summaryrefslogtreecommitdiff
path: root/FreeRTOS-Labs/Source/FreeRTOS-IoT-Libraries/c_sdk/standard/https/src/iot_https_client.c
diff options
context:
space:
mode:
Diffstat (limited to 'FreeRTOS-Labs/Source/FreeRTOS-IoT-Libraries/c_sdk/standard/https/src/iot_https_client.c')
-rw-r--r--FreeRTOS-Labs/Source/FreeRTOS-IoT-Libraries/c_sdk/standard/https/src/iot_https_client.c3365
1 files changed, 3365 insertions, 0 deletions
diff --git a/FreeRTOS-Labs/Source/FreeRTOS-IoT-Libraries/c_sdk/standard/https/src/iot_https_client.c b/FreeRTOS-Labs/Source/FreeRTOS-IoT-Libraries/c_sdk/standard/https/src/iot_https_client.c
new file mode 100644
index 000000000..eb468674c
--- /dev/null
+++ b/FreeRTOS-Labs/Source/FreeRTOS-IoT-Libraries/c_sdk/standard/https/src/iot_https_client.c
@@ -0,0 +1,3365 @@
+/*
+ * Amazon FreeRTOS HTTPS Client V1.1.0
+ * Copyright (C) 2019 Amazon.com, Inc. or its affiliates. All Rights Reserved.
+ *
+ * Permission is hereby granted, free of charge, to any person obtaining a copy of
+ * this software and associated documentation files (the "Software"), to deal in
+ * the Software without restriction, including without limitation the rights to
+ * use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
+ * the Software, and to permit persons to whom the Software is furnished to do so,
+ * subject to the following conditions:
+ *
+ * The above copyright notice and this permission notice shall be included in all
+ * copies or substantial portions of the Software.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+ * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
+ * FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
+ * COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
+ * IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
+ * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
+ *
+ * http://aws.amazon.com/freertos
+ * http://www.FreeRTOS.org
+ */
+
+/**
+ * @file iot_https_client.c
+ * @brief Implementation of the user-facing functions of the Amazon FreeRTOS HTTPS Client library.
+ */
+
+/* The config header is always included first. */
+#include "iot_config.h"
+
+/* HTTPS Client library private includes. */
+#include "private/iot_https_internal.h"
+
+/*-----------------------------------------------------------*/
+
+/**
+ * @brief Partial HTTPS request first line.
+ *
+ * This is used for the calculation of the requestUserBufferMinimumSize.
+ * The minimum path is "/" because we cannot know how long the application requested path is is going to be.
+ * CONNECT is the longest string length HTTP method according to RFC 2616.
+ */
+#define HTTPS_PARTIAL_REQUEST_LINE HTTPS_CONNECT_METHOD " " HTTPS_EMPTY_PATH " " HTTPS_PROTOCOL_VERSION
+
+/**
+ * @brief The User-Agent header line string.
+ *
+ * This is of the form:
+ * "User-Agent: <configured-user-agent>\r\n"
+ * This is used for the calculation of the requestUserBufferMinimumSize.
+ */
+#define HTTPS_USER_AGENT_HEADER_LINE HTTPS_USER_AGENT_HEADER HTTPS_HEADER_FIELD_SEPARATOR IOT_HTTPS_USER_AGENT HTTPS_END_OF_HEADER_LINES_INDICATOR
+
+/**
+ * @brief The Host header line with the field only and not the value.
+ *
+ * This is of the form:
+ * "Host: \r\n"
+ * This is used for the calculation of the requestUserBufferMinimumSize. The Host value is not specified because we
+ * cannot anticipate what server the client is making requests to.
+ */
+#define HTTPS_PARTIAL_HOST_HEADER_LINE HTTPS_HOST_HEADER HTTPS_HEADER_FIELD_SEPARATOR HTTPS_END_OF_HEADER_LINES_INDICATOR
+
+/**
+ * String constants for the Connection header and possible values.
+ *
+ * This is used for writing headers automatically during the sending of the HTTP request.
+ * "Connection: keep-alive\r\n" is written automatically for a persistent connection.
+ * "Connection: close\r\n" is written automatically for a non-persistent connection.
+ */
+#define HTTPS_CONNECTION_KEEP_ALIVE_HEADER_LINE HTTPS_CONNECTION_HEADER HTTPS_HEADER_FIELD_SEPARATOR HTTPS_CONNECTION_KEEP_ALIVE_HEADER_VALUE HTTPS_END_OF_HEADER_LINES_INDICATOR /**< @brief String literal for "Connection: keep-alive\r\n". */
+#define HTTPS_CONNECTION_CLOSE_HEADER_LINE HTTPS_CONNECTION_HEADER HTTPS_HEADER_FIELD_SEPARATOR HTTPS_CONNECTION_CLOSE_HEADER_VALUE HTTPS_END_OF_HEADER_LINES_INDICATOR /**< @brief String literal for "Connection: close\r\n". */
+
+/**
+ * @brief The length of the "Connection: keep-alive\r\n" header.
+ *
+ * This is used for sizing a local buffer for the final headers to send that include the "Connection: keep-alive\r\n"
+ * header line.
+ *
+ * This is used to initialize a local array for the final headers to send.
+ */
+#define HTTPS_CONNECTION_KEEP_ALIVE_HEADER_LINE_LENGTH ( 24 )
+
+/**
+ * Indicates for the http-parser parsing execution function to tell it to keep parsing or to stop parsing.
+ *
+ * A value of 0 means the parser should keep parsing if there is more unparsed length.
+ * A value greater than 0 tells the parser to stop parsing.
+ */
+#define KEEP_PARSING ( ( int ) 0 ) /**< @brief Indicator in the http-parser callback to keep parsing when the function returns. */
+#define STOP_PARSING ( ( int ) 1 ) /**< @brief Indicator in the http-parser callback to stop parsing when the function returns. */
+
+/*-----------------------------------------------------------*/
+
+/**
+ * @brief Minimum size of the request user buffer.
+ *
+ * The request user buffer is configured in IotHttpsClientRequestInfo_t.userBuffer. This buffer stores the internal context
+ * of the request and then the request headers right after. The minimum size for the buffer is the total size of the
+ * internal request context, the HTTP formatted request line, the User-Agent header line, and the part of the Host
+ * header line.
+ */
+const uint32_t requestUserBufferMinimumSize = sizeof( _httpsRequest_t ) +
+ sizeof( HTTPS_PARTIAL_REQUEST_LINE ) +
+ sizeof( HTTPS_USER_AGENT_HEADER_LINE ) +
+ sizeof( HTTPS_PARTIAL_HOST_HEADER_LINE );
+
+/**
+ * @brief Minimum size of the response user buffer.
+ *
+ * The response user buffer is configured in IotHttpsClientRequestInfo_t.userBuffer. This buffer stores the internal context
+ * of the response and then the response headers right after. This minimum size is calculated for the case if no bytes
+ * from the HTTP response headers are to be stored.
+ */
+const uint32_t responseUserBufferMinimumSize = sizeof( _httpsResponse_t );
+
+/**
+ * @brief Minimum size of the connection user buffer.
+ *
+ * The connection user buffer is configured in IotHttpsConnectionInfo_t.userBuffer. This buffer stores the internal context of the
+ * connection.
+ */
+const uint32_t connectionUserBufferMinimumSize = sizeof( _httpsConnection_t );
+
+/*-----------------------------------------------------------*/
+
+/**
+ * @brief Callback from http-parser to indicate the start of the HTTP response message is reached.
+ *
+ * See https://github.com/nodejs/http-parser for more information.
+ *
+ * @param[in] pHttpParser - http-parser state structure.
+ *
+ * @return 0 to tell http-parser to keep parsing.
+ * 1 to tell http-parser that parsing should stop return from http_parser_execute with error HPE_CB_message_begin.
+ */
+static int _httpParserOnMessageBeginCallback( http_parser * pHttpParser );
+
+/**
+ * @brief Callback from http-parser to indicate it found the HTTP response status code.
+ *
+ * See https://github.com/nodejs/http-parser for more information.
+ *
+ * @param[in] pHttpParser - http-parser state structure.
+ * @param[in] pLoc - Pointer to the HTTP response status code string in the response message buffer.
+ * @param[in] length - The length of the HTTP response status code string.
+ *
+ * @return 0 to tell http-parser to keep parsing.
+ * 1 to tell http-parser that parsing should stop return from http_parser_execute with error HPE_CB_status.
+ */
+static int _httpParserOnStatusCallback( http_parser * pHttpParser,
+ const char * pLoc,
+ size_t length );
+
+/**
+ * @brief Callback from http-parser to indicate it found an HTTP response header field.
+ *
+ * If only part of the header field was returned here in this callback, then this callback will be invoked again the
+ * next time the parser executes on the next part of the header field.
+ *
+ * See https://github.com/nodejs/http-parser for more information.
+ *
+ * @param[in] pHttpParser - http-parser state structure.
+ * @param[in] pLoc - Pointer to the header field string in the response message buffer.
+ * @param[in] length - The length of the header field.
+ *
+ * @return 0 to tell http-parser to keep parsing.
+ * 1 to tell http-parser that parsing should stop return from http_parser_execute with error HPE_CB_header_field.
+ */
+static int _httpParserOnHeaderFieldCallback( http_parser * pHttpParser,
+ const char * pLoc,
+ size_t length );
+
+/**
+ * @brief Callback from http-parser to indicate it found an HTTP response header value.
+ *
+ * This value corresponds to the field that was found in the _httpParserOnHeaderFieldCallback() called immediately
+ * before this callback was called.
+ *
+ * If only part of the header value was returned here in this callback, then this callback will be invoked again the
+ * next time the parser executes on the next part of the header value.
+ *
+ * See https://github.com/nodejs/http-parser for more information.
+ *
+ * @param[in] pHttpParser - http-parser state structure.
+ * @param[in] pLoc - Pointer to the header value string in the response message buffer.
+ * @param[in] length - The length of the header value.
+ *
+ * @return 0 to tell http-parser to keep parsing.
+ * 1 to tell http-parser that parsing should stop return from http_parser_execute with error HPE_CB_header_value.
+ */
+static int _httpParserOnHeaderValueCallback( http_parser * pHttpParser,
+ const char * pLoc,
+ size_t length );
+
+/**
+ * @brief Callback from http-parser to indicate it reached the end of the headers in the HTTP response message.
+ *
+ * The end of the headers is signalled in a HTTP response message by another "\r\n" after the final header line.
+ *
+ * See https://github.com/nodejs/http-parser for more information.
+ *
+ * @param[in] pHttpParser - http-parser state structure.
+ *
+ * @return 0 to tell http-parser to keep parsing.
+ * 1 to tell http-parser that parsing should stop return from http_parser_execute with error HPE_CB_headers_complete.
+ */
+static int _httpParserOnHeadersCompleteCallback( http_parser * pHttpParser );
+
+/**
+ * @brief Callback from http-parser to indicate it found HTTP response body.
+ *
+ * This callback will be invoked multiple times if the response body is of "Transfer-Encoding: chunked".
+ * _httpParserOnChunkHeaderCallback() will be invoked first, then _httpParserOnBodyCallback(), then
+ * _httpParserOnChunkCompleteCallback(), then repeated back to _httpParserOnChunkHeaderCallback() if there are more
+ * "chunks".
