webclient.c 42 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704
  1. /*
  2. * Copyright (c) 2006-2019, RT-Thread Development Team
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. *
  6. * Change Logs:
  7. * Date Author Notes
  8. * 2013-05-05 Bernard the first version
  9. * 2013-06-10 Bernard fix the slow speed issue when download file.
  10. * 2015-11-14 aozima add content_length_remainder.
  11. * 2017-12-23 aozima update gethostbyname to getaddrinfo.
  12. * 2018-01-04 aozima add ipv6 address support.
  13. * 2018-07-26 chenyong modify log information
  14. * 2018-08-07 chenyong modify header processing
  15. */
  16. #include <stdio.h>
  17. #include <stdlib.h>
  18. #include <string.h>
  19. #include <ctype.h>
  20. #include <sys/time.h>
  21. #include <webclient.h>
  22. /* support both enable and disable "SAL_USING_POSIX" */
  23. #if defined(RT_USING_SAL)
  24. #include <netdb.h>
  25. #include <sys/socket.h>
  26. // #else
  27. // #include <lwip/netdb.h>
  28. // #include <lwip/sockets.h>
  29. #define DBG_ENABLE
  30. #define DBG_SECTION_NAME "web"
  31. #ifdef WEBCLIENT_DEBUG
  32. #define DBG_LEVEL DBG_LOG
  33. #else
  34. #define DBG_LEVEL DBG_INFO
  35. #endif /* WEBCLIENT_DEBUG */
  36. #define DBG_COLOR
  37. #include <rtdbg.h>
  38. /* default receive or send timeout */
  39. #define WEBCLIENT_DEFAULT_TIMEO 6
  40. extern long int strtol(const char *nptr, char **endptr, int base);
  41. static int webclient_strncasecmp(const char *a, const char *b, size_t n)
  42. {
  43. uint8_t c1, c2;
  44. if (n <= 0)
  45. return 0;
  46. do {
  47. c1 = tolower(*a++);
  48. c2 = tolower(*b++);
  49. } while (--n && c1 && c1 == c2);
  50. return c1 - c2;
  51. }
  52. static const char *webclient_strstri(const char* str, const char* subStr)
  53. {
  54. int len = strlen(subStr);
  55. if(len == 0)
  56. {
  57. return RT_NULL;
  58. }
  59. while(*str)
  60. {
  61. if(webclient_strncasecmp(str, subStr, len) == 0)
  62. {
  63. return str;
  64. }
  65. ++str;
  66. }
  67. return RT_NULL;
  68. }
  69. static int webclient_send(struct webclient_session* session, const unsigned char *buffer, size_t len, int flag)
  70. {
  71. #ifdef WEBCLIENT_USING_MBED_TLS
  72. if (session->tls_session)
  73. {
  74. return mbedtls_client_write(session->tls_session, buffer, len);
  75. }
  76. #endif
  77. return send(session->socket, buffer, len, flag);
  78. }
  79. static int webclient_recv(struct webclient_session* session, unsigned char *buffer, size_t len, int flag)
  80. {
  81. #ifdef WEBCLIENT_USING_MBED_TLS
  82. if (session->tls_session)
  83. {
  84. return mbedtls_client_read(session->tls_session, buffer, len);
  85. }
  86. #endif
  87. return recv(session->socket, buffer, len, flag);
  88. }
  89. static int webclient_read_line(struct webclient_session *session, char *buffer, int size)
  90. {
  91. int rc, count = 0;
  92. char ch = 0, last_ch = 0;
  93. RT_ASSERT(session);
  94. RT_ASSERT(buffer);
  95. /* Keep reading until we fill the buffer. */
  96. while (count < size)
  97. {
  98. rc = webclient_recv(session, (unsigned char *) &ch, 1, 0);
  99. #if defined(WEBCLIENT_USING_MBED_TLS) || defined(WEBCLIENT_USING_SAL_TLS)
  100. if (session->is_tls && (rc == MBEDTLS_ERR_SSL_WANT_READ || rc == MBEDTLS_ERR_SSL_WANT_WRITE))
  101. {
  102. continue;
  103. }
  104. #endif
  105. if (rc <= 0)
  106. return rc;
  107. if (ch == '\n' && last_ch == '\r')
  108. break;
  109. buffer[count++] = ch;
  110. last_ch = ch;
  111. }
  112. if (count > size)
  113. {
  114. LOG_E("read line failed. The line data length is out of buffer size(%d)!", count);
  115. return -WEBCLIENT_ERROR;
  116. }
  117. return count;
  118. }
  119. /**
  120. * resolve server address
  121. *
  122. * @param session http session
  123. * @param res the server address information
  124. * @param url the input server URI address
  125. * @param request the pointer to point the request url, for example, /index.html
  126. *
  127. * @return 0 on resolve server address OK, others failed
  128. *
  129. * URL example:
  130. * http://www.rt-thread.org
  131. * http://www.rt-thread.org:80
  132. * https://www.rt-thread.org/
  133. * http://192.168.1.1:80/index.htm
  134. * http://[fe80::1]
  135. * http://[fe80::1]/
  136. * http://[fe80::1]/index.html
  137. * http://[fe80::1]:80/index.html
  138. */
  139. static int webclient_resolve_address(struct webclient_session *session, struct addrinfo **res,
  140. const char *url, const char **request)
  141. {
  142. int rc = WEBCLIENT_OK;
