Demo using MBED TLS

Dependencies:   EthernetInterface NTPClient iothub_amqp_transport iothub_client mbed-rtos mbed

Fork of iothub_client_sample_amqp by Azure IoT

Committer:
markrad
Date:
Thu Jan 05 00:20:03 2017 +0000
Revision:
58:f50b97b08851
Sample using MBED TLS

Who changed what in which revision?

UserRevisionLine numberNew contents of line
markrad 58:f50b97b08851 1 // Copyright (c) Microsoft. All rights reserved.
markrad 58:f50b97b08851 2 // Licensed under the MIT license. See LICENSE file in the project root for full license information.
markrad 58:f50b97b08851 3
markrad 58:f50b97b08851 4 #include <stdlib.h>
markrad 58:f50b97b08851 5 #ifdef _CRTDBG_MAP_ALLOC
markrad 58:f50b97b08851 6 #include <crtdbg.h>
markrad 58:f50b97b08851 7 #endif
markrad 58:f50b97b08851 8 #include "azure_c_shared_utility/gballoc.h"
markrad 58:f50b97b08851 9
markrad 58:f50b97b08851 10 #include <stddef.h>
markrad 58:f50b97b08851 11 #include <time.h>
markrad 58:f50b97b08851 12
markrad 58:f50b97b08851 13 #include "azure_c_shared_utility/agenttime.h"
markrad 58:f50b97b08851 14 #include "azure_c_shared_utility/strings.h"
markrad 58:f50b97b08851 15 #include "azure_c_shared_utility/buffer_.h"
markrad 58:f50b97b08851 16 #include "azure_c_shared_utility/sastoken.h"
markrad 58:f50b97b08851 17 #include "azure_c_shared_utility/httpheaders.h"
markrad 58:f50b97b08851 18 #include "azure_c_shared_utility/httpapiex.h"
markrad 58:f50b97b08851 19 #include "azure_c_shared_utility/httpapiexsas.h"
markrad 58:f50b97b08851 20 #include "azure_c_shared_utility/xlogging.h"
markrad 58:f50b97b08851 21
markrad 58:f50b97b08851 22 typedef struct HTTPAPIEX_SAS_STATE_TAG
markrad 58:f50b97b08851 23 {
markrad 58:f50b97b08851 24 STRING_HANDLE key;
markrad 58:f50b97b08851 25 STRING_HANDLE uriResource;
markrad 58:f50b97b08851 26 STRING_HANDLE keyName;
markrad 58:f50b97b08851 27 }HTTPAPIEX_SAS_STATE;
markrad 58:f50b97b08851 28
markrad 58:f50b97b08851 29
markrad 58:f50b97b08851 30 HTTPAPIEX_SAS_HANDLE HTTPAPIEX_SAS_Create(STRING_HANDLE key, STRING_HANDLE uriResource, STRING_HANDLE keyName)
markrad 58:f50b97b08851 31 {
markrad 58:f50b97b08851 32 HTTPAPIEX_SAS_HANDLE result = NULL;
markrad 58:f50b97b08851 33 if (key == NULL)
markrad 58:f50b97b08851 34 {
markrad 58:f50b97b08851 35 /*Codes_SRS_HTTPAPIEXSAS_06_001: [If the parameter key is NULL then HTTPAPIEX_SAS_Create shall return NULL.]*/
markrad 58:f50b97b08851 36 LogError("No key passed to HTTPAPIEX_SAS_Create.");
markrad 58:f50b97b08851 37 }
markrad 58:f50b97b08851 38 else if (uriResource == NULL)
markrad 58:f50b97b08851 39 {
markrad 58:f50b97b08851 40 /*Codes_SRS_HTTPAPIEXSAS_06_002: [If the parameter uriResource is NULL then HTTPAPIEX_SAS_Create shall return NULL.]*/
markrad 58:f50b97b08851 41 LogError("No uri resource passed to HTTPAPIEX_SAS_Create.");
markrad 58:f50b97b08851 42 }
markrad 58:f50b97b08851 43 else if (keyName == NULL)
markrad 58:f50b97b08851 44 {
markrad 58:f50b97b08851 45 /*Codes_SRS_HTTPAPIEXSAS_06_003: [If the parameter keyName is NULL then HTTPAPIEX_SAS_Create shall return NULL.]*/
markrad 58:f50b97b08851 46 LogError("No key name passed to HTTPAPIEX_SAS_Create.");
markrad 58:f50b97b08851 47 }
markrad 58:f50b97b08851 48 else
markrad 58:f50b97b08851 49 {
markrad 58:f50b97b08851 50 /*Codes_SRS_HTTPAPIEXSAS_01_001: [ HTTPAPIEX_SAS_Create shall create a new instance of HTTPAPIEX_SAS and return a non-NULL handle to it. ]*/
markrad 58:f50b97b08851 51 HTTPAPIEX_SAS_STATE* state = malloc(sizeof(HTTPAPIEX_SAS_STATE));