+ *
+ * See https://github.com/nodejs/http-parser for more information.
+ *
+ * @param[in] pHttpParser - http-parser state structure.
+ * @param[in] pLoc - Pointer to the body string in the response message buffer.
+ * @param[in] length - The length of the body found.
+ *
+ * @return 0 to tell http-parser to keep parsing.
+ * 1 to tell http-parser that parsing should stop return from http_parser_execute with error HPE_CB_body.
+ */
+static int _httpParserOnBodyCallback( http_parser * pHttpParser,
+ const char * pLoc,
+ size_t length );
+
+/**
+ * @brief Callback from http-parser to indicate it reached the end of the HTTP response message.
+ *
+ * The end of the message is signalled in a HTTP response message by another "\r\n" after the final header line, with no
+ * entity body; or it is signaled by "\r\n" at the end of the entity body.
+ *
+ * For a Transfer-Encoding: chunked type of response message, the end of the message is signalled by a terminating
+ * chunk header with length zero.
+ *
+ * See https://github.com/nodejs/http-parser for more information.
+ *
+ * @param[in] pHttpParser - http-parser state structure.
+ *
+ * @return 0 to tell http-parser to keep parsing.
+ * 1 to tell http-parser that parsing should stop return from http_parser_execute with error HPE_CB_message_complete.
+ */
+static int _httpParserOnMessageCompleteCallback( http_parser * pHttpParser );
+
+/* This code prints debugging information and is, therefore, compiled only when
+ * log level is set to IOT_LOG_DEBUG. */
+#if ( LIBRARY_LOG_LEVEL == IOT_LOG_DEBUG )
+
+/**
+ * @brief Callback from http-parser to indicate it found an HTTP Transfer-Encoding: chunked header.
+ *
+ * Transfer-Encoding: chunked headers are embedded in the HTTP response entity body by a "\r\n" followed by the size of
+ * the chunk followed by another "\r\n".
+ *
+ * If only part of the header field was returned here in this callback, then this callback will be invoked again the
+ * next time the parser executes on the next part of the header field.
+ *
+ * See https://github.com/nodejs/http-parser for more information.
+ *
+ * @param[in] pHttpParser - http-parser state structure.
+ *
+ * @return 0 to tell http-parser to keep parsing.
+ * 1 to tell http-parser that parsing should stop return from http_parser_execute with error HPE_CB_chunk_header.
+ */
+ static int _httpParserOnChunkHeaderCallback( http_parser * pHttpParser );
+
+/**
+ * @brief Callback from http-parser to indicate it reached the end of an HTTP response message "chunk".
+ *
+ * A chunk is complete when the chunk header size is read fully in the body.
+ *
+ * See https://github.com/nodejs/http-parser for more information.
+ *
+ * @param[in] pHttpParser - http-parser state structure.
+ *
+ * @return 0 to tell http-parser to keep parsing.
+ * 1 to tell http-parser that parsing should stop return from http_parser_execute with error HPE_CB_chunk_complete.
+ */
+ static int _httpParserOnChunkCompleteCallback( http_parser * pHttpParser );
+#endif
+
+/**
+ * @brief Network receive callback for the HTTPS Client library.
+ *
+ * This function is called by the network layer whenever data is available for the HTTP library.
+ *
+ * @param[in] pNetworkConnection - The network connection with the HTTPS connection, passed by the network stack.
+ * @param[in] pReceiveContext - A pointer to the HTTPS Client connection handle for which the packet was received.
+ */
+static void _networkReceiveCallback( void * pNetworkConnection,
+ void * pReceiveContext );
+
+/**
+ * @brief Connects to HTTPS server and initializes the connection context.
+ *
+ * @param[out] pConnHandle - The out parameter to return handle representing the open connection.
+ * @param[in] pConnInfo - The connection configuration.
+ *
+ * @return #IOT_HTTPS_OK if the connection context initialization was successful.
+ * #IOT_HTTPS_CONNECTION_ERROR if the connection failed.
+ * #IOT_HTTPS_INTERNAL_ERROR if the context initialization failed.
+ */
+static IotHttpsReturnCode_t _createHttpsConnection( IotHttpsConnectionHandle_t * pConnHandle,
+ IotHttpsConnectionInfo_t * pConnInfo );
+
+/**
+ * @brief Disconnects from the network.
+ *
+ * @param[in] pHttpsConnection - HTTPS connection handle.
+ */
+static void _networkDisconnect( _httpsConnection_t * pHttpsConnection );
+
+/**
+ * @brief Destroys the network connection.
+ *
+ * @param[in] pHttpsConnection - HTTPS connection handle.
+ */
+static void _networkDestroy( _httpsConnection_t * pHttpsConnection );
+
+/**
+ * @brief Add a header to the current HTTP request.
+ *
+ * The headers are stored in reqHandle->pHeaders.
+ *
+ * @param[in] pHttpsRequest - HTTP request context.
+ * @param[in] pName - The name of the header to add.
+ * @param[in] nameLen - The length of the header name string.
+ * @param[in] pValue - The buffer containing the value string.
+ * @param[in] valueLen - The length of the header value string.
+ *
+ * @return #IOT_HTTPS_OK if the header was added to the request successfully.
+ * #IOT_HTTPS_INSUFFICIENT_MEMORY if there was not enough room in the IotHttpsRequestHandle_t->pHeaders.
+ */
+static IotHttpsReturnCode_t _addHeader( _httpsRequest_t * pHttpsRequest,
+ const char * pName,
+ uint32_t nameLen,
+ const char * pValue,
+ uint32_t valueLen );
+
+/**
+ * @brief Send data on the network.
+ *
+ * @param[in] pHttpsConnection - HTTP connection context.
+ * @param[in] pBuf - The buffer containing the data to send.
+ * @param[in] len - The length of the data to send.
+ *
+ * @return #IOT_HTTPS_OK if the data sent successfully.
+ * #IOT_HTTPS_NETWORK_ERROR if there was an error sending the data on the network.
+ */
+static IotHttpsReturnCode_t _networkSend( _httpsConnection_t * pHttpsConnection,
+ uint8_t * pBuf,
+ size_t len );
+
+/**
+ * @brief Receive data on the network.
+ *
+ * @param[in] pHttpsConnection - HTTP connection context.
+ * @param[in] pBuf - The buffer to receive the data into.
+ * @param[in] bufLen - The length of the data to receive.
+ * @param[in] numBytesRecv - The number of bytes read from the network.
+ *
+ * @return #IOT_HTTPS_OK if the data was received successfully.
+ * #IOT_HTTPS_NETWORK_ERROR if we timedout trying to receive data from the network.
+ */
+static IotHttpsReturnCode_t _networkRecv( _httpsConnection_t * pHttpsConnection,
+ uint8_t * pBuf,
+ size_t bufLen,
+ size_t * numBytesRecv );
+
+/**
+ * @brief Send all of the HTTP request headers in the pHeadersBuf and the final Content-Length and Connection headers.
+ *
+ * All of the headers in headerbuf are sent first followed by the computed content length and persistent connection
+ * indication.
+ *
+ * @param[in] pHttpsConnection - HTTP connection context.
+ * @param[in] pHeadersBuf - The buffer containing the request headers to send. This buffer must contain HTTP headers
+ * lines without the indicator for the the end of the HTTP headers.
+ * @param[in] headersLength - The length of the request headers to send.
+ * @param[in] isNonPersistent - Indicator of whether the connection is persistent or not.
+ * @param[in] contentLength - The length of the request body used for automatically creating a "Content-Length" header.
+ *
+ * @return #IOT_HTTPS_OK if the headers were fully sent successfully.
+ * #IOT_HTTPS_NETWORK_ERROR if there was an error receiving the data on the network.
+ */
+static IotHttpsReturnCode_t _sendHttpsHeaders( _httpsConnection_t * pHttpsConnection,
+ uint8_t * pHeadersBuf,
+ uint32_t headersLength,
+ bool isNonPersistent,
+ uint32_t contentLength );
+
+/**
+ * @brief Send all of the HTTP request body in pBodyBuf.
+ *
+ * @param[in] pHttpsConnection - HTTP connection context.
+ * @param[in] pBodyBuf - Buffer of the request body to send.
+ * @param[in] bodyLength - The length of the body to send.
+ *
+ * @return #IOT_HTTPS_OK if the body was fully sent successfully.
+ * #IOT_HTTPS_NETWORK_ERROR if there was an error receiving the data on the network.
+ */
+static IotHttpsReturnCode_t _sendHttpsBody( _httpsConnection_t * pHttpsConnection,
+ uint8_t * pBodyBuf,
+ uint32_t bodyLength );
+
+/**
+ * @brief Parse the HTTP response message in pBuf.
+ *
+ * @param[in] pHttpParserInfo - Pointer to the information containing the instance of the http-parser and the execution function.
+ * @param[in] pBuf - The buffer containing the data to parse.
+ * @param[in] len - The length of data to parse.
+ *
+ * @return #IOT_HTTPS_OK if the data was parsed successfully.
+ * #IOT_HTTPS_PARSING_ERROR if there was an error with parsing the data.
+ */
+static IotHttpsReturnCode_t _parseHttpsMessage( _httpParserInfo_t * pHttpParserInfo,
+ char * pBuf,
+ size_t len );
+
+/**
+ * @brief Receive any part of an HTTP response.
+ *
+ * This function is used for both receiving the body into the body buffer and receiving the header into the header
+ * buffer.
+ *
+ * @param[in] pHttpsConnection - HTTP Connection context.
+ * @param[in] pParser - Pointer to the instance of the http-parser.
+ * @param[in] pCurrentParserState - The current state of what has been parsed in the HTTP response.
+ * @param[in] finalParserState - The final state of the parser expected after this function finishes.
+ * @param[in] currentBufferProcessingState - The current buffer that is the HTTPS message is being received into.
+ * @param[in] pBufCur - Pointer to the next location to write data into the buffer pBuf. This is a double pointer to update the response context buffer pointers.
+ * @param[in] pBufEnd - Pointer to the end of the buffer to receive the HTTP response into.
+ *
+ * @return #IOT_HTTPS_OK if we received the HTTP response message part successfully.
+ * #IOT_HTTPS_PARSING_ERROR if there was an error with parsing the data.
+ * #IOT_HTTPS_NETWORK_ERROR if there was an error receiving the data on the network.
+ */
+static IotHttpsReturnCode_t _receiveHttpsMessage( _httpsConnection_t * pHttpsConnection,
+ _httpParserInfo_t * pParser,
+ IotHttpsResponseParserState_t * pCurrentParserState,
+ IotHttpsResponseParserState_t finalParserState,
+ IotHttpsResponseBufferState_t currentBufferProcessingState,
+ uint8_t ** pBufCur,
+ uint8_t ** pBufEnd );
+
+/**
+ * @brief Receive the HTTP response headers.
+ *
+ * Receiving the response headers is always the first step in receiving the response, therefore the
+ * pHttpsResponse->httpParserInfo will be initialized to a starting state when this function is called.
+ *
+ * This function also sets internal states to indicate that the header buffer is being processed now for a new response.
+ *
+ * @param[in] pHttpsConnection - HTTP connection context.
+ * @param[in] pHttpsResponse - HTTP response context.