  143. char *ptr;
  144. char port_str[6] = "80"; /* default port of 80(http) */
  145. const char *port_ptr;
  146. const char *path_ptr;
  147. const char *host_addr = 0;
  148. int url_len, host_addr_len = 0;
  149. RT_ASSERT(res);
  150. RT_ASSERT(request);
  151. url_len = rt_strlen(url);
  152. /* strip protocol(http or https) */
  153. if (strncmp(url, "http://", 7) == 0)
  154. {
  155. host_addr = url + 7;
  156. }
  157. else if (strncmp(url, "https://", 8) == 0)
  158. {
  159. rt_strncpy(port_str, "443", 4);
  160. host_addr = url + 8;
  161. }
  162. else
  163. {
  164. rc = -WEBCLIENT_ERROR;
  165. goto __exit;
  166. }
  167. /* ipv6 address */
  168. if (host_addr[0] == '[')
  169. {
  170. host_addr += 1;
  171. ptr = rt_strstr(host_addr, "]");
  172. if (!ptr)
  173. {
  174. rc = -WEBCLIENT_ERROR;
  175. goto __exit;
  176. }
  177. host_addr_len = ptr - host_addr;
  178. }
  179. path_ptr = rt_strstr(host_addr, "/");
  180. *request = path_ptr ? path_ptr : "/";
  181. /* resolve port */
  182. port_ptr = rt_strstr(host_addr + host_addr_len, ":");
  183. if (port_ptr && path_ptr && (port_ptr < path_ptr))
  184. {
  185. int port_len = path_ptr - port_ptr - 1;
  186. rt_strncpy(port_str, port_ptr + 1, port_len);
  187. port_str[port_len] = '\0';
  188. }
  189. if (port_ptr && (!path_ptr))
  190. {
  191. strcpy(port_str, port_ptr + 1);
  192. }
  193. /* ipv4 or domain. */
  194. if (!host_addr_len)
  195. {
  196. if (port_ptr)
  197. {
  198. host_addr_len = port_ptr - host_addr;
  199. }
  200. else if (path_ptr)
  201. {
  202. host_addr_len = path_ptr - host_addr;
  203. }
  204. else
  205. {
  206. host_addr_len = strlen(host_addr);
  207. }
  208. }
  209. if ((host_addr_len < 1) || (host_addr_len > url_len))
  210. {
  211. rc = -WEBCLIENT_ERROR;
  212. goto __exit;
  213. }
  214. /* get host address ok. */
  215. {
  216. char *host_addr_new = web_malloc(host_addr_len + 1);
  217. if (!host_addr_new)
  218. {
  219. rc = -WEBCLIENT_ERROR;
  220. goto __exit;
  221. }
  222. memcpy(host_addr_new, host_addr, host_addr_len);
  223. host_addr_new[host_addr_len] = '\0';
  224. session->host = host_addr_new;
  225. }
  226. LOG_D("host address: %s , port: %s", session->host, port_str);
  227. #ifdef WEBCLIENT_USING_MBED_TLS
  228. if (session->tls_session)
  229. {
  230. session->tls_session->port = web_strdup(port_str);
  231. session->tls_session->host = web_strdup(session->host);
  232. if (session->tls_session->port == RT_NULL || session->tls_session->host == RT_NULL)
  233. {
  234. return -WEBCLIENT_NOMEM;
  235. }
  236. return rc;
  237. }
  238. #endif
  239. /* resolve the host name. */
  240. {
  241. struct addrinfo hint;
  242. int ret;
  243. rt_memset(&hint, 0, sizeof(hint));
  244. ret = getaddrinfo(session->host, port_str, &hint, res);
  245. if (ret != 0)
  246. {
  247. LOG_E("getaddrinfo err: %d '%s'.", ret, session->host);
  248. rc = -WEBCLIENT_ERROR;
  249. goto __exit;
  250. }
  251. }
  252. __exit:
  253. if (rc != WEBCLIENT_OK)
  254. {
  255. if (session->host)
  256. {
  257. web_free(session->host);
  258. session->host = RT_NULL;
  259. }
  260. if (*res)
  261. {
  262. freeaddrinfo(*res);
  263. *res = RT_NULL;
  264. }
  265. }
  266. return rc;
  267. }
  268. #ifdef WEBCLIENT_USING_MBED_TLS
  269. /**
  270. * create and initialize https session.
  271. *
  272. * @param session webclient session
  273. * @param URI input server URI address
  274. *
  275. * @return <0: create failed, no memory or other errors
  276. * =0: success
  277. */
  278. static int webclient_open_tls(struct webclient_session *session, const char *URI)
  279. {
  280. int tls_ret = 0;
  281. const char *pers = "webclient";
  282. RT_ASSERT(session);
  283. session->tls_session = (MbedTLSSession *) web_calloc(1, sizeof(MbedTLSSession));
  284. if (session->tls_session == RT_NULL)
  285. {
  286. return -WEBCLIENT_NOMEM;
  287. }
  288. session->tls_session->buffer_len = WEBCLIENT_RESPONSE_BUFSZ;
  289. session->tls_session->buffer = web_malloc(session->tls_session->buffer_len);
  290. if(session->tls_session->buffer == RT_NULL)
  291. {
  292. LOG_E("no memory for tls_session buffer!");
  293. return -WEBCLIENT_ERROR;
  294. }
  295. if((tls_ret = mbedtls_client_init(session->tls_session, (void *)pers, strlen(pers))) < 0)
  296. {
  297. LOG_E("initialize https client failed return: -0x%x.", -tls_ret);
  298. return -WEBCLIENT_ERROR;
  299. }
  300. return WEBCLIENT_OK;
  301. }
  302. #endif
  303. /**
  304. * connect to http server.
