolfSSL 18:d89df40b4cf3 690
wolfSSL 18:d89df40b4cf3 691 if(port == HTTPS_PORT) {
wolfSSL 18:d89df40b4cf3 692 DBG("Enter CyaSSL_read") ;
wolfSSL 18:d89df40b4cf3 693
wolfSSL 18:d89df40b4cf3 694 m_sock.set_blocking(false, m_timeout);
wolfSSL 18:d89df40b4cf3 695 readLen = CyaSSL_read(ssl, buf, maxLen);
wolfSSL 18:d89df40b4cf3 696 if (readLen > 0) {
wolfSSL 18:d89df40b4cf3 697 buf[readLen] = 0;
wolfSSL 18:d89df40b4cf3 698 DBG("CyaSSL_read:%s\n", buf);
wolfSSL 18:d89df40b4cf3 699 } else {
wolfSSL 18:d89df40b4cf3 700 ERR("CyaSSL_read, ret = %d", readLen) ;
wolfSSL 18:d89df40b4cf3 701 return HTTP_ERROR ;
wolfSSL 18:d89df40b4cf3 702 }
wolfSSL 18:d89df40b4cf3 703 DBG("Read %d bytes", readLen);
wolfSSL 18:d89df40b4cf3 704 *pReadLen = readLen;
wolfSSL 18:d89df40b4cf3 705 return HTTP_OK;
wolfSSL 18:d89df40b4cf3 706 }
wolfSSL 18:d89df40b4cf3 707
wolfSSL 18:d89df40b4cf3 708 while(readLen < maxLen) {
wolfSSL 18:d89df40b4cf3 709 if(readLen < minLen) {
wolfSSL 18:d89df40b4cf3 710 DBG("Trying to read at most %d bytes [Blocking]", minLen - readLen);
wolfSSL 18:d89df40b4cf3 711 m_sock.set_blocking(false, m_timeout);
wolfSSL 18:d89df40b4cf3 712 ret = m_sock.receive_all(buf + readLen, minLen - readLen);
wolfSSL 18:d89df40b4cf3 713 } else {
wolfSSL 18:d89df40b4cf3 714 DBG("Trying to read at most %d bytes [Not blocking]", maxLen - readLen);
wolfSSL 18:d89df40b4cf3 715 m_sock.set_blocking(false, 0);
wolfSSL 18:d89df40b4cf3 716 ret = m_sock.receive(buf + readLen, maxLen - readLen);
wolfSSL 18:d89df40b4cf3 717 }
wolfSSL 18:d89df40b4cf3 718
wolfSSL 18:d89df40b4cf3 719 if( ret > 0) {
wolfSSL 18:d89df40b4cf3 720 readLen += ret;
wolfSSL 18:d89df40b4cf3 721 } else if( ret == 0 ) {
wolfSSL 18:d89df40b4cf3 722 break;
wolfSSL 18:d89df40b4cf3 723 } else {
wolfSSL 18:d89df40b4cf3 724 if(!m_sock.is_connected()) {
wolfSSL 18:d89df40b4cf3 725 ERR("Connection error (recv returned %d)", ret);
wolfSSL 18:d89df40b4cf3 726 *pReadLen = readLen;
wolfSSL 18:d89df40b4cf3 727 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 728 } else {
wolfSSL 18:d89df40b4cf3 729 break;
wolfSSL 18:d89df40b4cf3 730 }
wolfSSL 18:d89df40b4cf3 731 }
wolfSSL 18:d89df40b4cf3 732
wolfSSL 18:d89df40b4cf3 733 if(!m_sock.is_connected()) {
wolfSSL 18:d89df40b4cf3 734 break;
wolfSSL 18:d89df40b4cf3 735 }
wolfSSL 17:c73d8e61d391 736 }
wolfSSL 17:c73d8e61d391 737 DBG("Read %d bytes", readLen);
wolfSSL 17:c73d8e61d391 738 *pReadLen = readLen;
wolfSSL 17:c73d8e61d391 739 return HTTP_OK;
donatien 7:4e39864f7b15 740 }
donatien 7:4e39864f7b15 741
wolfSSL 19:1e2f05809eb1 742 HTTPResult HTTPClient::send(char* buf, size_t len) //0 on success, err code on failure
donatien 7:4e39864f7b15 743 {
wolfSSL 18:d89df40b4cf3 744 HTTPResult ret ;
wolfSSL 18:d89df40b4cf3 745 int cp_len ;
wolfSSL 18:d89df40b4cf3 746