+ *
+ * @return #IOT_HTTPS_OK if we received the HTTP headers successfully.
+ * #IOT_HTTPS_PARSING_ERROR if there was an error with parsing the header buffer.
+ * #IOT_HTTPS_NETWORK_ERROR if there was an error receiving the data on the network.
+ */
+static IotHttpsReturnCode_t _receiveHttpsHeaders( _httpsConnection_t * pHttpsConnection,
+ _httpsResponse_t * pHttpsResponse );
+
+/**
+ * @brief Receive the HTTP response body.
+ *
+ * Sets internal states to indicate that the the body buffer is being processed now for a new response.
+ *
+ * @param[in] pHttpsConnection - HTTP connection context.
+ * @param[in] pHttpsResponse - HTTP response context.
+ *
+ * @return #IOT_HTTPS_OK if we received the HTTP body successfully.
+ * #IOT_HTTPS_PARSING_ERROR if there was an error with parsing the body buffer.
+ * #IOT_HTTPS_NETWORK_ERROR if there was an error receiving the data on the network.
+ */
+static IotHttpsReturnCode_t _receiveHttpsBody( _httpsConnection_t * pHttpsConnection,
+ _httpsResponse_t * pHttpsResponse );
+
+/**
+ * @brief Read the rest of any HTTP response that may be on the network.
+ *
+ * This reads the rest of any left over response data that might still be on the network buffers. We do not want this
+ * data left over because it will spill into the header and body buffers of next response that we try to receive.
+ *
+ * If we performed a request without a body and the headers received exceeds the size of the
+ * pHttpsResponse->pHeaders buffer, then we need to flush the network buffer.
+ *
+ * If the application configured the body buffer as null in IotHttpsResponseInfo_t.syncInfo.respData and the server
+ * sends body in the response, but it exceeds the size of pHttpsResponse->pHeaders buffer, then we need to flush the
+ * network buffer.
+ *
+ * If the amount of body received on the network does not fit into a non-null IotHttpsResponseInfo_t.syncInfo.respData,
+ * then we need to flush the network buffer.
+ *
+ * If an asynchronous request cancels in the middle of a response process, after already sending the request message,
+ * then we need to flush the network buffer.
+ *
+ * @param[in] pHttpsConnection - HTTP connection context.
+ * @param[in] pHttpsResponse - HTTP response context.
+ *
+ * @return #IOT_HTTPS_OK if we successfully flushed the network data.
+ * #IOT_HTTPS_PARSING_ERROR if there was an error with parsing the data.
+ * #IOT_HTTPS_NETWORK_ERROR if there was an error receiving the data on the network.
+ */
+static IotHttpsReturnCode_t _flushHttpsNetworkData( _httpsConnection_t * pHttpsConnection,
+ _httpsResponse_t * pHttpsResponse );
+
+/**
+ * @brief Task pool job routine to send the HTTP request within the pUserContext.
+ *
+ * @param[in] pTaskPool Pointer to the system task pool.
+ * @param[in] pJob Pointer the to the HTTP request sending job.
+ * @param[in] pUserContext Pointer to an HTTP request, passed as an opaque context.
+ */
+static void _sendHttpsRequest( IotTaskPool_t pTaskPool,
+ IotTaskPoolJob_t pJob,
+ void * pUserContext );
+
+
+/**
+ * @brief Receive the HTTPS body specific to an asynchronous type of response.
+ *
+ * @param[in] pHttpsResponse - HTTP response context.
+ *
+ * @return #IOT_HTTPS_OK - If the the response body was received with no issues.
+ * #IOT_HTTPS_RECEIVE_ABORT - If the request was cancelled by the Application
+ * #IOT_HTTPS_PARSING_ERROR - If there was an issue parsing the HTTP response body.
+ * #IOT_HTTPS_NETWORK_ERROR if there was an error receiving the data on the network.
+ */
+static IotHttpsReturnCode_t _receiveHttpsBodyAsync( _httpsResponse_t * pHttpsResponse );
+
+/**
+ * @brief Receive the HTTPS body specific to a synchronous type of response.
+ *
+ * @param[in] pHttpsResponse - HTTP response context.
+ *
+ * @return #IOT_HTTPS_OK - If the the response body was received with no issues.
+ * #IOT_HTTPS_MESSAGE_TOO_LARGE - If the body from the network is too large to fit into the configured body buffer.
+ * #IOT_HTTPS_PARSING_ERROR - If there was an issue parsing the HTTP response body.
+ * #IOT_HTTPS_NETWORK_ERROR if there was an error receiving the data on the network.
+ */
+static IotHttpsReturnCode_t _receiveHttpsBodySync( _httpsResponse_t * pHttpsResponse );
+
+/**
+ * @brief Schedule the task to send the the HTTP request.
+ *
+ * @param[in] pHttpsRequest - HTTP request context.
+ *
+ * @return #IOT_HTTPS_OK - If the task to send the HTTP request was successfully scheduled.
+ * #IOT_HTTPS_INTERNAL_ERROR - If a taskpool job could not be created.
+ * #IOT_HTTPS_ASYNC_SCHEDULING_ERROR - If there was an error scheduling the job.
+ */
+IotHttpsReturnCode_t _scheduleHttpsRequestSend( _httpsRequest_t * pHttpsRequest );
+
+/**
+ * @brief Add the request to the connection's request queue.
+ *
+ * This will schedule a task if the request is first and only request in the queue.
+ *
+ * @param[in] pHttpsRequest - HTTP request context.
+ *
+ * @return #IOT_HTTPS_OK - If the request was successfully added to the connection's request queue.
+ * #IOT_HTTPS_INTERNAL_ERROR - If a taskpool job could not be created.
+ * #IOT_HTTPS_ASYNC_SCHEDULING_ERROR - If there was an error scheduling the job.
+ */
+IotHttpsReturnCode_t _addRequestToConnectionReqQ( _httpsRequest_t * pHttpsRequest );
+
+/**
+ * @brief Cancel the HTTP request's processing.
+ *
+ * pHttpsRequest->cancelled will be checked and the request cancelled if specified so at the following intervals:
+ * - Before sending the HTTPS headers at the start of the scheduled sending of the HTTPS request.
+ * - After Sending the HTTPS headers.
+ * - After Sending the HTTPS body.
+ *
+ * @param[in] pHttpsRequest - HTTP request context.
+ */
+static void _cancelRequest( _httpsRequest_t * pHttpsRequest );
+
+/**
+ * @brief Cancel the HTTP response's processing.
+ *
+ * pHttpsResponse->cancelled will be checked and the response cancelled if specified so at the following intervals:
+ * - At the start of the network receive callback.
+ * - After receiving the HTTPS headers.
+ * - After Receiving the HTTPS body.
+ *
+ * @param[in] pHttpsResponse - HTTP response context.
+ */
+static void _cancelResponse( _httpsResponse_t * pHttpsResponse );
+
+/**
+ * @brief Initialize the input pHttpsResponse with pRespInfo.
+ *
+ * @param[in] pRespHandle - Non-null HTTP response context.
+ * @param[in] pRespInfo - Response configuration information.
+ * @param[in] pHttpsRequest - HTTP request to grab async information, persistence, and method from.
+ */
+static IotHttpsReturnCode_t _initializeResponse( IotHttpsResponseHandle_t * pRespHandle,
+ IotHttpsResponseInfo_t * pRespInfo,
+ _httpsRequest_t * pHttpsRequest );
+
+/**
+ * @brief Increment the pointer stored in pBufCur depending on the character found in there.
+ *
+ * This function increments the pHeadersCur pointer further if the message ended with a header line delimiter.
+ *
+ * @param[in] pBufCur - Pointer to the next location to write data into the buffer pBuf. This is a double pointer to update the response context buffer pointers.
+ * @param[in] pBufEnd - Pointer to the end of the buffer to receive the HTTP response into.
+ */
+static void _incrementNextLocationToWriteBeyondParsed( uint8_t ** pBufCur,
+ uint8_t ** pBufEnd );
+
+/**
+ * @brief Send the HTTPS headers and body referenced in pHttpsRequest.
+ *
+ * Sends both the headers and body over the network.
+ *
+ * @param[in] pHttpsConnection - HTTPS connection context.
+ * @param[in] pHttpsRequest - HTTPS request context.
+ */
+static IotHttpsReturnCode_t _sendHttpsHeadersAndBody( _httpsConnection_t * pHttpsConnection,
+ _httpsRequest_t * pHttpsRequest );
+
+/*-----------------------------------------------------------*/
+
+/**
+ * @brief Definition of the http-parser settings.
+ *
+ * The http_parser_settings holds all of the callbacks invoked by the http-parser.
+ */
+static http_parser_settings _httpParserSettings = { 0 };
+
+/*-----------------------------------------------------------*/
+
+static int _httpParserOnMessageBeginCallback( http_parser * pHttpParser )
+{
+ int retVal = KEEP_PARSING;
+
+ IotLogDebug( "Parser: Start of HTTPS Response message." );
+
+ _httpsResponse_t * pHttpsResponse = ( _httpsResponse_t * ) ( pHttpParser->data );
+ /* Set the state of the parser. The headers are at the start of the message always. */
+ pHttpsResponse->parserState = PARSER_STATE_IN_HEADERS;
+ return retVal;
+}
+
+/*-----------------------------------------------------------*/
+
+static int _httpParserOnStatusCallback( http_parser * pHttpParser,
+ const char * pLoc,
+ size_t length )
+{
+ _httpsResponse_t * pHttpsResponse = ( _httpsResponse_t * ) ( pHttpParser->data );
+
+ IotLogDebug( "Parser: Status %.*s retrieved from HTTPS response.", length, pLoc );
+
+ /* Save the status code so it can be retrieved with IotHttpsClient_ReadResponseStatus(). */
+ pHttpsResponse->status = ( uint16_t ) ( pHttpParser->status_code );
+
+ /* If we are parsing the network data received in the header buffer then we
+ * increment pHttpsResponse->pHeadersCur. The status line in the response is
+ * part of the data stored in header buffer _httpResponse->pHeaders. */
+ if( pHttpsResponse->bufferProcessingState == PROCESSING_STATE_FILLING_HEADER_BUFFER )
+ {
+ /* pHeadersCur will never exceed the pHeadersEnd here because PROCESSING_STATE_FILLING_HEADER_BUFFER
+ * indicates we are currently in the header buffer and the total size of the header buffer is passed
+ * into http_parser_execute() as the maximum length to parse. */
+ pHttpsResponse->pHeadersCur = ( uint8_t * ) ( pLoc += length );
+ }
+
+ return KEEP_PARSING;
+}
+
+/*-----------------------------------------------------------*/
+
+static int _httpParserOnHeaderFieldCallback( http_parser * pHttpParser,
+ const char * pLoc,
+ size_t length )
+{
+ IotLogDebug( "Parser: HTTPS header field parsed %.*s", length, pLoc );
+
+ _httpsResponse_t * pHttpsResponse = ( _httpsResponse_t * ) ( pHttpParser->data );
+
+ /* If we are parsing the network data received in the header buffer then we can increment
+ * pHttpsResponse->pHeadersCur. */
+ if( pHttpsResponse->bufferProcessingState == PROCESSING_STATE_FILLING_HEADER_BUFFER )
+ {
+ pHttpsResponse->pHeadersCur = ( uint8_t * ) ( pLoc += length );
+ }
+
+ /* If the IotHttpsClient_ReadHeader() was called, then we check for the header field of interest. */
+ if( pHttpsResponse->bufferProcessingState == PROCESSING_STATE_SEARCHING_HEADER_BUFFER )
+ {
+ if( pHttpsResponse->readHeaderFieldLength != length )
+ {
+ pHttpsResponse->foundHeaderField = false;
+ }
+ else if( strncmp( pHttpsResponse->pReadHeaderField, pLoc, length ) == 0 )
+ {
+ pHttpsResponse->foundHeaderField = true;
+ }
+ }
+
+ return KEEP_PARSING;
+}
+
+/*-----------------------------------------------------------*/
+
+static int _httpParserOnHeaderValueCallback( http_parser * pHttpParser,
+ const char * pLoc,
+ size_t length )
+{
+ int retVal = KEEP_PARSING;
+
+ IotLogDebug( "Parser: HTTPS header value parsed %.*s", length, pLoc );
+ _httpsResponse_t * pHttpsResponse = ( _httpsResponse_t * ) ( pHttpParser->data );
+
+ /* If we are parsing the network data received in the header buffer then we can increment
+ * pHttpsResponse->pHeadersCur. */
+ if( pHttpsResponse->bufferProcessingState == PROCESSING_STATE_FILLING_HEADER_BUFFER )
+ {
+ pHttpsResponse->pHeadersCur = ( uint8_t * ) ( pLoc += length );
+ }
+
+ /* If the IotHttpsClient_ReadHeader() was called, then we check if we found the header field of interest. */
+ if( pHttpsResponse->bufferProcessingState == PROCESSING_STATE_SEARCHING_HEADER_BUFFER )
+ {
+ if( pHttpsResponse->foundHeaderField )
+ {
+ pHttpsResponse->pReadHeaderValue = ( char * ) ( pLoc );
+ pHttpsResponse->readHeaderValueLength = length;
+ /* We found a header field so we don't want to keep parsing.*/
+ retVal = STOP_PARSING;
+ }
+ }
+
+ return retVal;
+}
+
+/*-----------------------------------------------------------*/
+
+static int _httpParserOnHeadersCompleteCallback( http_parser * pHttpParser )
+{
+ IotLogDebug( "Parser: End of the headers reached." );
+
+ int retVal = KEEP_PARSING;
+ _httpsResponse_t * pHttpsResponse = ( _httpsResponse_t * ) ( pHttpParser->data );
+ pHttpsResponse->parserState = PARSER_STATE_HEADERS_COMPLETE;
+
+ /* If the IotHttpsClient_ReadHeader() was called, we return after finishing looking through all of the headers.