  305. *
  306. * @param session webclient session
  307. * @param URI the input server URI address
  308. *
  309. * @return <0: connect failed or other error
  310. * =0: connect success
  311. */
  312. int webclient_connect(struct webclient_session *session, const char *URI)
  313. {
  314. int rc = WEBCLIENT_OK;
  315. int socket_handle;
  316. struct timeval timeout;
  317. struct addrinfo *res = RT_NULL;
  318. const char *req_url;
  319. RT_ASSERT(session);
  320. RT_ASSERT(URI);
  321. timeout.tv_sec = WEBCLIENT_DEFAULT_TIMEO;
  322. timeout.tv_usec = 0;
  323. if (strncmp(URI, "https://", 8) == 0)
  324. {
  325. #if defined(WEBCLIENT_USING_SAL_TLS)
  326. session->is_tls = RT_TRUE;
  327. #elif defined(WEBCLIENT_USING_MBED_TLS)
  328. if(webclient_open_tls(session, URI) < 0)
  329. {
  330. LOG_E("connect failed, https client open URI(%s) failed!", URI);
  331. return -WEBCLIENT_ERROR;
  332. }
  333. session->is_tls = RT_TRUE;
  334. #else
  335. LOG_E("not support https connect, please enable webclient https configure!");
  336. rc = -WEBCLIENT_ERROR;
  337. goto __exit;
  338. #endif
  339. }
  340. /* Check valid IP address and URL */
  341. rc = webclient_resolve_address(session, &res, URI, &req_url);
  342. if (rc != WEBCLIENT_OK)
  343. {
  344. LOG_E("connect failed, resolve address error(%d).", rc);
  345. goto __exit;
  346. }
  347. /* Not use 'getaddrinfo()' for https connection */
  348. if (session->is_tls == RT_FALSE && res == RT_NULL)
  349. {
  350. rc = -WEBCLIENT_ERROR;
  351. goto __exit;
  352. }
  353. /* copy host address */
  354. if (req_url)
  355. {
  356. session->req_url = web_strdup(req_url);
  357. }
  358. else
  359. {
  360. LOG_E("connect failed, resolve request address error.");
  361. rc = -WEBCLIENT_ERROR;
  362. goto __exit;
  363. }
  364. #ifdef WEBCLIENT_USING_MBED_TLS
  365. if (session->tls_session)
  366. {
  367. int tls_ret = 0;
  368. if ((tls_ret = mbedtls_client_context(session->tls_session)) < 0)
  369. {
  370. LOG_E("connect failed, https client context return: -0x%x", -tls_ret);
  371. return -WEBCLIENT_ERROR;
  372. }
  373. if ((tls_ret = mbedtls_client_connect(session->tls_session)) < 0)
  374. {
  375. LOG_E("connect failed, https client connect return: -0x%x", -tls_ret);
  376. return -WEBCLIENT_CONNECT_FAILED;
  377. }
  378. socket_handle = session->tls_session->server_fd.fd;
  379. /* set recv timeout option */
  380. setsockopt(socket_handle, SOL_SOCKET, SO_RCVTIMEO, (void*) &timeout,
  381. sizeof(timeout));
  382. setsockopt(socket_handle, SOL_SOCKET, SO_SNDTIMEO, (void*) &timeout,
  383. sizeof(timeout));
  384. session->socket = socket_handle;
  385. return WEBCLIENT_OK;
  386. }
  387. #endif
  388. {
  389. #ifdef WEBCLIENT_USING_SAL_TLS
  390. if (session->is_tls)
  391. {
  392. socket_handle = socket(res->ai_family, SOCK_STREAM, PROTOCOL_TLS);
  393. }
  394. else
  395. {
  396. socket_handle = socket(res->ai_family, SOCK_STREAM, IPPROTO_TCP);
  397. }
  398. #else
  399. socket_handle = socket(res->ai_family, SOCK_STREAM, IPPROTO_TCP);
  400. #endif
  401. if (socket_handle < 0)
  402. {
  403. LOG_E("connect failed, create socket(%d) error.", socket_handle);
  404. rc = -WEBCLIENT_NOSOCKET;
  405. goto __exit;
  406. }
  407. /* set receive and send timeout option */
  408. setsockopt(socket_handle, SOL_SOCKET, SO_RCVTIMEO, (void *) &timeout,
  409. sizeof(timeout));
  410. setsockopt(socket_handle, SOL_SOCKET, SO_SNDTIMEO, (void *) &timeout,
  411. sizeof(timeout));
  412. if (connect(socket_handle, res->ai_addr, res->ai_addrlen) != 0)
  413. {
  414. /* connect failed, close socket */
  415. LOG_E("connect failed, connect socket(%d) error.", socket_handle);
  416. closesocket(socket_handle);
  417. rc = -WEBCLIENT_CONNECT_FAILED;
  418. goto __exit;
  419. }
  420. session->socket = socket_handle;
  421. }
  422. __exit:
  423. if (res)
  424. {
  425. freeaddrinfo(res);
  426. }
  427. return rc;
  428. }
  429. /**
  430. * add fields data to request header data.
  431. *
  432. * @param session webclient session
  433. * @param fmt fields format
  434. *
  435. * @return >0: data length of successfully added
  436. * <0: not enough header buffer size
  437. */
  438. int webclient_header_fields_add(struct webclient_session *session, const char *fmt, ...)
  439. {
  440. rt_int32_t length;
  441. va_list args;
  442. RT_ASSERT(session);
  443. RT_ASSERT(session->header->buffer);
  444. va_start(args, fmt);
  445. length = rt_vsnprintf(session->header->buffer + session->header->length,
  446. session->header->size - session->header->length, fmt, args);
  447. va_end(args);
  448. if (length < 0)
  449. {
  450. LOG_E("add fields header data failed, return length(%d) error.", length);
  451. return -WEBCLIENT_ERROR;
  452. }
  453. session->header->length += length;
  454. /* check header size */
  455. if (session->header->length >= session->header->size)
  456. {
  457. LOG_E("not enough header buffer size(%d)!", session->header->size);
  458. return -WEBCLIENT_ERROR;
  459. }
  460. return length;
  461. }
  462. /**
  463. * get fields information from request/response header data.
  464. *
  465. * @param session webclient session
  466. * @param fields fields keyword
  467. *
  468. * @return = NULL: get fields data failed
  469. * != NULL: success get fields data
  470. */
  471. const char *webclient_header_fields_get(struct webclient_session *session, const char *fields)
  472. {
  473. char *resp_buf = RT_NULL;
  474. size_t resp_buf_len = 0;
  475. RT_ASSERT(session);
  476. RT_ASSERT(session->header->buffer);
  477. resp_buf = session->header->buffer;
  478. while (resp_buf_len < session->header->length)
  479. {
  480. if (webclient_strstri(resp_buf, fields))
  481. {
  482. char *mime_ptr = RT_NULL;
  483. /* jump space */
  484. mime_ptr = rt_strstr(resp_buf, ":");
  485. if (mime_ptr != NULL)
  486. {
  487. mime_ptr += 1;
  488. while (*mime_ptr && (*mime_ptr == ' ' || *mime_ptr == '\t'))
  489. mime_ptr++;
  490. return mime_ptr;
  491. }
  492. }
  493. if (*resp_buf == '\0')
  494. break;
  495. resp_buf += rt_strlen(resp_buf) + 1;
  496. resp_buf_len += rt_strlen(resp_buf) + 1;
  497. }
  498. return RT_NULL;
  499. }
  500. /**
  501. * get http response status code.
  502. *
  503. * @param session webclient session
  504. *
  505. * @return response status code
  506. */
  507. int webclient_resp_status_get(struct webclient_session *session)
  508. {
  509. RT_ASSERT(session);
  510. return session->resp_status;
  511. }
  512. /**
  513. * get http response data content length.