wolfSSL 18:d89df40b4cf3 747 if(len == 0) {
wolfSSL 18:d89df40b4cf3 748 len = strlen(buf);
wolfSSL 17:c73d8e61d391 749 }
wolfSSL 17:c73d8e61d391 750
wolfSSL 18:d89df40b4cf3 751 do {
wolfSSL 22:4b9a4151cc73 752
wolfSSL 18:d89df40b4cf3 753 if((SEND_BUF_SIZE - (send_buf_p - send_buf)) >= len) {
wolfSSL 18:d89df40b4cf3 754 cp_len = len ;
wolfSSL 18:d89df40b4cf3 755 } else {
wolfSSL 22:4b9a4151cc73 756 cp_len = SEND_BUF_SIZE - (send_buf_p - send_buf) ;
wolfSSL 18:d89df40b4cf3 757 }
wolfSSL 22:4b9a4151cc73 758 DBG("send_buf_p:%x. send_buf+SIZE:%x, len=%d, cp_len=%d", send_buf_p, send_buf+SEND_BUF_SIZE, len, cp_len) ;
wolfSSL 18:d89df40b4cf3 759 memcpy(send_buf_p, buf, cp_len) ;
wolfSSL 18:d89df40b4cf3 760 send_buf_p += cp_len ;
wolfSSL 18:d89df40b4cf3 761 len -= cp_len ;
wolfSSL 18:d89df40b4cf3 762
wolfSSL 18:d89df40b4cf3 763 if(send_buf_p == send_buf + SEND_BUF_SIZE) {
wolfSSL 22:4b9a4151cc73 764 if(port == HTTPS_PORT){
wolfSSL 22:4b9a4151cc73 765 ERR("HTTPClient::send buffer overflow");
wolfSSL 22:4b9a4151cc73 766 return HTTP_ERROR ;
wolfSSL 22:4b9a4151cc73 767 }
wolfSSL 18:d89df40b4cf3 768 ret = flush() ;
wolfSSL 18:d89df40b4cf3 769 if(ret)return(ret) ;
wolfSSL 18:d89df40b4cf3 770 }
wolfSSL 18:d89df40b4cf3 771 } while(len) ;
wolfSSL 18:d89df40b4cf3 772 return HTTP_OK ;
wolfSSL 17:c73d8e61d391 773 }
wolfSSL 17:c73d8e61d391 774
wolfSSL 19:1e2f05809eb1 775 HTTPResult HTTPClient::flush() //0 on success, err code on failure
wolfSSL 17:c73d8e61d391 776 {
wolfSSL 18:d89df40b4cf3 777 int len ;
wolfSSL 18:d89df40b4cf3 778 char * buf ;
wolfSSL 18:d89df40b4cf3 779
wolfSSL 18:d89df40b4cf3 780 buf = send_buf ;
wolfSSL 18:d89df40b4cf3 781 len = send_buf_p - send_buf ;
wolfSSL 18:d89df40b4cf3 782 send_buf_p = send_buf ; // reset send buffer
wolfSSL 18:d89df40b4cf3 783
wolfSSL 18:d89df40b4cf3 784 DBG("Trying to write %d bytes:%s\n", len, buf);
wolfSSL 18:d89df40b4cf3 785 size_t writtenLen = 0;
wolfSSL 18:d89df40b4cf3 786
wolfSSL 18:d89df40b4cf3 787 if(!m_sock.is_connected()) {
wolfSSL 18:d89df40b4cf3 788 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 789 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 17:c73d8e61d391 790 }
wolfSSL 18:d89df40b4cf3 791
wolfSSL 18:d89df40b4cf3 792 if(port == HTTPS_PORT) {
wolfSSL 18:d89df40b4cf3 793 DBG("Enter CyaSSL_write") ;
wolfSSL 18:d89df40b4cf3 794 if (CyaSSL_write(ssl, buf, len) != len) {
wolfSSL 18:d89df40b4cf3 795 ERR("SSL_write failed");
wolfSSL 18:d89df40b4cf3 796 return HTTP_ERROR ;
wolfSSL 18:d89df40b4cf3 797 }
wolfSSL 18:d89df40b4cf3 798 DBG("Written %d bytes", writtenLen);
wolfSSL 18:d89df40b4cf3 799 return HTTP_OK;
wolfSSL 18:d89df40b4cf3 800 }
wolfSSL 18:d89df40b4cf3 801 m_sock.set_blocking(false, m_timeout);
wolfSSL 18:d89df40b4cf3 802 int ret = m_sock.send_all(buf, len);