+ * Returning a non-zero value exits the http parsing. */
+ if( pHttpsResponse->bufferProcessingState == PROCESSING_STATE_SEARCHING_HEADER_BUFFER )
+ {
+ retVal = STOP_PARSING;
+ }
+
+ /* When in this callback the pHeaderCur pointer is at the first "\r" in the last header line. HTTP/1.1
+ * headers end with another "\r\n" at the end of the last line. This means we must increment
+ * the headerCur pointer to the length of "\r\n\r\n". */
+ if( pHttpsResponse->bufferProcessingState == PROCESSING_STATE_FILLING_HEADER_BUFFER )
+ {
+ pHttpsResponse->pHeadersCur += ( 2 * HTTPS_END_OF_HEADER_LINES_INDICATOR_LENGTH );
+ }
+
+ /* This if-case is not incrementing any pHeaderCur pointers, so this case is safe to call when flushing the
+ * network buffer. Flushing the network buffer needs the logic below to reach PARSER_STATE_BODY_COMPLETE if the
+ * response is for a HEAD request. Before flushing the network buffer the bufferProcessingState is set to
+ * PROCESSING_STATE_FINISHED so that other callback functions don't update header or body current pointers in the
+ * response context. We don't want those pointers incremented because flushing the network uses a different buffer
+ * to receive the rest of the response. */
+ if( pHttpsResponse->bufferProcessingState <= PROCESSING_STATE_FINISHED )
+ {
+ /* For a HEAD method, there is no body expected in the response, so we return 1 to skip body parsing. */
+ if( ( pHttpsResponse->method == IOT_HTTPS_METHOD_HEAD ) )
+ {
+ retVal = STOP_PARSING;
+
+ /* Since the message is considered complete now for a HEAD response, then we set the parser state
+ * to the completed state. */
+ pHttpsResponse->parserState = PARSER_STATE_BODY_COMPLETE;
+ }
+
+ /* If this is NOT a HEAD method and there is body configured, but the server does not send a body in the
+ * response, then the body buffer will be filled with the zeros from rest of the header buffer. http-parser
+ * will invoke the on_body callback and consider the zeros following the headers as body. */
+
+ /* If there is not body configured for a synchronous reponse, we do not stop the parser from continueing. */
+
+ /* Skipping the body will cause the parser to invoke the _httpParserOnMessageComplete() callback. This is
+ * not desired when there is actually HTTP response body sent by the server because this will set the parser
+ * state to PARSER_STATE_BODY_COMPLETE. If this state is set then the rest of possible body will not be
+ * flushed out. The network flush looks for the state being PARSER_STATE_BODY_COMPLETE to finish flushing. */
+ }
+
+ return retVal;
+}
+
+/*-----------------------------------------------------------*/
+
+static int _httpParserOnBodyCallback( http_parser * pHttpParser,
+ const char * pLoc,
+ size_t length )
+{
+ IotLogDebug( "Parser: Reached the HTTPS message body. It is of length: %d", length );
+
+ _httpsResponse_t * pHttpsResponse = ( _httpsResponse_t * ) ( pHttpParser->data );
+ pHttpsResponse->parserState = PARSER_STATE_IN_BODY;
+
+ /* If the header buffer is currently being processed, but HTTP response body was found, then for an asynchronous
+ * request this if-case saves where the body is located. In the asynchronous case, the body buffer is not available
+ * until the readReadyCallback is invoked, which happens after the headers are processed. */
+ if( ( pHttpsResponse->bufferProcessingState == PROCESSING_STATE_FILLING_HEADER_BUFFER ) && ( pHttpsResponse->isAsync ) )
+ {
+ /* For an asynchronous response, the buffer to store the body will be available after the headers
+ * are read first. We may receive part of the body in the header buffer. We will want to leave this here
+ * and copy it over when the body buffer is available in the _readReadyCallback().
+ */
+ if( pHttpsResponse->pBodyInHeaderBuf == NULL )
+ {
+ pHttpsResponse->pBodyInHeaderBuf = ( uint8_t * ) ( pLoc );
+ pHttpsResponse->pBodyCurInHeaderBuf = pHttpsResponse->pBodyInHeaderBuf;
+ }
+
+ /* If there is a chunk encoded body in the header buffer, we will want to overwrite the chunk headers with the
+ * actual body. This is so that when the application calls IotHttpsClient_ReadResponseBody(), in the
+ * readReadyCallback(), we can pass the body into the body buffer provided right away. */
+ if( pHttpsResponse->pBodyCurInHeaderBuf != ( uint8_t * ) pLoc )
+ {
+ memcpy( pHttpsResponse->pBodyCurInHeaderBuf, pLoc, length );
+ }
+
+ pHttpsResponse->pBodyCurInHeaderBuf += length;
+ }
+ else if( pHttpsResponse->bufferProcessingState < PROCESSING_STATE_FINISHED )
+ {
+ /* Has the user provided a buffer and is it large enough to fit the body? The
+ * case of body buffer not being large enough can happen if the body was received
+ * in the header buffer and the body buffer can not fit in all the body. */
+ if( ( pHttpsResponse->pBodyCur != NULL ) && ( pHttpsResponse->pBodyEnd - pHttpsResponse->pBodyCur > 0 ) )
+ {
+ /* There are two scenarios when we need to copy data around:
+ * 1. Some or all of the response body may have been received in the header
+ * buffer. If that is the case, we copy the response body received in the
+ * header buffer to the user provided body buffer.
+ * 2. When we receive chunked header, the actual body is separated in
+ * multiple chunks which are preceeded by length. For example, a chunked
+ * body may look like:
+ *
+ * 7\r\n
+ * Mozilla\r\n
+ * 9\r\n
+ * Developer\r\n
+ * 7\r\n
+ * Network\r\n
+ * 0\r\n
+ * \r\n
+ *
+ * In this case, we want the parsed body buffer to contain actual body only
+ * (MozillaDeveloperNetwork in the above example).
+ */
+
+ /* If the response body found by the parser (pLoc) is not equal to the
+ * current writable location in the body buffer (_httpsResponse->pBodyCur),
+ * it indicates that:
+ * - Either the data is in the header buffer and needs to be copied into the
+ * body buffer.
+ * - Or it is a chunked response and the data needs to be moved up in the
+ * body buffer. */
+ if( ( pHttpsResponse->pBodyCur + length ) <= pHttpsResponse->pBodyEnd )
+ {
+ if( pHttpsResponse->pBodyCur != ( uint8_t * ) pLoc )
+ {
+ memcpy( pHttpsResponse->pBodyCur, pLoc, length );
+ }
+
+ pHttpsResponse->pBodyCur += length;
+ }
+ }
+ }
+
+ return KEEP_PARSING;
+}
+
+/*-----------------------------------------------------------*/
+
+static int _httpParserOnMessageCompleteCallback( http_parser * pHttpParser )
+{
+ IotLogDebug( "Parser: End of the HTTPS message reached." );
+
+ _httpsResponse_t * pHttpsResponse = ( _httpsResponse_t * ) ( pHttpParser->data );
+ pHttpsResponse->parserState = PARSER_STATE_BODY_COMPLETE;
+
+ /* This callback is invoked when the complete HTTP response has been received.