  514. *
  515. * @param session webclient session
  516. *
  517. * @return response content length
  518. */
  519. int webclient_content_length_get(struct webclient_session *session)
  520. {
  521. RT_ASSERT(session);
  522. return session->content_length;
  523. }
  524. int webclient_send_header(struct webclient_session *session, int method)
  525. {
  526. int rc = WEBCLIENT_OK;
  527. char *header = RT_NULL;
  528. RT_ASSERT(session);
  529. header = session->header->buffer;
  530. if (session->header->length == 0)
  531. {
  532. /* use default header data */
  533. if (webclient_header_fields_add(session, "GET %s HTTP/1.1\r\n", session->req_url) < 0)
  534. return -WEBCLIENT_NOMEM;
  535. if (webclient_header_fields_add(session, "Host: %s\r\n", session->host) < 0)
  536. return -WEBCLIENT_NOMEM;
  537. if (webclient_header_fields_add(session, "User-Agent: RT-Thread HTTP Agent\r\n\r\n") < 0)
  538. return -WEBCLIENT_NOMEM;
  539. webclient_write(session, (unsigned char *) session->header->buffer, session->header->length);
  540. }
  541. else
  542. {
  543. if (method != WEBCLIENT_USER_METHOD)
  544. {
  545. /* check and add fields header data */
  546. if (memcmp(header, "HTTP/1.", rt_strlen("HTTP/1.")))
  547. {
  548. char *header_buffer = RT_NULL;
  549. int length = 0;
  550. header_buffer = web_strdup(session->header->buffer);
  551. if (header_buffer == RT_NULL)
  552. {
  553. LOG_E("no memory for header buffer!");
  554. rc = -WEBCLIENT_NOMEM;
  555. goto __exit;
  556. }
  557. /* splice http request header data */
  558. if (method == WEBCLIENT_GET)
  559. length = rt_snprintf(session->header->buffer, session->header->size, "GET %s HTTP/1.1\r\n%s",
  560. session->req_url ? session->req_url : "/", header_buffer);
  561. else if (method == WEBCLIENT_POST)
  562. length = rt_snprintf(session->header->buffer, session->header->size, "POST %s HTTP/1.1\r\n%s",
  563. session->req_url ? session->req_url : "/", header_buffer);
  564. session->header->length = length;
  565. web_free(header_buffer);
  566. }
  567. if (strstr(header, "Host:") == RT_NULL)
  568. {
  569. if (webclient_header_fields_add(session, "Host: %s\r\n", session->host) < 0)
  570. return -WEBCLIENT_NOMEM;
  571. }
  572. if (strstr(header, "User-Agent:") == RT_NULL)
  573. {
  574. if (webclient_header_fields_add(session, "User-Agent: RT-Thread HTTP Agent\r\n") < 0)
  575. return -WEBCLIENT_NOMEM;
  576. }
  577. if (strstr(header, "Accept:") == RT_NULL)
  578. {
  579. if (webclient_header_fields_add(session, "Accept: */*\r\n") < 0)
  580. return -WEBCLIENT_NOMEM;
  581. }
  582. /* header data end */
  583. rt_snprintf(session->header->buffer + session->header->length, session->header->size, "\r\n");
  584. session->header->length += 2;
  585. /* check header size */
  586. if (session->header->length > session->header->size)
  587. {
  588. LOG_E("send header failed, not enough header buffer size(%d)!", session->header->size);
  589. rc = -WEBCLIENT_NOBUFFER;
  590. goto __exit;
  591. }
  592. webclient_write(session, (unsigned char *) session->header->buffer, session->header->length);
  593. }
  594. else
  595. {
  596. webclient_write(session, (unsigned char *) session->header->buffer, session->header->length);
  597. }
  598. }
  599. /* get and echo request header data */
  600. {
  601. char *header_str, *header_ptr;
  602. int header_line_len;
  603. LOG_D("request header:");
  604. for(header_str = session->header->buffer; (header_ptr = rt_strstr(header_str, "\r\n")) != RT_NULL; )
  605. {
  606. header_line_len = header_ptr - header_str;
  607. if (header_line_len > 0)
  608. {
  609. LOG_D("%.*s", header_line_len, header_str);
  610. }
  611. header_str = header_ptr + rt_strlen("\r\n");
  612. }
  613. #ifdef WEBCLIENT_DEBUG
  614. LOG_RAW("\n");
  615. #endif
  616. }
  617. __exit:
  618. return rc;
  619. }
  620. /**
  621. * resolve server response data.
  622. *
  623. * @param session webclient session
  624. *
  625. * @return <0: resolve response data failed
  626. * =0: success
  627. */
  628. int webclient_handle_response(struct webclient_session *session)
  629. {
  630. int rc = WEBCLIENT_OK;
  631. char *mime_buffer = RT_NULL;
  632. char *mime_ptr = RT_NULL;
  633. const char *transfer_encoding;
  634. int i;
  635. RT_ASSERT(session);
  636. /* clean header buffer and size */
  637. rt_memset(session->header->buffer, 0x00, session->header->size);
  638. session->header->length = 0;
  639. LOG_D("response header:");
  640. /* We now need to read the header information */
  641. while (1)
  642. {
  643. mime_buffer = session->header->buffer + session->header->length;
  644. /* read a line from the header information. */
  645. rc = webclient_read_line(session, mime_buffer, session->header->size - session->header->length);
  646. if (rc < 0)
  647. break;
  648. /* End of headers is a blank line. exit. */
  649. if (rc == 0)
  650. break;
  651. if ((rc == 1) && (mime_buffer[0] == '\r'))
  652. {
  653. mime_buffer[0] = '\0';
  654. break;
  655. }
  656. /* set terminal charater */
  657. mime_buffer[rc - 1] = '\0';
  658. /* echo response header data */
  659. LOG_D("%s", mime_buffer);
  660. session->header->length += rc;
  661. if (session->header->length >= session->header->size)
  662. {
  663. LOG_E("not enough header buffer size(%d)!", session->header->size);
  664. return -WEBCLIENT_NOMEM;
  665. }
  666. }
  667. /* get HTTP status code */
  668. mime_ptr = web_strdup(session->header->buffer);
  669. if (mime_ptr == RT_NULL)
  670. {
  671. LOG_E("no memory for get http status code buffer!");
  672. return -WEBCLIENT_NOMEM;
  673. }
  674. if (rt_strstr(mime_ptr, "HTTP/1."))