markrad 58:f50b97b08851 52 /*Codes_SRS_HTTPAPIEXSAS_06_004: [If there are any other errors in the instantiation of this handle then HTTPAPIEX_SAS_Create shall return NULL.]*/
markrad 58:f50b97b08851 53 if (state != NULL)
markrad 58:f50b97b08851 54 {
markrad 58:f50b97b08851 55 state->key = NULL;
markrad 58:f50b97b08851 56 state->uriResource = NULL;
markrad 58:f50b97b08851 57 state->keyName = NULL;
markrad 58:f50b97b08851 58 if (((state->key = STRING_clone(key)) == NULL) ||
markrad 58:f50b97b08851 59 ((state->uriResource = STRING_clone(uriResource)) == NULL) ||
markrad 58:f50b97b08851 60 ((state->keyName = STRING_clone(keyName)) == NULL))
markrad 58:f50b97b08851 61 {
markrad 58:f50b97b08851 62 /*Codes_SRS_HTTPAPIEXSAS_06_004: [If there are any other errors in the instantiation of this handle then HTTPAPIEX_SAS_Create shall return NULL.]*/
markrad 58:f50b97b08851 63 LogError("Unable to clone the arguments.");
markrad 58:f50b97b08851 64 HTTPAPIEX_SAS_Destroy(state);
markrad 58:f50b97b08851 65 }
markrad 58:f50b97b08851 66 else
markrad 58:f50b97b08851 67 {
markrad 58:f50b97b08851 68 result = state;
markrad 58:f50b97b08851 69 }
markrad 58:f50b97b08851 70 }
markrad 58:f50b97b08851 71 }
markrad 58:f50b97b08851 72 return result;
markrad 58:f50b97b08851 73 }
markrad 58:f50b97b08851 74
markrad 58:f50b97b08851 75 void HTTPAPIEX_SAS_Destroy(HTTPAPIEX_SAS_HANDLE handle)
markrad 58:f50b97b08851 76 {
markrad 58:f50b97b08851 77 /*Codes_SRS_HTTPAPIEXSAS_06_005: [If the parameter handle is NULL then HTTAPIEX_SAS_Destroy shall do nothing and return.]*/
markrad 58:f50b97b08851 78 if (handle)
markrad 58:f50b97b08851 79 {
markrad 58:f50b97b08851 80 HTTPAPIEX_SAS_STATE* state = (HTTPAPIEX_SAS_STATE*)handle;
markrad 58:f50b97b08851 81 /*Codes_SRS_HTTPAPIEXSAS_06_006: [HTTAPIEX_SAS_Destroy shall deallocate any structures denoted by the parameter handle.]*/
markrad 58:f50b97b08851 82 if (state->key)
markrad 58:f50b97b08851 83 {
markrad 58:f50b97b08851 84 STRING_delete(state->key);
markrad 58:f50b97b08851 85 }
markrad 58:f50b97b08851 86 if (state->uriResource)
markrad 58:f50b97b08851 87 {
markrad 58:f50b97b08851 88 STRING_delete(state->uriResource);
markrad 58:f50b97b08851 89 }
markrad 58:f50b97b08851 90 if (state->keyName)
markrad 58:f50b97b08851 91 {
markrad 58:f50b97b08851 92 STRING_delete(state->keyName);
markrad 58:f50b97b08851 93 }
markrad 58:f50b97b08851 94 free(state);
markrad 58:f50b97b08851 95 }
markrad 58:f50b97b08851 96 }
markrad 58:f50b97b08851 97
markrad 58:f50b97b08851 98 HTTPAPIEX_RESULT HTTPAPIEX_SAS_ExecuteRequest(HTTPAPIEX_SAS_HANDLE sasHandle, HTTPAPIEX_HANDLE handle, HTTPAPI_REQUEST_TYPE requestType, const char* relativePath, HTTP_HEADERS_HANDLE requestHttpHeadersHandle, BUFFER_HANDLE requestContent, unsigned int* statusCode, HTTP_HEADERS_HANDLE responseHeadersHandle, BUFFER_HANDLE responseContent)
markrad 58:f50b97b08851 99 {
markrad 58:f50b97b08851 100 /*Codes_SRS_HTTPAPIEXSAS_06_007: [If the parameter sasHandle is NULL then HTTPAPIEX_SAS_ExecuteRequest shall simply invoke HTTPAPIEX_ExecuteRequest with the remaining parameters (following sasHandle) as its arguments and shall return immediately with the result of that call as the result of HTTPAPIEX_SAS_ExecuteRequest.]*/
markrad 58:f50b97b08851 101 if (sasHandle != NULL)
markrad 58:f50b97b08851 102 {
markrad 58:f50b97b08851 103 /*Codes_SRS_HTTPAPIEXSAS_06_008: [if the parameter requestHttpHeadersHandle is NULL then fallthrough.]*/