+ * We tell the parser to parse the whole body buffer as opposed to the size of
+ * the response body. For example, if the size of the body buffer is 1000 but
+ * the size of the actual body is 500, we tell the parser to parse the whole
+ * buffer of length 1000. We do zero out the buffer in the beginning so that all
+ * the buffer after the actual body contains zeros. We return greater than zero to stop parsing
+ * since the end of the HTTP message has been reached. Any data beyond the end of the message is
+ * ignored. */
+ return STOP_PARSING;
+}
+
+/*-----------------------------------------------------------*/
+
+/* This code prints debugging information and is, therefore, compiled only when
+ * log level is set to IOT_LOG_DEBUG. */
+#if ( LIBRARY_LOG_LEVEL == IOT_LOG_DEBUG )
+ static int _httpParserOnChunkHeaderCallback( http_parser * pHttpParser )
+ {
+ ( void ) pHttpParser;
+ IotLogDebug( "Parser: HTTPS message Chunked encoding header callback." );
+ IotLogDebug( "Parser: HTTPS message Chunk size: %d", pHttpParser->content_length );
+ return 0;
+ }
+
+/*-----------------------------------------------------------*/
+
+ static int _httpParserOnChunkCompleteCallback( http_parser * pHttpParser )
+ {
+ ( void ) pHttpParser;
+ IotLogDebug( "End of a HTTPS message Chunk complete callback." );
+ return 0;
+ }
+#endif /* if ( LIBRARY_LOG_LEVEL == IOT_LOG_DEBUG ) */
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _receiveHttpsBodyAsync( _httpsResponse_t * pHttpsResponse )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ if( pHttpsResponse->pCallbacks->readReadyCallback )
+ {
+ /* If there is still more body that has not been passed back to the user, then this callback is invoked again. */
+ do
+ {
+ IotLogDebug( "Invoking the readReadyCallback." );
+ pHttpsResponse->pCallbacks->readReadyCallback( pHttpsResponse->pUserPrivData,
+ pHttpsResponse,
+ pHttpsResponse->bodyRxStatus,
+ pHttpsResponse->status );
+
+ if( pHttpsResponse->cancelled == true )
+ {
+ IotLogDebug( "Cancelled HTTP response %d.", pHttpsResponse );
+ status = IOT_HTTPS_RECEIVE_ABORT;
+
+ /* We break out of the loop and do not goto clean up because we want to print debugging logs for
+ * the parser state and the networks status. */
+ break;
+ }
+ } while( ( pHttpsResponse->parserState < PARSER_STATE_BODY_COMPLETE ) && ( pHttpsResponse->bodyRxStatus == IOT_HTTPS_OK ) );
+
+ if( HTTPS_FAILED( pHttpsResponse->bodyRxStatus ) )
+ {
+ IotLogError( "Error receiving the HTTP response body for response %d. Error code: %d",
+ pHttpsResponse,
+ pHttpsResponse->bodyRxStatus );
+ /* An error in the network or the parser takes precedence */
+ status = pHttpsResponse->bodyRxStatus;
+ }
+
+ if( pHttpsResponse->parserState < PARSER_STATE_BODY_COMPLETE )
+ {
+ IotLogDebug( "Did not receive all of the HTTP response body for response %d.",
+ pHttpsResponse );
+ }
+ }
+
+ /* This GOTO cleanup is here for compiler warnings about using HTTPS_FUNCTION_EXIT_NO_CLEANUP() without a
+ * corresponding goto. */
+ HTTPS_GOTO_CLEANUP();
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _receiveHttpsBodySync( _httpsResponse_t * pHttpsResponse )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+ _httpsConnection_t * pHttpsConnection = pHttpsResponse->pHttpsConnection;
+
+ /* The header buffer is now filled or the end of the headers has been reached already. If part of the response
+ * body was read from the network into the header buffer, then it was already copied to the body buffer in the
+ * _httpParserOnBodyCallback(). */
+ if( pHttpsResponse->pBody != NULL )
+ {
+ /* If there is room left in the body buffer and we have not received the whole response body,
+ * then try to receive more. */
+ if( ( ( pHttpsResponse->pBodyEnd - pHttpsResponse->pBodyCur ) > 0 ) &&
+ ( pHttpsResponse->parserState < PARSER_STATE_BODY_COMPLETE ) )
+ {
+ status = _receiveHttpsBody( pHttpsConnection,
+ pHttpsResponse );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Error receiving the HTTPS response body for response %d. Error code: %d.",
+ pHttpsResponse,
+ status );
+ HTTPS_GOTO_CLEANUP();
+ }
+ }
+ else
+ {
+ IotLogDebug( "Received the maximum amount of HTTP body when filling the header buffer for response %d.",
+ pHttpsResponse );
+ }
+
+ /* If we don't reach the end of the HTTPS body in the parser, then we only received part of the body.
+ * The rest of body will be on the network socket. */
+ if( HTTPS_SUCCEEDED( status ) && ( pHttpsResponse->parserState < PARSER_STATE_BODY_COMPLETE ) )
+ {
+ IotLogError( "HTTPS response body does not fit into application provided response buffer at location 0x%x "
+ "with length: %d",
+ pHttpsResponse->pBody,
+ pHttpsResponse->pBodyEnd - pHttpsResponse->pBody );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_MESSAGE_TOO_LARGE );
+ }
+ }
+ else
+ {
+ IotLogDebug( "No response body was configure for response %d.", pHttpsResponse );
+ }
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+static void _networkReceiveCallback( void * pNetworkConnection,
+ void * pReceiveContext )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ IotHttpsReturnCode_t flushStatus = IOT_HTTPS_OK;
+ IotHttpsReturnCode_t disconnectStatus = IOT_HTTPS_OK;
+ IotHttpsReturnCode_t scheduleStatus = IOT_HTTPS_OK;
+ _httpsConnection_t * pHttpsConnection = ( _httpsConnection_t * ) pReceiveContext;
+ _httpsResponse_t * pCurrentHttpsResponse = NULL;
+ _httpsRequest_t * pNextHttpsRequest = NULL;
+ IotLink_t * pQItem = NULL;
+ bool fatalDisconnect = false;
+
+ /* The network connection is already in the connection context. */
+ ( void ) pNetworkConnection;
+
+ /* Get the response from the response queue. */
+ IotMutex_Lock( &( pHttpsConnection->connectionMutex ) );
+ pQItem = IotDeQueue_PeekHead( &( pHttpsConnection->respQ ) );
+ IotMutex_Unlock( &( pHttpsConnection->connectionMutex ) );
+
+ /* If the receive callback is invoked and there is no response expected, then this a violation of the HTTP/1.1
+ * protocol. */
+ if( pQItem == NULL )
+ {
+ IotLogError( "Received data on the network, when no response was expected..." );
+ fatalDisconnect = true;
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_NETWORK_ERROR );
+ }
+
+ /* Set the current HTTP response context to use. */
+ pCurrentHttpsResponse = IotLink_Container( _httpsResponse_t, pQItem, link );
+
+ /* If the receive callback has invoked, but the request associated with this response has not finished sending
+ * to the server, then this is a violation of the HTTP/1.1 protocol. */
+ if( pCurrentHttpsResponse->reqFinishedSending == false )
+ {
+ IotLogError( "Received response data on the network when the request was not finished sending. This is unexpected." );
+ fatalDisconnect = true;
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_NETWORK_ERROR );
+ }
+
+ /* If the current response was cancelled, then don't bother receiving the headers and body. */
+ if( pCurrentHttpsResponse->cancelled )
+ {
+ IotLogDebug( "Response ID: %d was cancelled.", pCurrentHttpsResponse );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_RECEIVE_ABORT );
+ }
+
+ /* Reset the http-parser state to an initial state. This is done so that a new response can be parsed from the
+ * beginning. */
+ pCurrentHttpsResponse->parserState = PARSER_STATE_NONE;
+
+ /* Receive the response from the network. */
+ /* Receive the headers first. */
+ status = _receiveHttpsHeaders( pHttpsConnection, pCurrentHttpsResponse );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ if( status == IOT_HTTPS_PARSING_ERROR )
+ {
+ /* There was an error parsing the HTTPS response body. This may be an indication of a server that does
+ * not adhere to protocol correctly. We should disconnect. */
+ IotLogError( "Failed to parse the HTTPS headers for response %d, Error code: %d.",
+ pCurrentHttpsResponse,
+ status );
+ fatalDisconnect = true;
+ }
+ else if( status == IOT_HTTPS_NETWORK_ERROR )
+ {
+ /* Given the function signature of IotNetworkInterface_t.receive, we can only receive 0 to the number of bytes
+ * requested. Receiving less than the number of bytes requests is OK since we do not how much data is expected, so
+ * we ask for the full size of the receive buffer. Therefore, the only error that can be returned from receiving
+ * the headers or body is a timeout. We always disconnect from the network when there is a timeout because the
+ * server may be slow to respond. If the server happens to send the response later at the same time another response
+ * is waiting in the queue, then the workflow is corrupted. Pipelining is not current supported in this library. */
+ IotLogError( "Network error receiving the HTTPS headers for response %d. Error code: %d",
+ pCurrentHttpsResponse,
+ status );
+ fatalDisconnect = true;
+ }
+ else /* Any other error. */
+ {
+ IotLogError( "Failed to retrive the HTTPS body for response %d. Error code: %d", pCurrentHttpsResponse, status );
+ }
+
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ /* Check if we received all of the headers into the header buffer. */
+ if( pCurrentHttpsResponse->parserState < PARSER_STATE_HEADERS_COMPLETE )
+ {
+ IotLogDebug( "Headers received on the network did not all fit into the configured header buffer for response %d."
+ " The length of the headers buffer is: %d",
+ pCurrentHttpsResponse,
+ pCurrentHttpsResponse->pHeadersEnd - pCurrentHttpsResponse->pHeaders );
+ /* It is not error if the headers did not all fit into the buffer. */
+ }
+
+ /* Receive the body. */
+ if( pCurrentHttpsResponse->isAsync )
+ {
+ status = _receiveHttpsBodyAsync( pCurrentHttpsResponse );
+ }
+ else
+ {
+ /* Otherwise receive synchronously. */
+ status = _receiveHttpsBodySync( pCurrentHttpsResponse );
+ }
+
+ if( HTTPS_FAILED( status ) )
+ {
+ if( status == IOT_HTTPS_RECEIVE_ABORT )
+ {
+ /* If the request was cancelled, this is logged, but does not close the connection. */
+ IotLogDebug( "User cancelled during the async readReadyCallback() for response %d.",
+ pCurrentHttpsResponse );
+ }
+ else if( status == IOT_HTTPS_PARSING_ERROR )
+ {
+ /* There was an error parsing the HTTPS response body. This may be an indication of a server that does
+ * not adhere to protocol correctly. We should disconnect. */
+ IotLogError( "Failed to parse the HTTPS body for response %d, Error code: %d.",
+ pCurrentHttpsResponse,
+ status );
+ fatalDisconnect = true;
+ }
+ else if( status == IOT_HTTPS_NETWORK_ERROR )
+ {
+ /* We always disconnect for a network error because failure to receive the HTTPS body will result in a
+ * corruption of the workflow. */
+ IotLogError( "Network error receiving the HTTPS body for response %d. Error code: %d",
+ pCurrentHttpsResponse,
+ status );
+ fatalDisconnect = true;
+ }
+ else /* Any other error. */
+ {
+ IotLogError( "Failed to retrive the HTTPS body for response %d. Error code: %d", pCurrentHttpsResponse, status );
+ }
+
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ IOT_FUNCTION_CLEANUP_BEGIN();
+
+ /* Disconnect and return in the event of an out-of-order response. If a response is received out of order
+ * pCurrentHttpsResponse will be NULL because there will be no response in the connection's response queue.