  675. {
  676. char *ptr = mime_ptr;
  677. ptr += rt_strlen("HTTP/1.x");
  678. while (*ptr && (*ptr == ' ' || *ptr == '\t'))
  679. ptr++;
  680. /* Terminate string after status code */
  681. for (i = 0; ((ptr[i] != ' ') && (ptr[i] != '\t')); i++);
  682. ptr[i] = '\0';
  683. session->resp_status = (int) strtol(ptr, RT_NULL, 10);
  684. }
  685. /* get content length */
  686. if (webclient_header_fields_get(session, "Content-Length") != RT_NULL)
  687. {
  688. session->content_length = atoi(webclient_header_fields_get(session, "Content-Length"));
  689. }
  690. session->content_remainder = session->content_length ? (size_t) session->content_length : 0xFFFFFFFF;
  691. transfer_encoding = webclient_header_fields_get(session, "Transfer-Encoding");
  692. if (transfer_encoding && rt_strcmp(transfer_encoding, "chunked") == 0)
  693. {
  694. char line[16];
  695. /* chunk mode, we should get the first chunk size */
  696. webclient_read_line(session, line, session->header->size);
  697. session->chunk_sz = strtol(line, RT_NULL, 16);
  698. session->chunk_offset = 0;
  699. }
  700. if (mime_ptr)
  701. {
  702. web_free(mime_ptr);
  703. }
  704. if (rc < 0)
  705. {
  706. return rc;
  707. }
  708. return session->resp_status;
  709. }
  710. /**
  711. * create webclient session, set maximum header and response size
  712. *
  713. * @param header_sz maximum send header size
  714. * @param resp_sz maximum response data size
  715. *
  716. * @return webclient session structure
  717. */
  718. struct webclient_session *webclient_session_create(size_t header_sz)
  719. {
  720. struct webclient_session *session;
  721. /* create session */
  722. session = (struct webclient_session *) web_calloc(1, sizeof(struct webclient_session));
  723. if (session == RT_NULL)
  724. {
  725. LOG_E("webclient create failed, no memory for webclient session!");
  726. return RT_NULL;
  727. }
  728. /* initialize the socket of session */
  729. session->socket = -1;
  730. session->content_length = -1;
  731. session->header = (struct webclient_header *) web_calloc(1, sizeof(struct webclient_header));
  732. if (session->header == RT_NULL)
  733. {
  734. LOG_E("webclient create failed, no memory for session header!");
  735. web_free(session);
  736. session = RT_NULL;
  737. return RT_NULL;
  738. }
  739. session->header->size = header_sz;
  740. session->header->buffer = (char *) web_calloc(1, header_sz);
  741. if (session->header->buffer == RT_NULL)
  742. {
  743. LOG_E("webclient create failed, no memory for session header buffer!");
  744. web_free(session->header);
  745. web_free(session);
  746. session = RT_NULL;
  747. return RT_NULL;
  748. }
  749. return session;
  750. }
  751. static int webclient_clean(struct webclient_session *session);
  752. /**
  753. * send GET request to http server and get response header.
  754. *
  755. * @param session webclient session
  756. * @param URI input server URI address
  757. * @param header GET request header
  758. * = NULL: use default header data
  759. * != NULL: use custom header data
  760. *
  761. * @return <0: send GET request failed
  762. * >0: response http status code
  763. */
  764. int webclient_get(struct webclient_session *session, const char *URI)
  765. {
  766. int rc = WEBCLIENT_OK;
  767. int resp_status = 0;
  768. RT_ASSERT(session);
  769. RT_ASSERT(URI);
  770. rc = webclient_connect(session, URI);
  771. if (rc != WEBCLIENT_OK)
  772. {
  773. /* connect to webclient server failed. */
  774. return rc;
  775. }
  776. rc = webclient_send_header(session, WEBCLIENT_GET);
  777. if (rc != WEBCLIENT_OK)
  778. {
  779. /* send header to webclient server failed. */
  780. return rc;
  781. }
  782. /* handle the response header of webclient server */
  783. resp_status = webclient_handle_response(session);
  784. LOG_D("get position handle response(%d).", resp_status);
  785. if (resp_status > 0)
  786. {
  787. const char *location = webclient_header_fields_get(session, "Location");
  788. /* relocation */
  789. if ((resp_status == 302 || resp_status == 301) && location)
  790. {
  791. char *new_url;
  792. new_url = web_strdup(location);
  793. if (new_url == RT_NULL)
  794. {
  795. return -WEBCLIENT_NOMEM;
  796. }
  797. /* clean webclient session */
  798. webclient_clean(session);
  799. /* clean webclient session header */
  800. session->header->length = 0;
  801. rt_memset(session->header->buffer, 0, session->header->size);
  802. rc = webclient_get(session, new_url);
  803. web_free(new_url);
  804. return rc;
  805. }
  806. }
  807. return resp_status;
  808. }
  809. /**
  810. * http breakpoint resume.
  811. *
  812. * @param session webclient session
  813. * @param URI input server URI address
  814. * @param position last downloaded position
  815. *
  816. * @return <0: send GET request failed
  817. * >0: response http status code
  818. */
  819. int webclient_get_position(struct webclient_session *session, const char *URI, int position)
  820. {
  821. int rc = WEBCLIENT_OK;
  822. int resp_status = 0;
  823. RT_ASSERT(session);
  824. RT_ASSERT(URI);
  825. rc = webclient_connect(session, URI);
  826. if (rc != WEBCLIENT_OK)
  827. {
  828. return rc;
  829. }
  830. /* splice header*/
  831. if (webclient_header_fields_add(session, "Range: bytes=%d-\r\n", position) <= 0)
  832. {
  833. rc = -WEBCLIENT_ERROR;
  834. return rc;
  835. }
  836. rc = webclient_send_header(session, WEBCLIENT_GET);
  837. if (rc != WEBCLIENT_OK)
  838. {
  839. return rc;
  840. }
  841. /* handle the response header of webclient server */
  842. resp_status = webclient_handle_response(session);
  843. LOG_D("get position handle response(%d).", resp_status);
  844. if (resp_status > 0)
  845. {
  846. const char *location = webclient_header_fields_get(session, "Location");
  847. /* relocation */
  848. if ((resp_status == 302 || resp_status == 301) && location)
  849. {
  850. char *new_url;
  851. new_url = web_strdup(location);
  852. if (new_url == RT_NULL)
  853. {
  854. return -WEBCLIENT_NOMEM;
  855. }
  856. /* clean webclient session */
  857. webclient_clean(session);
  858. /* clean webclient session header */
  859. session->header->length = 0;
  860. rt_memset(session->header->buffer, 0, session->header->size);
  861. rc = webclient_get_position(session, new_url, position);
  862. web_free(new_url);
  863. return rc;
  864. }
  865. }
  866. return resp_status;
  867. }
  868. /**
  869. * send POST request to server and get response header data.