markrad 58:f50b97b08851 104 if (requestHttpHeadersHandle != NULL)
markrad 58:f50b97b08851 105 {
markrad 58:f50b97b08851 106 /*Codes_SRS_HTTPAPIEXSAS_06_009: [HTTPHeaders_FindHeaderValue shall be invoked with the requestHttpHeadersHandle as its first argument and the string "Authorization" as its second argument.]*/
markrad 58:f50b97b08851 107 /*Codes_SRS_HTTPAPIEXSAS_06_010: [If the return result of the invocation of HTTPHeaders_FindHeaderValue is NULL then fallthrough.]*/
markrad 58:f50b97b08851 108 if (HTTPHeaders_FindHeaderValue(requestHttpHeadersHandle, "Authorization") != NULL)
markrad 58:f50b97b08851 109 {
markrad 58:f50b97b08851 110 HTTPAPIEX_SAS_STATE* state = (HTTPAPIEX_SAS_STATE*)sasHandle;
markrad 58:f50b97b08851 111 /*Codes_SRS_HTTPAPIEXSAS_06_018: [A value of type time_t that shall be known as currentTime is obtained from calling get_time.]*/
markrad 58:f50b97b08851 112 time_t currentTime = get_time(NULL);
markrad 58:f50b97b08851 113 /*Codes_SRS_HTTPAPIEXSAS_06_019: [If the value of currentTime is (time_t)-1 is then fallthrough.]*/
markrad 58:f50b97b08851 114 if (currentTime == (time_t)-1)
markrad 58:f50b97b08851 115 {
markrad 58:f50b97b08851 116 LogError("Time does not appear to be working.");
markrad 58:f50b97b08851 117 }
markrad 58:f50b97b08851 118 else
markrad 58:f50b97b08851 119 {
markrad 58:f50b97b08851 120 /*Codes_SRS_HTTPAPIEXSAS_06_011: [SASToken_Create shall be invoked.]*/
markrad 58:f50b97b08851 121 /*Codes_SRS_HTTPAPIEXSAS_06_012: [If the return result of SASToken_Create is NULL then fallthrough.]*/
markrad 58:f50b97b08851 122 size_t expiry = (size_t)(difftime(currentTime, 0) + 3600);
markrad 58:f50b97b08851 123 STRING_HANDLE newSASToken = SASToken_Create(state->key, state->uriResource, state->keyName, expiry);
markrad 58:f50b97b08851 124 if (newSASToken != NULL)
markrad 58:f50b97b08851 125 {
markrad 58:f50b97b08851 126 /*Codes_SRS_HTTPAPIEXSAS_06_013: [HTTPHeaders_ReplaceHeaderNameValuePair shall be invoked with "Authorization" as its second argument and STRING_c_str (newSASToken) as its third argument.]*/
markrad 58:f50b97b08851 127 if (HTTPHeaders_ReplaceHeaderNameValuePair(requestHttpHeadersHandle, "Authorization", STRING_c_str(newSASToken)) != HTTP_HEADERS_OK)
markrad 58:f50b97b08851 128 {
markrad 58:f50b97b08851 129 /*Codes_SRS_HTTPAPIEXSAS_06_014: [If the result of the invocation of HTTPHeaders_ReplaceHeaderNameValuePair is NOT HTTP_HEADERS_OK then fallthrough.]*/
markrad 58:f50b97b08851 130 LogError("Unable to replace the old SAS Token.");
markrad 58:f50b97b08851 131 }
markrad 58:f50b97b08851 132 /*Codes_SRS_HTTPAPIEXSAS_06_015: [STRING_delete(newSASToken) will be invoked.]*/
markrad 58:f50b97b08851 133 STRING_delete(newSASToken);
markrad 58:f50b97b08851 134 }
markrad 58:f50b97b08851 135 else
markrad 58:f50b97b08851 136 {
markrad 58:f50b97b08851 137 LogError("Unable to create a new SAS token.");
markrad 58:f50b97b08851 138 }
markrad 58:f50b97b08851 139 }
markrad 58:f50b97b08851 140 }
markrad 58:f50b97b08851 141 }
markrad 58:f50b97b08851 142 }
markrad 58:f50b97b08851 143 /*Codes_SRS_HTTPAPIEXSAS_06_016: [HTTPAPIEX_ExecuteRequest with the remaining parameters (following sasHandle) as its arguments will be invoked and the result of that call is the result of HTTPAPIEX_SAS_ExecuteRequest.]*/
markrad 58:f50b97b08851 144 return HTTPAPIEX_ExecuteRequest(handle,requestType,relativePath,requestHttpHeadersHandle,requestContent,statusCode,responseHeadersHandle,responseContent);
markrad 58:f50b97b08851 145 }