+ * If a response is received out of order that is an indication of a rogue server. */
+ if( fatalDisconnect && !pCurrentHttpsResponse )
+ {
+ IotLogError( "An out-of-order response was received. The connection will be disconnected." );
+ disconnectStatus = IotHttpsClient_Disconnect( pHttpsConnection );
+
+ if( HTTPS_FAILED( disconnectStatus ) )
+ {
+ IotLogWarn( "Failed to disconnect after an out of order response. Error code: %d.", disconnectStatus );
+ }
+
+ /* In this case this routine returns immediately after to avoid further uses of pCurrentHttpsResponse. */
+ return;
+ }
+
+ /* Report errors back to the application. */
+ if( HTTPS_FAILED( status ) )
+ {
+ if( pCurrentHttpsResponse->isAsync && pCurrentHttpsResponse->pCallbacks->errorCallback )
+ {
+ pCurrentHttpsResponse->pCallbacks->errorCallback( pCurrentHttpsResponse->pUserPrivData, NULL, pCurrentHttpsResponse, status );
+ }
+
+ pCurrentHttpsResponse->syncStatus = status;
+ }
+
+ /* If this is not a persistent request, the server would have closed it after sending a response, but we
+ * disconnect anyways. If we are disconnecting there is is no point in wasting time
+ * flushing the network. If the network is being disconnected we also do not schedule any pending requests. */
+ if( fatalDisconnect || pCurrentHttpsResponse->isNonPersistent )
+ {
+ IotLogDebug( "Disconnecting response %d.", pCurrentHttpsResponse );
+ disconnectStatus = IotHttpsClient_Disconnect( pHttpsConnection );
+
+ if( ( pCurrentHttpsResponse != NULL ) && pCurrentHttpsResponse->isAsync && pCurrentHttpsResponse->pCallbacks->connectionClosedCallback )
+ {
+ pCurrentHttpsResponse->pCallbacks->connectionClosedCallback( pCurrentHttpsResponse->pUserPrivData, pHttpsConnection, disconnectStatus );
+ }
+
+ if( HTTPS_FAILED( disconnectStatus ) )
+ {
+ IotLogWarn( "Failed to disconnect response %d. Error code: %d.", pCurrentHttpsResponse, disconnectStatus );
+ }
+
+ /* If we disconnect, we do not process anymore requests. */
+ }
+ else
+ {
+ /* Set the processing state of the buffer to finished for completeness. This is also to prevent the parsing of the flush
+ * data from incrementing any pointer in the HTTP response context. */
+ pCurrentHttpsResponse->bufferProcessingState = PROCESSING_STATE_FINISHED;
+
+ /* Flush the socket of the rest of the data if there is data left from this response. We need to do this
+ * so that for the next request on this connection, there is not left over response from this request in
+ * the next response buffer.
+ *
+ * If a continuous stream of data is coming in from the connection, with an unknown end, we may not be able to
+ * flush the network data. It may sit here forever. A continuous stream should be ingested with the async workflow.
+ *
+ * All network errors are ignore here because network read will have read the data from network buffer despite
+ * errors. */
+ flushStatus = _flushHttpsNetworkData( pHttpsConnection, pCurrentHttpsResponse );
+
+ if( flushStatus == IOT_HTTPS_PARSING_ERROR )
+ {
+ IotLogWarn( "There an error parsing the network flush data. The network buffer might not be fully flushed." );
+ }
+ else if( flushStatus != IOT_HTTPS_OK )
+ {
+ IotLogDebug( "Network error when flushing the https network data: %d", flushStatus );
+ }
+
+ IotMutex_Lock( &( pHttpsConnection->connectionMutex ) );
+ /* Get the next request to process. */
+ pQItem = IotDeQueue_PeekHead( &( pHttpsConnection->reqQ ) );
+ IotMutex_Unlock( &( pHttpsConnection->connectionMutex ) );
+
+ /* If there is a next request to process, then create a taskpool job to send the request. */
+ if( pQItem != NULL )
+ {
+ /* Set this next request to send. */
+ pNextHttpsRequest = IotLink_Container( _httpsRequest_t, pQItem, link );
+
+ if( pNextHttpsRequest->scheduled == false )
+ {
+ IotLogDebug( "Request %d is next in the queue. Now scheduling a task to send the request.", pNextHttpsRequest );
+ scheduleStatus = _scheduleHttpsRequestSend( pNextHttpsRequest );
+
+ /* If there was an error with scheduling the new task, then report it. */
+ if( HTTPS_FAILED( scheduleStatus ) )
+ {
+ IotLogError( "Error scheduling HTTPS request %d. Error code: %d", pNextHttpsRequest, scheduleStatus );
+
+ if( pNextHttpsRequest->isAsync && pNextHttpsRequest->pCallbacks->errorCallback )
+ {
+ pNextHttpsRequest->pCallbacks->errorCallback( pNextHttpsRequest->pUserPrivData, pNextHttpsRequest, NULL, scheduleStatus );
+ }
+ else
+ {
+ pNextHttpsRequest->pHttpsResponse->syncStatus = scheduleStatus;
+ }
+ }
+ }
+ }
+ else
+ {
+ IotLogDebug( "Network receive callback found the request queue empty. A network send task was not scheduled." );
+ }
+ }
+
+ /* Dequeue response from the response queue now that it is finished. */
+ IotMutex_Lock( &( pHttpsConnection->connectionMutex ) );
+
+ /* There could be a scenario where the request fails to send and the network server still responds,
+ * In this case, the failed response will have been cancelled and removed from the queue. If the network
+ * server still got a response, then the safest way to remove the current response is to remove it explicitly
+ * from the queue instead of dequeuing the header of the queue which might not be the current response. */
+ if( IotLink_IsLinked( &( pCurrentHttpsResponse->link ) ) )
+ {
+ IotDeQueue_Remove( &( pCurrentHttpsResponse->link ) );
+ }
+
+ IotMutex_Unlock( &( pHttpsConnection->connectionMutex ) );
+
+ /* The first if-case below notifies IotHttpsClient_SendSync() that the response is finished receiving. When
+ * IotHttpsClient_SendSync() returns the user is allowed to modify the user buffer used for the response context.
+ * In the asynchronous case, the responseCompleteCallback notifies the application that the user buffer used for the
+ * response context can be modified. Posting to the respFinishedSem or calling the responseCompleteCallback MUST be
+ * mutually exclusive by wrapping in an if/else. If these were separate if-cases, then there could be a context
+ * switch in between where the application modifies the buffer causing the next if-case to be executed. */
+ if( pCurrentHttpsResponse->isAsync == false )
+ {
+ IotSemaphore_Post( &( pCurrentHttpsResponse->respFinishedSem ) );
+ }
+ else if( pCurrentHttpsResponse->pCallbacks->responseCompleteCallback )
+ {
+ /* Signal to a synchronous reponse that the response is complete. */
+ pCurrentHttpsResponse->pCallbacks->responseCompleteCallback( pCurrentHttpsResponse->pUserPrivData, pCurrentHttpsResponse, status, pCurrentHttpsResponse->status );
+ }
+}
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _createHttpsConnection( IotHttpsConnectionHandle_t * pConnHandle,
+ IotHttpsConnectionInfo_t * pConnInfo )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ IotNetworkError_t networkStatus = IOT_NETWORK_SUCCESS;
+
+ /* The maximum string length of the ALPN protocols is configured in IOT_HTTPS_MAX_ALPN_PROTOCOLS_LENGTH.
+ * The +1 is for the NULL terminator needed by IotNetworkCredentials_t.pAlpnProtos. */
+ char pAlpnProtos[ IOT_HTTPS_MAX_ALPN_PROTOCOLS_LENGTH + 1 ] = { 0 };
+
+ /* The maximum string length of the Server host name is configured in IOT_HTTPS_MAX_HOST_NAME_LENGTH.
+ * This +1 is for the NULL terminator needed by IotNetworkServerInfo_t.pHostName. */
+ char pHostName[ IOT_HTTPS_MAX_HOST_NAME_LENGTH + 1 ] = { 0 };
+ bool connectionMutexCreated = false;
+ struct IotNetworkServerInfo networkServerInfo = { 0 };
+ struct IotNetworkCredentials networkCredentials = { 0 };
+ _httpsConnection_t * pHttpsConnection = NULL;
+ IotNetworkCredentials_t pNetworkCredentials = NULL;
+
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pConnInfo->userBuffer.pBuffer );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pConnInfo->pNetworkInterface );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pConnInfo->pAddress );
+ HTTPS_ON_ARG_ERROR_GOTO_CLEANUP( pConnInfo->addressLen > 0 );
+
+ /* Make sure the connection context can fit in the user buffer. */
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( pConnInfo->userBuffer.bufferLen >= connectionUserBufferMinimumSize,
+ IOT_HTTPS_INSUFFICIENT_MEMORY,
+ "Buffer size is too small to initialize the connection context. User buffer size: %d, required minimum size; %d.",
+ ( *pConnInfo ).userBuffer.bufferLen,
+ connectionUserBufferMinimumSize );
+
+ /* Make sure that the server address does not exceed the maximum permitted length. */
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( pConnInfo->addressLen <= IOT_HTTPS_MAX_HOST_NAME_LENGTH,
+ IOT_HTTPS_INVALID_PARAMETER,
+ "IotHttpsConnectionInfo_t.addressLen has a host name length %d that exceeds maximum length %d.",
+ pConnInfo->addressLen,
+ IOT_HTTPS_MAX_HOST_NAME_LENGTH );
+
+ /* Make sure that the ALPN protocols does not exceed the maximum permitted length. */
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( pConnInfo->alpnProtocolsLen <= IOT_HTTPS_MAX_ALPN_PROTOCOLS_LENGTH,
+ IOT_HTTPS_INVALID_PARAMETER,
+ "IotHttpsConnectionInfo_t.alpnProtocolsLen of %d exceeds the configured maximum protocol length %d. See IOT_HTTPS_MAX_ALPN_PROTOCOLS_LENGTH for more information.",
+ pConnInfo->alpnProtocolsLen,
+ IOT_HTTPS_MAX_ALPN_PROTOCOLS_LENGTH );
+
+ pHttpsConnection = ( _httpsConnection_t * ) ( pConnInfo->userBuffer.pBuffer );
+
+ /* Start with the disconnected state. */
+ pHttpsConnection->isConnected = false;
+
+ /* Initialize disconnection state keeper. */
+ pHttpsConnection->isDestroyed = false;