  870. *
  871. * @param session webclient session
  872. * @param URI input server URI address
  873. * @param header POST request header, can't be empty
  874. * @param post_data data sent to the server
  875. * = NULL: just connect server and send header
  876. * != NULL: send header and body data, resolve response data
  877. *
  878. * @return <0: send POST request failed
  879. * =0: send POST header success
  880. * >0: response http status code
  881. */
  882. int webclient_post(struct webclient_session *session, const char *URI, const char *post_data)
  883. {
  884. int rc = WEBCLIENT_OK;
  885. int resp_status = 0;
  886. RT_ASSERT(session);
  887. RT_ASSERT(URI);
  888. rc = webclient_connect(session, URI);
  889. if (rc != WEBCLIENT_OK)
  890. {
  891. /* connect to webclient server failed. */
  892. return rc;
  893. }
  894. rc = webclient_send_header(session, WEBCLIENT_POST);
  895. if (rc != WEBCLIENT_OK)
  896. {
  897. /* send header to webclient server failed. */
  898. return rc;
  899. }
  900. if (post_data)
  901. {
  902. webclient_write(session, (unsigned char *) post_data, rt_strlen(post_data));
  903. /* resolve response data, get http status code */
  904. resp_status = webclient_handle_response(session);
  905. LOG_D("post handle response(%d).", resp_status);
  906. }
  907. return resp_status;
  908. }
  909. /**
  910. * set receive and send data timeout.
  911. *
  912. * @param session http session
  913. * @param millisecond timeout millisecond
  914. *
  915. * @return 0: set timeout success
  916. */
  917. int webclient_set_timeout(struct webclient_session *session, int millisecond)
  918. {
  919. struct timeval timeout;
  920. int second = rt_tick_from_millisecond(millisecond) / 1000;
  921. RT_ASSERT(session);
  922. timeout.tv_sec = second;
  923. timeout.tv_usec = 0;
  924. /* set recv timeout option */
  925. setsockopt(session->socket, SOL_SOCKET, SO_RCVTIMEO,
  926. (void *) &timeout, sizeof(timeout));
  927. setsockopt(session->socket, SOL_SOCKET, SO_SNDTIMEO,
  928. (void *) &timeout, sizeof(timeout));
  929. return 0;
  930. }
  931. static int webclient_next_chunk(struct webclient_session *session)
  932. {
  933. char line[64];
  934. int length;
  935. RT_ASSERT(session);
  936. rt_memset(line, 0x00, sizeof(line));
  937. length = webclient_read_line(session, line, sizeof(line));
  938. if (length > 0)
  939. {
  940. if (rt_strcmp(line, "\r") == 0)
  941. {
  942. length = webclient_read_line(session, line, sizeof(line));
  943. if (length <= 0)
  944. {
  945. closesocket(session->socket);
  946. session->socket = -1;
  947. return length;
  948. }
  949. }
  950. }
  951. else
  952. {
  953. closesocket(session->socket);
  954. session->socket = -1;
  955. return length;
  956. }
  957. session->chunk_sz = strtol(line, RT_NULL, 16);
  958. session->chunk_offset = 0;
  959. if (session->chunk_sz == 0)
  960. {
  961. /* end of chunks */
  962. closesocket(session->socket);
  963. session->socket = -1;
  964. session->chunk_sz = -1;
  965. }
  966. return session->chunk_sz;
  967. }
  968. /**
  969. * read data from http server.
  970. *
  971. * @param session http session
  972. * @param buffer read buffer
  973. * @param length the maximum of read buffer size
  974. *
  975. * @return <0: read data error
  976. * =0: http server disconnect
  977. * >0: successfully read data length
  978. */
  979. int webclient_read(struct webclient_session *session, unsigned char *buffer, size_t length)
  980. {
  981. int bytes_read = 0;
  982. int total_read = 0;
  983. int left;
  984. RT_ASSERT(session);
  985. /* get next chunk size is zero, client is already closed, return zero */
  986. if (session->chunk_sz < 0)
  987. {
  988. return 0;
  989. }
  990. if (session->socket < 0)
  991. {
  992. return -WEBCLIENT_DISCONNECT;
  993. }
  994. if (length == 0)
  995. {
  996. return 0;
  997. }
  998. /* which is transfered as chunk mode */
  999. if (session->chunk_sz)
  1000. {
  1001. if ((int) length > (session->chunk_sz - session->chunk_offset))
  1002. {
  1003. length = session->chunk_sz - session->chunk_offset;
  1004. }
  1005. bytes_read = webclient_recv(session, buffer, length, 0);
  1006. if (bytes_read <= 0)
  1007. {
  1008. if (errno == EWOULDBLOCK || errno == EAGAIN)
  1009. {
  1010. /* recv timeout */
  1011. return -WEBCLIENT_TIMEOUT;
  1012. }
  1013. else
  1014. {
  1015. closesocket(session->socket);
  1016. session->socket = -1;
  1017. return 0;
  1018. }
  1019. }
  1020. session->chunk_offset += bytes_read;
  1021. if (session->chunk_offset >= session->chunk_sz)
  1022. {
  1023. webclient_next_chunk(session);
  1024. }
  1025. return bytes_read;
  1026. }
  1027. if (session->content_length > 0)
  1028. {
  1029. if (length > session->content_remainder)
  1030. {
  1031. length = session->content_remainder;
  1032. }
  1033. if (length == 0)
  1034. {
  1035. return 0;
  1036. }
  1037. }
  1038. /*
  1039. * Read until: there is an error, we've read "size" bytes or the remote
  1040. * side has closed the connection.
  1041. */
  1042. left = length;
  1043. do
  1044. {
  1045. bytes_read = webclient_recv(session, buffer + total_read, left, 0);
  1046. if (bytes_read <= 0)
  1047. {
  1048. #if defined(WEBCLIENT_USING_SAL_TLS) || defined(WEBCLIENT_USING_MBED_TLS)
  1049. if(session->is_tls &&
  1050. (bytes_read == MBEDTLS_ERR_SSL_WANT_READ || bytes_read == MBEDTLS_ERR_SSL_WANT_WRITE))
  1051. {
  1052. continue;
  1053. }
  1054. #endif
  1055. LOG_D("receive data error(%d).", bytes_read);
  1056. if (total_read)
  1057. {
  1058. break;
  1059. }
  1060. else
  1061. {
  1062. if (errno == EWOULDBLOCK || errno == EAGAIN)
  1063. {
  1064. /* recv timeout */
  1065. LOG_E("receive data timeout.");
  1066. return -WEBCLIENT_TIMEOUT;
  1067. }
  1068. else
  1069. {
  1070. closesocket(session->socket);
  1071. session->socket = -1;
  1072. return 0;
  1073. }
  1074. }
  1075. }
  1076. left -= bytes_read;
  1077. total_read += bytes_read;
  1078. }
  1079. while (left);
  1080. if (session->content_length > 0)
  1081. {
  1082. session->content_remainder -= total_read;
  1083. }
  1084. return total_read;
  1085. }
  1086. /**
  1087. * write data to http server.