wolfSSL 18:d89df40b4cf3 803 if(ret > 0) {
wolfSSL 18:d89df40b4cf3 804 writtenLen += ret;
wolfSSL 18:d89df40b4cf3 805 } else if( ret == 0 ) {
wolfSSL 18:d89df40b4cf3 806 WARN("Connection was closed by server");
wolfSSL 18:d89df40b4cf3 807 return HTTP_CLOSED; //Connection was closed by server
wolfSSL 18:d89df40b4cf3 808 } else {
wolfSSL 18:d89df40b4cf3 809 ERR("Connection error (send returned %d)", ret);
wolfSSL 18:d89df40b4cf3 810 return HTTP_CONN;
wolfSSL 18:d89df40b4cf3 811 }
wolfSSL 18:d89df40b4cf3 812
wolfSSL 17:c73d8e61d391 813 DBG("Written %d bytes", writtenLen);
wolfSSL 17:c73d8e61d391 814 return HTTP_OK;
donatien 0:2ccb9960a044 815 }
donatien 0:2ccb9960a044 816
wolfSSL 19:1e2f05809eb1 817 HTTPResult HTTPClient::parseURL(const char* url, char* scheme, size_t maxSchemeLen, char* host, size_t maxHostLen, uint16_t* port, char* path, size_t maxPathLen) //Parse URL
donatien 0:2ccb9960a044 818 {
ansond 46:7cd69cc809b8 819 DBG("Parsing URL: %s",url);
wolfSSL 18:d89df40b4cf3 820 char* schemePtr = (char*) url;
wolfSSL 18:d89df40b4cf3 821 char* hostPtr = (char*) strstr(url, "://");
wolfSSL 18:d89df40b4cf3 822 if(hostPtr == NULL) {
wolfSSL 18:d89df40b4cf3 823 WARN("Could not find host");
wolfSSL 18:d89df40b4cf3 824 return HTTP_PARSE; //URL is invalid
wolfSSL 18:d89df40b4cf3 825 }
wolfSSL 18:d89df40b4cf3 826
wolfSSL 18:d89df40b4cf3 827 if( maxSchemeLen < hostPtr - schemePtr + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 828 WARN("Scheme str is too small (%d >= %d)", maxSchemeLen, hostPtr - schemePtr + 1);
wolfSSL 18:d89df40b4cf3 829 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 830 }
wolfSSL 18:d89df40b4cf3 831 memcpy(scheme, schemePtr, hostPtr - schemePtr);
wolfSSL 18:d89df40b4cf3 832 scheme[hostPtr - schemePtr] = '\0';
donatien 0:2ccb9960a044 833
wolfSSL 18:d89df40b4cf3 834 hostPtr+=3;
donatien 0:2ccb9960a044 835
wolfSSL 18:d89df40b4cf3 836 size_t hostLen = 0;
donatien 0:2ccb9960a044 837
wolfSSL 18:d89df40b4cf3 838 char* portPtr = strchr(hostPtr, ':');
wolfSSL 18:d89df40b4cf3 839 if( portPtr != NULL ) {
wolfSSL 18:d89df40b4cf3 840 hostLen = portPtr - hostPtr;
wolfSSL 18:d89df40b4cf3 841 portPtr++;
wolfSSL 18:d89df40b4cf3 842 if( sscanf(portPtr, "%hu", port) != 1) {
wolfSSL 18:d89df40b4cf3 843 WARN("Could not find port");
wolfSSL 18:d89df40b4cf3 844 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 845 }
wolfSSL 18:d89df40b4cf3 846 } else {
wolfSSL 18:d89df40b4cf3 847 *port=0;
donatien 0:2ccb9960a044 848 }
wolfSSL 18:d89df40b4cf3 849 char* pathPtr = strchr(hostPtr, '/');
wolfSSL 18:d89df40b4cf3 850 if( hostLen == 0 ) {
wolfSSL 18:d89df40b4cf3 851 hostLen = pathPtr - hostPtr;
wolfSSL 18:d89df40b4cf3 852 }
donatien 0:2ccb9960a044 853