+
+ /* Initialize the queue of responses and requests. */
+ IotDeQueue_Create( &( pHttpsConnection->reqQ ) );
+ IotDeQueue_Create( &( pHttpsConnection->respQ ) );
+
+ /* This timeout is used to wait for a response on the connection as well as
+ * for the timeout for the connect operation. */
+ if( pConnInfo->timeout == 0 )
+ {
+ pHttpsConnection->timeout = IOT_HTTPS_RESPONSE_WAIT_MS;
+ }
+ else
+ {
+ pHttpsConnection->timeout = pConnInfo->timeout;
+ }
+
+ /* pNetworkInterface contains all the routines to be able to send/receive data on the network. */
+ pHttpsConnection->pNetworkInterface = pConnInfo->pNetworkInterface;
+
+ /* The address from the connection configuration information is copied to a local buffer because a NULL pointer
+ * is required in IotNetworkServerInfo_t.pHostName. IotNetworkServerInfo_t contains the server information needed
+ * by the network interface to create the connection. */
+ memcpy( pHostName, pConnInfo->pAddress, pConnInfo->addressLen );
+ pHostName[ pConnInfo->addressLen ] = '\0';
+ /* Set it in the IOT network abstractions server information parameter. */
+ networkServerInfo.pHostName = pHostName;
+ networkServerInfo.port = pConnInfo->port;
+
+ /* If this is TLS connection, then set the network credentials. */
+ if( ( pConnInfo->flags & IOT_HTTPS_IS_NON_TLS_FLAG ) == 0 )
+ {
+ if( pConnInfo->flags & IOT_HTTPS_DISABLE_SNI )
+ {
+ networkCredentials.disableSni = true;
+ }
+ else
+ {
+ networkCredentials.disableSni = false;
+ }
+
+ if( pConnInfo->pAlpnProtocols != NULL )
+ {
+ /* The alpn protocol strings in IotNetworkCredentials_t require a NULL terminator, so the alpn protocol
+ * string in the connection configuration information is copied to a local buffer to append the NULL
+ * terminator. */
+ memcpy( pAlpnProtos, pConnInfo->pAlpnProtocols, pConnInfo->alpnProtocolsLen );
+ pAlpnProtos[ pConnInfo->alpnProtocolsLen ] = '\0';
+ networkCredentials.pAlpnProtos = pAlpnProtos;
+ }
+ else
+ {
+ networkCredentials.pAlpnProtos = NULL;
+ }
+
+ /* If any of these are NULL a network error will result when trying to make the connection. Because there is
+ * no invalid memory access resulting from these configurations being NULL, it is not check at the start
+ * of the function. */
+ networkCredentials.pRootCa = pConnInfo->pCaCert;
+ networkCredentials.rootCaSize = pConnInfo->caCertLen;
+ networkCredentials.pClientCert = pConnInfo->pClientCert;
+ networkCredentials.clientCertSize = pConnInfo->clientCertLen;
+ networkCredentials.pPrivateKey = pConnInfo->pPrivateKey;
+ networkCredentials.privateKeySize = pConnInfo->privateKeyLen;
+
+ pNetworkCredentials = &networkCredentials;
+ }
+ else
+ {
+ /* create() takes a NULL if there is no TLS configuration. */
+ pNetworkCredentials = NULL;
+ }
+
+ /* create() will connect to the server specified in addition to creating other network layer
+ * specific resources. */
+ networkStatus = pHttpsConnection->pNetworkInterface->create( &networkServerInfo,
+ pNetworkCredentials,
+ &( pHttpsConnection->pNetworkConnection ) );
+
+ /* Check to see if the network connection succeeded. If it did not succeed,
+ * then the output parameter pConnHandle will be used to return NULL and the
+ * function returns an error. */
+ if( networkStatus != IOT_NETWORK_SUCCESS )
+ {
+ IotLogError( "Failed to connect to the server at %.*s on port %d with error: %d",
+ pConnInfo->addressLen,
+ pConnInfo->pAddress,
+ pConnInfo->port,
+ networkStatus );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_CONNECTION_ERROR );
+ }
+
+ /* The connection succeeded so set the state to connected. */
+ pHttpsConnection->isConnected = true;
+
+ /* The receive callback is invoked by the network layer when data is ready
+ * to be read from the network. */
+ networkStatus = pHttpsConnection->pNetworkInterface->setReceiveCallback( pHttpsConnection->pNetworkConnection,
+ _networkReceiveCallback,
+ pHttpsConnection );
+
+ if( networkStatus != IOT_NETWORK_SUCCESS )
+ {
+ IotLogError( "Failed to connect to set the HTTPS receive callback. " );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_INTERNAL_ERROR );
+ }
+
+ /* Connection was successful, so create synchronization primitives. */
+
+ connectionMutexCreated = IotMutex_Create( &( pHttpsConnection->connectionMutex ), false );
+
+ if( !connectionMutexCreated )
+ {
+ IotLogError( "Failed to create an internal mutex." );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_INTERNAL_ERROR );
+ }
+
+ /* Return the new connection information. */
+ *pConnHandle = pHttpsConnection;
+
+ HTTPS_FUNCTION_CLEANUP_BEGIN();
+
+ /* If we failed anywhere in the connection process, then destroy the semaphores created. */
+ if( HTTPS_FAILED( status ) )
+ {
+ /* If there was a connect was successful, disconnect from the network. */
+ if( ( pHttpsConnection != NULL ) && ( pHttpsConnection->isConnected ) )
+ {
+ _networkDisconnect( pHttpsConnection );
+ _networkDestroy( pHttpsConnection );
+ }
+
+ if( connectionMutexCreated )
+ {
+ IotMutex_Destroy( &( pHttpsConnection->connectionMutex ) );
+ }
+
+ /* Set the connection handle as NULL if everything failed. */
+ *pConnHandle = NULL;
+ }
+
+ HTTPS_FUNCTION_CLEANUP_END();
+}
+
+/*-----------------------------------------------------------*/
+
+static void _networkDisconnect( _httpsConnection_t * pHttpsConnection )
+{
+ IotNetworkError_t networkStatus = IOT_NETWORK_SUCCESS;
+
+ networkStatus = pHttpsConnection->pNetworkInterface->close( pHttpsConnection->pNetworkConnection );
+
+ if( networkStatus != IOT_NETWORK_SUCCESS )
+ {
+ IotLogWarn( "Failed to shutdown the socket with error code: %d", networkStatus );
+ }
+}
+
+/*-----------------------------------------------------------*/
+
+static void _networkDestroy( _httpsConnection_t * pHttpsConnection )
+{
+ IotNetworkError_t networkStatus = IOT_NETWORK_SUCCESS;
+
+ networkStatus = pHttpsConnection->pNetworkInterface->destroy( pHttpsConnection->pNetworkConnection );
+
+ if( networkStatus != IOT_NETWORK_SUCCESS )
+ {
+ IotLogWarn( "Failed to shutdown the socket with error code: %d", networkStatus );
+ }
+}
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _addHeader( _httpsRequest_t * pHttpsRequest,
+ const char * pName,
+ uint32_t nameLen,
+ const char * pValue,
+ uint32_t valueLen )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ int headerFieldSeparatorLen = HTTPS_HEADER_FIELD_SEPARATOR_LENGTH;
+ uint32_t additionalLength = nameLen + headerFieldSeparatorLen + valueLen + HTTPS_END_OF_HEADER_LINES_INDICATOR_LENGTH;
+ uint32_t possibleLastHeaderAdditionalLength = HTTPS_END_OF_HEADER_LINES_INDICATOR_LENGTH;
+
+ /* Check if there is enough space to add the header field and value
+ * (name:value\r\n). We need to add a "\r\n" at the end of headers. The use of
+ * possibleLastHeaderAdditionalLength is to make sure that there is always
+ * space for the last "\r\n". */
+ if( ( additionalLength + possibleLastHeaderAdditionalLength ) > ( ( uint32_t ) ( pHttpsRequest->pHeadersEnd - pHttpsRequest->pHeadersCur ) ) )
+ {
+ IotLogError( "There is %d space left in the header buffer, but we want to add %d more of header.",
+ pHttpsRequest->pHeadersEnd - pHttpsRequest->pHeadersCur,
+ additionalLength + possibleLastHeaderAdditionalLength );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_INSUFFICIENT_MEMORY );
+ }
+
+ memcpy( pHttpsRequest->pHeadersCur, pName, nameLen );
+ pHttpsRequest->pHeadersCur += nameLen;
+ memcpy( pHttpsRequest->pHeadersCur, HTTPS_HEADER_FIELD_SEPARATOR, headerFieldSeparatorLen );
+ pHttpsRequest->pHeadersCur += headerFieldSeparatorLen;
+ memcpy( pHttpsRequest->pHeadersCur, pValue, valueLen );
+ pHttpsRequest->pHeadersCur += valueLen;
+ memcpy( pHttpsRequest->pHeadersCur, HTTPS_END_OF_HEADER_LINES_INDICATOR, HTTPS_END_OF_HEADER_LINES_INDICATOR_LENGTH );
+ pHttpsRequest->pHeadersCur += HTTPS_END_OF_HEADER_LINES_INDICATOR_LENGTH;
+ IotLogDebug( "Wrote header: \"%s: %.*s\r\n\". Space left in request user buffer: %d",
+ pName,
+ valueLen,
+ pValue,
+ pHttpsRequest->pHeadersEnd - pHttpsRequest->pHeadersCur );
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _networkSend( _httpsConnection_t * pHttpsConnection,
+ uint8_t * pBuf,
+ size_t len )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ size_t numBytesSent = 0;
+ size_t numBytesSentTotal = 0;
+ size_t sendLength = len;
+
+ while( numBytesSentTotal < sendLength )
+ {
+ numBytesSent = pHttpsConnection->pNetworkInterface->send( pHttpsConnection->pNetworkConnection,
+ &( pBuf[ numBytesSentTotal ] ),
+ sendLength - numBytesSentTotal );
+
+ /* pNetworkInterface->send returns 0 on error. */
+ if( numBytesSent == 0 )
+ {
+ IotLogError( "Error in sending the HTTPS headers. Error code: %d", numBytesSent );
+ break;
+ }
+
+ numBytesSentTotal += numBytesSent;
+ }
+
+ if( numBytesSentTotal != sendLength )
+ {
+ IotLogError( "Error sending data on the network. We sent %d but there were total %d.", numBytesSentTotal, sendLength );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_NETWORK_ERROR );
+ }
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _networkRecv( _httpsConnection_t * pHttpsConnection,
+ uint8_t * pBuf,
+ size_t bufLen,
+ size_t * numBytesRecv )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ /* The HTTP server could send the header and the body in two separate TCP packets. If that is the case, then
+ * receiveUpTo will return return the full headers first. Then on a second call, the body will be returned.