  1088. *
  1089. * @param session http session
  1090. * @param buffer write buffer
  1091. * @param length write buffer size
  1092. *
  1093. * @return <0: write data error
  1094. * =0: http server disconnect
  1095. * >0: successfully write data length
  1096. */
  1097. int webclient_write(struct webclient_session *session, const unsigned char *buffer, size_t length)
  1098. {
  1099. int bytes_write = 0;
  1100. int total_write = 0;
  1101. int left = length;
  1102. RT_ASSERT(session);
  1103. if (session->socket < 0)
  1104. {
  1105. return -WEBCLIENT_DISCONNECT;
  1106. }
  1107. if (length == 0)
  1108. {
  1109. return 0;
  1110. }
  1111. /* send all of data on the buffer. */
  1112. do
  1113. {
  1114. bytes_write = webclient_send(session, buffer + total_write, left, 0);
  1115. if (bytes_write <= 0)
  1116. {
  1117. #if defined(WEBCLIENT_USING_SAL_TLS) || defined(WEBCLIENT_USING_MBED_TLS)
  1118. if(session->is_tls &&
  1119. (bytes_write == MBEDTLS_ERR_SSL_WANT_READ || bytes_write == MBEDTLS_ERR_SSL_WANT_WRITE))
  1120. {
  1121. continue;
  1122. }
  1123. #endif
  1124. if (errno == EWOULDBLOCK || errno == EAGAIN)
  1125. {
  1126. /* send timeout */
  1127. if (total_write)
  1128. {
  1129. return total_write;
  1130. }
  1131. continue;
  1132. /* TODO: whether return the TIMEOUT
  1133. * return -WEBCLIENT_TIMEOUT; */
  1134. }
  1135. else
  1136. {
  1137. closesocket(session->socket);
  1138. session->socket = -1;
  1139. if (total_write == 0)
  1140. {
  1141. return -WEBCLIENT_DISCONNECT;
  1142. }
  1143. break;
  1144. }
  1145. }
  1146. left -= bytes_write;
  1147. total_write += bytes_write;
  1148. }
  1149. while (left);
  1150. return total_write;
  1151. }
  1152. /* close session socket, free host and request url */
  1153. static int webclient_clean(struct webclient_session *session)
  1154. {
  1155. #ifdef WEBCLIENT_USING_MBED_TLS
  1156. if (session->tls_session)
  1157. {
  1158. mbedtls_client_close(session->tls_session);
  1159. }
  1160. else
  1161. {
  1162. if (session->socket >= 0)
  1163. {
  1164. closesocket(session->socket);
  1165. session->socket = -1;
  1166. }
  1167. }
  1168. #else
  1169. if (session->socket >= 0)
  1170. {
  1171. closesocket(session->socket);
  1172. session->socket = -1;
  1173. }
  1174. #endif
  1175. if (session->host)
  1176. {
  1177. web_free(session->host);
  1178. }
  1179. if (session->req_url)
  1180. {
  1181. web_free(session->req_url);
  1182. }
  1183. session->content_length = -1;
  1184. return 0;
  1185. }
  1186. /**
  1187. * close a webclient client session.
  1188. *
  1189. * @param session http client session
  1190. *
  1191. * @return 0: close success
  1192. */
  1193. int webclient_close(struct webclient_session *session)
  1194. {
  1195. RT_ASSERT(session);
  1196. webclient_clean(session);
  1197. if (session->header && session->header->buffer)
  1198. {
  1199. web_free(session->header->buffer);
  1200. }
  1201. if (session->header)
  1202. {
  1203. web_free(session->header);
  1204. }
  1205. if (session)
  1206. {
  1207. web_free(session);
  1208. session = RT_NULL;
  1209. }
  1210. return 0;
  1211. }
  1212. /**
  1213. * get wenclient request response data.
  1214. *
  1215. * @param session wenclient session
  1216. * @param response response buffer address
  1217. *
  1218. * @return response data size
  1219. */
  1220. int webclient_response(struct webclient_session *session, unsigned char **response)
  1221. {
  1222. unsigned char *buf_ptr;
  1223. unsigned char *response_buf = 0;
  1224. int length, total_read = 0;
  1225. RT_ASSERT(session);
  1226. RT_ASSERT(response);
  1227. /* initialize response */
  1228. *response = RT_NULL;
  1229. /* not content length field kind */
  1230. if (session->content_length < 0)
  1231. {
  1232. size_t result_sz;
  1233. total_read = 0;
  1234. while (1)
  1235. {
  1236. unsigned char *new_resp = RT_NULL;
  1237. result_sz = total_read + WEBCLIENT_RESPONSE_BUFSZ;
  1238. new_resp = web_realloc(response_buf, result_sz + 1);
  1239. if (new_resp == RT_NULL)
  1240. {
  1241. LOG_E("no memory for realloc new response buffer!");
  1242. break;
  1243. }
  1244. response_buf = new_resp;
  1245. buf_ptr = (unsigned char *) response_buf + total_read;
  1246. /* read result */
  1247. length = webclient_read(session, buf_ptr, result_sz - total_read);
  1248. if (length <= 0)
  1249. break;
  1250. total_read += length;
  1251. }
  1252. }
  1253. else
  1254. {
  1255. int result_sz;
  1256. result_sz = session->content_length;
  1257. response_buf = web_calloc(1, result_sz + 1);
  1258. if (response_buf == RT_NULL)
  1259. {
  1260. return -WEBCLIENT_NOMEM;
  1261. }
  1262. buf_ptr = (unsigned char *) response_buf;
  1263. for (total_read = 0; total_read < result_sz;)
  1264. {
  1265. length = webclient_read(session, buf_ptr, result_sz - total_read);
  1266. if (length <= 0)
  1267. break;
  1268. buf_ptr += length;
  1269. total_read += length;
  1270. }
  1271. }
  1272. if ((total_read == 0) && (response_buf != 0))
  1273. {
  1274. web_free(response_buf);
  1275. response_buf = RT_NULL;
  1276. }
  1277. if (response_buf)
  1278. {
  1279. *response = response_buf;
  1280. *(response_buf + total_read) = '\0';
  1281. }
  1282. return total_read;
  1283. }
  1284. /**
  1285. * add request(GET/POST) header data.