wolfSSL 18:d89df40b4cf3 854 if( maxHostLen < hostLen + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 855 WARN("Host str is too small (%d >= %d)", maxHostLen, hostLen + 1);
wolfSSL 18:d89df40b4cf3 856 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 857 }
wolfSSL 18:d89df40b4cf3 858 memcpy(host, hostPtr, hostLen);
wolfSSL 18:d89df40b4cf3 859 host[hostLen] = '\0';
donatien 0:2ccb9960a044 860
wolfSSL 18:d89df40b4cf3 861 size_t pathLen;
wolfSSL 18:d89df40b4cf3 862 char* fragmentPtr = strchr(hostPtr, '#');
wolfSSL 18:d89df40b4cf3 863 if(fragmentPtr != NULL) {
wolfSSL 18:d89df40b4cf3 864 pathLen = fragmentPtr - pathPtr;
wolfSSL 18:d89df40b4cf3 865 } else {
wolfSSL 18:d89df40b4cf3 866 pathLen = strlen(pathPtr);
wolfSSL 18:d89df40b4cf3 867 }
donatien 0:2ccb9960a044 868
wolfSSL 18:d89df40b4cf3 869 if( maxPathLen < pathLen + 1 ) { //including NULL-terminating char
wolfSSL 18:d89df40b4cf3 870 WARN("Path str is too small (%d >= %d)", maxPathLen, pathLen + 1);
wolfSSL 18:d89df40b4cf3 871 return HTTP_PARSE;
wolfSSL 18:d89df40b4cf3 872 }
wolfSSL 18:d89df40b4cf3 873 memcpy(path, pathPtr, pathLen);
wolfSSL 18:d89df40b4cf3 874 path[pathLen] = '\0';
donatien 0:2ccb9960a044 875
wolfSSL 18:d89df40b4cf3 876 return HTTP_OK;
donatien 0:2ccb9960a044 877 }
wolfSSL 22:4b9a4151cc73 878
ansond 36:debaeb6006a7 879 HTTPResult HTTPClient::tokenAuth(void)
ansond 36:debaeb6006a7 880 {
ansond 36:debaeb6006a7 881 HTTPResult ret ;
ansond 36:debaeb6006a7 882 ret = send("Authorization: Bearer ") ;
ansond 36:debaeb6006a7 883 CHECK_CONN_ERR(ret);
ansond 46:7cd69cc809b8 884 strcat((char *)m_oauthToken,"\n");
ansond 36:debaeb6006a7 885 DBG("oauthToken: %s", m_oauthToken) ;
ansond 46:7cd69cc809b8 886 ret = send((char *)m_oauthToken);
ansond 36:debaeb6006a7 887 CHECK_CONN_ERR(ret);
ansond 36:debaeb6006a7 888 return HTTP_OK ;
ansond 36:debaeb6006a7 889 }
ansond 36:debaeb6006a7 890
wolfSSL 22:4b9a4151cc73 891 HTTPResult HTTPClient::bAuth(void)
wolfSSL 22:4b9a4151cc73 892 {
wolfSSL 22:4b9a4151cc73 893 HTTPResult ret ;
wolfSSL 22:4b9a4151cc73 894 char b_auth[(int)((AUTHB_SIZE+3)*4/3+1)] ;
wolfSSL 22:4b9a4151cc73 895 char base64buff[AUTHB_SIZE+3] ;
wolfSSL 22:4b9a4151cc73 896
wolfSSL 22:4b9a4151cc73 897 ret = send("Authorization: Basic ") ;
wolfSSL 22:4b9a4151cc73 898 CHECK_CONN_ERR(ret);
wolfSSL 22:4b9a4151cc73 899 sprintf(base64buff, "%s:%s", m_basicAuthUser, m_basicAuthPassword) ;
wolfSSL 27:5d4739eae63e 900 DBG("bAuth: %s", base64buff) ;
wolfSSL 22:4b9a4151cc73 901 base64enc(b_auth, base64buff) ;
wolfSSL 22:4b9a4151cc73 902 b_auth[strlen(b_auth)+1] = '\0' ;
wolfSSL 22:4b9a4151cc73 903 b_auth[strlen(b_auth)] = '\n' ;
wolfSSL 22:4b9a4151cc73 904 DBG("b_auth:%s", b_auth) ;
wolfSSL 22:4b9a4151cc73 905 ret = send(b_auth) ;
wolfSSL 22:4b9a4151cc73 906 CHECK_CONN_ERR(ret);
wolfSSL 22:4b9a4151cc73 907 return HTTP_OK ;
wolfSSL 22:4b9a4151cc73 908 }