  1286. *
  1287. * @param request_header add request buffer address
  1288. * @param fmt fields format
  1289. *
  1290. * @return <=0: add header failed
  1291. * >0: add header data size
  1292. */
  1293. int webclient_request_header_add(char **request_header, const char *fmt, ...)
  1294. {
  1295. rt_int32_t length, header_length;
  1296. char *header;
  1297. va_list args;
  1298. RT_ASSERT(request_header);
  1299. if (*request_header == RT_NULL)
  1300. {
  1301. header = rt_calloc(1, WEBCLIENT_HEADER_BUFSZ);
  1302. if (header == RT_NULL)
  1303. {
  1304. LOG_E("No memory for webclient request header add.");
  1305. return RT_NULL;
  1306. }
  1307. *request_header = header;
  1308. }
  1309. else
  1310. {
  1311. header = *request_header;
  1312. }
  1313. va_start(args, fmt);
  1314. header_length = rt_strlen(header);
  1315. length = rt_vsnprintf(header + header_length, WEBCLIENT_HEADER_BUFSZ - header_length, fmt, args);
  1316. if (length < 0)
  1317. {
  1318. LOG_E("add request header data failed, return length(%d) error.", length);
  1319. return -WEBCLIENT_ERROR;
  1320. }
  1321. va_end(args);
  1322. /* check header size */
  1323. if (rt_strlen(header) >= WEBCLIENT_HEADER_BUFSZ)
  1324. {
  1325. LOG_E("not enough request header data size(%d)!", WEBCLIENT_HEADER_BUFSZ);
  1326. return -WEBCLIENT_ERROR;
  1327. }
  1328. return length;
  1329. }
  1330. /**
  1331. * send request(GET/POST) to server and get response data.
  1332. *
  1333. * @param URI input server address
  1334. * @param header send header data
  1335. * = NULL: use default header data, must be GET request
  1336. * != NULL: user custom header data, GET or POST request
  1337. * @param post_data data sent to the server
  1338. * = NULL: it is GET request
  1339. * != NULL: it is POST request
  1340. * @param response response buffer address
  1341. *
  1342. * @return <0: request failed
  1343. * >=0: response buffer size
  1344. */
  1345. int webclient_request(const char *URI, const char *header, const char *post_data, unsigned char **response)
  1346. {
  1347. struct webclient_session *session = RT_NULL;
  1348. int rc = WEBCLIENT_OK;
  1349. int totle_length = 0;
  1350. RT_ASSERT(URI);
  1351. if (post_data == RT_NULL && response == RT_NULL)
  1352. {
  1353. LOG_E("request get failed, get response data cannot be empty.");
  1354. return -WEBCLIENT_ERROR;
  1355. }
  1356. if (post_data == RT_NULL)
  1357. {
  1358. /* send get request */
  1359. session = webclient_session_create(WEBCLIENT_HEADER_BUFSZ);
  1360. if (session == RT_NULL)
  1361. {
  1362. rc = -WEBCLIENT_NOMEM;
  1363. goto __exit;
  1364. }
  1365. if (header != RT_NULL)
  1366. {
  1367. char *header_str, *header_ptr;
  1368. int header_line_length;
  1369. for(header_str = (char *)header; (header_ptr = rt_strstr(header_str, "\r\n")) != RT_NULL; )
  1370. {
  1371. header_line_length = header_ptr + rt_strlen("\r\n") - header_str;
  1372. webclient_header_fields_add(session, "%.*s", header_line_length, header_str);
  1373. header_str += header_line_length;
  1374. }
  1375. }
  1376. if (webclient_get(session, URI) != 200)
  1377. {
  1378. rc = -WEBCLIENT_ERROR;
  1379. goto __exit;
  1380. }
  1381. totle_length = webclient_response(session, response);
  1382. if (totle_length <= 0)
  1383. {
  1384. rc = -WEBCLIENT_ERROR;
  1385. goto __exit;
  1386. }
  1387. }
  1388. else
  1389. {
  1390. /* send post request */
  1391. session = webclient_session_create(WEBCLIENT_HEADER_BUFSZ);
  1392. if (session == RT_NULL)
  1393. {
  1394. rc = -WEBCLIENT_NOMEM;
  1395. goto __exit;
  1396. }
  1397. if (header != RT_NULL)
  1398. {
  1399. char *header_str, *header_ptr;
  1400. int header_line_length;
  1401. for(header_str = (char *)header; (header_ptr = rt_strstr(header_str, "\r\n")) != RT_NULL; )
  1402. {
  1403. header_line_length = header_ptr + rt_strlen("\r\n") - header_str;
  1404. webclient_header_fields_add(session, "%.*s", header_line_length, header_str);
  1405. header_str += header_line_length;
  1406. }
  1407. }
  1408. if (rt_strstr(session->header->buffer, "Content-Length") == RT_NULL)
  1409. {
  1410. webclient_header_fields_add(session, "Content-Length: %d\r\n", rt_strlen(post_data));
  1411. }
  1412. if (rt_strstr(session->header->buffer, "Content-Type") == RT_NULL)
  1413. {
  1414. webclient_header_fields_add(session, "Content-Type: application/octet-stream\r\n");
  1415. }
  1416. if (webclient_post(session, URI, post_data) != 200)
  1417. {
  1418. rc = -WEBCLIENT_ERROR;
  1419. goto __exit;
  1420. }
  1421. totle_length = webclient_response(session, response);
  1422. if (totle_length <= 0)
  1423. {
  1424. rc = -WEBCLIENT_ERROR;
  1425. goto __exit;
  1426. }
  1427. }
  1428. __exit:
  1429. if (session)
  1430. {
  1431. webclient_close(session);
  1432. session = RT_NULL;
  1433. }
  1434. if (rc < 0)
  1435. {
  1436. return rc;
  1437. }
  1438. return totle_length;
  1439. }
  1440. #endif /* RT_USING_SAL */