+ * If the http parser receives just the headers despite the content length being greater than */
+ *numBytesRecv = pHttpsConnection->pNetworkInterface->receiveUpto( pHttpsConnection->pNetworkConnection,
+ pBuf,
+ bufLen );
+
+ IotLogDebug( "The network interface receive returned %d.", numBytesRecv );
+
+ /* We return IOT_HTTPS_NETWORK_ERROR only if we receive nothing. Receiving less
+ * data than requested is okay because it is not known in advance how much data
+ * we are going to receive and therefore we request for the available buffer
+ * size. */
+ if( *numBytesRecv == 0 )
+ {
+ IotLogError( "Error in receiving the HTTPS response message. Socket Error code %d", *numBytesRecv );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_NETWORK_ERROR );
+
+ /* A network error is returned when zero is received because that would indicate that either there
+ * was a network error or there was a timeout reading data. If there was timeout reading data, then
+ * the server was too slow to respond. If the server is too slow to respond, then a network error must
+ * be returned to trigger a connection close. The connection must close after the network error so
+ * that the response from this request does not piggyback on the response from the next request. */
+ }
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _sendHttpsHeaders( _httpsConnection_t * pHttpsConnection,
+ uint8_t * pHeadersBuf,
+ uint32_t headersLength,
+ bool isNonPersistent,
+ uint32_t contentLength )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ const char * connectionHeader = NULL;
+ int numWritten = 0;
+ int connectionHeaderLen = 0;
+ /* The Content-Length header of the form "Content-Length: N\r\n" with a NULL terminator for snprintf. */
+ char contentLengthHeaderStr[ HTTPS_MAX_CONTENT_LENGTH_LINE_LENGTH + 1 ];
+
+ /* The HTTP headers to send after the headers in pHeadersBuf are the Content-Length and the Connection type and
+ * the final "\r\n" to indicate the end of the the header lines. Note that we are using
+ * HTTPS_CONNECTION_KEEP_ALIVE_HEADER_LINE_LENGTH because length of "Connection: keep-alive\r\n" is
+ * more than "Connection: close\r\n". Creating a buffer of bigger size ensures that
+ * both the connection type strings will fit in the buffer. */
+ char finalHeaders[ HTTPS_MAX_CONTENT_LENGTH_LINE_LENGTH + HTTPS_CONNECTION_KEEP_ALIVE_HEADER_LINE_LENGTH + HTTPS_END_OF_HEADER_LINES_INDICATOR_LENGTH ] = { 0 };
+
+ /* Send the headers passed into this function first. These headers are not terminated with a second set of "\r\n". */
+ status = _networkSend( pHttpsConnection, pHeadersBuf, headersLength );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Error sending the HTTPS headers in the request user buffer. Error code: %d", status );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ /* If there is a Content-Length, then write that to the finalHeaders to send. */
+ if( contentLength > 0 )
+ {
+ numWritten = snprintf( contentLengthHeaderStr,
+ sizeof( contentLengthHeaderStr ),
+ "%s: %u\r\n",
+ HTTPS_CONTENT_LENGTH_HEADER,
+ ( unsigned int ) contentLength );
+ }
+
+ if( ( numWritten < 0 ) || ( numWritten >= sizeof( contentLengthHeaderStr ) ) )
+ {
+ IotLogError( "Internal error in snprintf() in _sendHttpsHeaders(). Error code %d.", numWritten );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_INTERNAL_ERROR );
+ }
+
+ /* snprintf() succeeded so copy that to the finalHeaders. */
+ memcpy( finalHeaders, contentLengthHeaderStr, numWritten );
+
+ /* Write the connection persistence type to the final headers. */
+ if( isNonPersistent )
+ {
+ connectionHeader = HTTPS_CONNECTION_CLOSE_HEADER_LINE;
+ connectionHeaderLen = FAST_MACRO_STRLEN( HTTPS_CONNECTION_CLOSE_HEADER_LINE );
+ }
+ else
+ {
+ connectionHeader = HTTPS_CONNECTION_KEEP_ALIVE_HEADER_LINE;
+ connectionHeaderLen = FAST_MACRO_STRLEN( HTTPS_CONNECTION_KEEP_ALIVE_HEADER_LINE );
+ }
+
+ memcpy( &finalHeaders[ numWritten ], connectionHeader, connectionHeaderLen );
+ numWritten += connectionHeaderLen;
+ memcpy( &finalHeaders[ numWritten ], HTTPS_END_OF_HEADER_LINES_INDICATOR, HTTPS_END_OF_HEADER_LINES_INDICATOR_LENGTH );
+ numWritten += HTTPS_END_OF_HEADER_LINES_INDICATOR_LENGTH;
+
+ status = _networkSend( pHttpsConnection, ( uint8_t * ) finalHeaders, numWritten );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Error sending final HTTPS Headers \r\n%s. Error code: %d", finalHeaders, status );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _sendHttpsBody( _httpsConnection_t * pHttpsConnection,
+ uint8_t * pBodyBuf,
+ uint32_t bodyLength )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ status = _networkSend( pHttpsConnection, pBodyBuf, bodyLength );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Error sending final HTTPS body at location 0x%x. Error code: %d", pBodyBuf, status );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _parseHttpsMessage( _httpParserInfo_t * pHttpParserInfo,
+ char * pBuf,
+ size_t len )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ size_t parsedBytes = 0;
+ const char * pHttpParserErrorDescription = NULL;
+ http_parser * pHttpParser = &( pHttpParserInfo->responseParser );
+
+ IotLogDebug( "Now parsing HTTP message buffer to process a response." );
+ parsedBytes = pHttpParserInfo->parseFunc( pHttpParser, &_httpParserSettings, pBuf, len );
+ IotLogDebug( "http-parser parsed %d bytes out of %d specified.", parsedBytes, len );
+
+ /* If the parser fails with HPE_CLOSED_CONNECTION or HPE_INVALID_CONSTANT that simply means there
+ * was data beyond the end of the message. We do not fail in this case because we give the whole
+ * header buffer or body buffer to the parser even if it is only partly filled with data.
+ * Errors <= HPE_CB_chunk_complete means that a non-zero number was returned from some callback.
+ * A nonzero number is returned from some callbacks when we want to stop the parser early
+ * for example - a HEAD request or the user explicitly asked to ignore the body by not
+ * providing the body buffer. */
+ if( ( pHttpParser->http_errno != 0 ) &&
+ ( HTTP_PARSER_ERRNO( pHttpParser ) != HPE_CLOSED_CONNECTION ) &&
+ ( HTTP_PARSER_ERRNO( pHttpParser ) != HPE_INVALID_CONSTANT ) &&
+ ( HTTP_PARSER_ERRNO( pHttpParser ) > HPE_CB_chunk_complete ) )
+ {
+ pHttpParserErrorDescription = http_errno_description( HTTP_PARSER_ERRNO( pHttpParser ) );
+ IotLogError( "http_parser failed on the http response with error: %s", pHttpParserErrorDescription );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_PARSING_ERROR );
+ }
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+static void _incrementNextLocationToWriteBeyondParsed( uint8_t ** pBufCur,
+ uint8_t ** pBufEnd )
+{
+ /* There is an edge case where the final one or two character received in the header buffer is part of
+ * the header field separator ": " or part of the header line end "\r\n" delimiters. When this
+ * happens, pHeadersCur in the response will point not the end of the buffer, but to a character in
+ * the delimiter. For example:
+ * Let's say this is our current header buffer after receiving and parsing:
+ * ["HTTP/1.1 200 OK\r\n\header0: value0\r\nheader1: value1\r\n"]
+ * pHeadersCur will point to \r because the http-parser does not invoke a callback on the
+ * delimiters. Since no callback is invoked, pHeadersCur is not incremented. pHeadersEnd points to
+ * the end of the header buffer which is the unwritable memory location right after the final '\n'.
+ * Because pHeadersCur is less than pHeaderEnd we loop again and receive on the network causing the
+ * buffer to look like this:
+ * ["HTTP/1.1 200 OK\r\n\header0: value0\r\nheader1: value1he"]
+ * Which will cause an incorrect header1 value to be read if the application decides to read it with
+ * IotHttpsClient_ReadHeader().
+ *
+ * If our header buffer looks like:
+ * ["HTTP/1.1 200 OK\r\n\header0: value0\r\nheader1: "]
+ * then pHeaderCur will point to the colon.
+ *
+ * If our header buffer looks like:
+ * ["HTTP/1.1 200 OK\r\n\header0: value0\r\nheader1:"]
+ * then pHeaderCur will point to the colon.
+ *
+ * If our header buffer looks like
+ * ["HTTP/1.1 200 OK\r\n\header0: value0\r\nheader1: value1 "]
+ * then http-parser will consider that space as part of value1.
+ *
+ * If our header buffer looks like
+ * ["HTTP/1.1 200 OK\r\n\header0: value0\r\nheader1: value1\r"]
+ * then pHeaderCur will point to the carriage return.
+ *
+ * If our header buffer looks like
+ * ["HTTP/1.1 200 OK\r\n\header0: value0\r\nheader1: value1\r\n"]
+ * As explained in the example above, pHeaderCur will point to the carriage return.
+ *
+ * If we somehow receive a partial HTTP response message in our zeroed-out header buffer:
+ * case 1: ["HTTP/1.1 200 OK\r\nheader0: value0\r\nheader1: value1\r\0\0\0\0\0\0\0"]
+ * case 2: ["HTTP/1.1 200 OK\r\nheader0: value0\r\nheader1: value1\r\n\0\0\0\0\0\0"]
+ * case 3: ["HTTP/1.1 200 OK\r\nheader0: value0\r\nheader1:\0\0\0\0\0\0\0\0\0\0\0"]
+ * case 4: ["HTTP/1.1 200 OK\r\nheader0: value0\r\nheader1: \0\0\0\0\0\0\0\0\0\0\0"]
+ * then parser may fail or append all of the NULL characters to a header field name or value. */
+ while( *pBufCur < *pBufEnd )
+ {
+ if( **pBufCur == CARRIAGE_RETURN_CHARACTER )
+ {
+ ( *pBufCur )++;
+ }
+ else if( **pBufCur == NEWLINE_CHARACTER )
+ {
+ ( *pBufCur )++;
+ break;
+ }
+ else if( **pBufCur == COLON_CHARACTER )
+ {
+ ( *pBufCur )++;
+ }
+ else if( ( **pBufCur == SPACE_CHARACTER ) && ( *( *pBufCur - 1 ) == COLON_CHARACTER ) )
+ {
+ ( *pBufCur )++;
+ break;
+ }
+ else
+ {
+ break;
+ }
+ }
+}
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _receiveHttpsMessage( _httpsConnection_t * pHttpsConnection,
+ _httpParserInfo_t * pHttpParserInfo,
+ IotHttpsResponseParserState_t * pCurrentParserState,
+ IotHttpsResponseParserState_t finalParserState,
+ IotHttpsResponseBufferState_t currentBufferProcessingState,
+ uint8_t ** pBufCur,
+ uint8_t ** pBufEnd )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ size_t numBytesRecv = 0;
+
+ /* The final parser state is either the end of the header lines or the end of the entity body. This state is set in
+ * the http-parser callbacks. */
+ while( ( *pCurrentParserState < finalParserState ) && ( *pBufEnd - *pBufCur > 0 ) )
+ {
+ status = _networkRecv( pHttpsConnection,
+ *pBufCur,
+ *pBufEnd - *pBufCur,
+ &numBytesRecv );
+
+ /* A network error in _networkRecv is returned only when we received zero bytes. In that case, there is
+ * no point in parsing we return immediately with the network error. */
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Network error receiving the HTTPS response headers. Error code: %d", status );
+ break;
+ }
+
+ status = _parseHttpsMessage( pHttpParserInfo, ( char * ) ( *pBufCur ), numBytesRecv );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Failed to parse the message buffer with error: %d", pHttpParserInfo->responseParser.http_errno );
+ break;
+ }
+
+ /* If the current buffer being filled is the header buffer, then \r\n header line separators should not get
+ * overwritten on the next network read. See _incrementNextLocationToWriteBeyondParsed() for more
+ * information. */
+ if( currentBufferProcessingState == PROCESSING_STATE_FILLING_HEADER_BUFFER )
+ {
+ _incrementNextLocationToWriteBeyondParsed( pBufCur, pBufEnd );
+ }
+
+ /* The _httpsResponse->pHeadersCur pointer is updated in the http_parser callbacks. */
+ IotLogDebug( "There is %d of space left in the buffer.", *pBufEnd - *pBufCur );
+ }
+
+ /* If we did not reach the end of the headers or body in the parser callbacks, then the buffer configured does not
+ * fit all of that part of the HTTP message. */
+ if( *pCurrentParserState < finalParserState )
+ {
+ IotLogDebug( "There are still more data on the network. It could not fit into the specified length %d.",
+ *pBufEnd - *pBufCur );
+ }
+
+ HTTPS_GOTO_CLEANUP();
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _receiveHttpsHeaders( _httpsConnection_t * pHttpsConnection,
+ _httpsResponse_t * pHttpsResponse )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ pHttpsResponse->bufferProcessingState = PROCESSING_STATE_FILLING_HEADER_BUFFER;
+
+ IotLogDebug( "Now attempting to receive the HTTP response headers into a buffer with length %d.",
+ pHttpsResponse->pHeadersEnd - pHttpsResponse->pHeadersCur );
+
+ status = _receiveHttpsMessage( pHttpsConnection,
+ &( pHttpsResponse->httpParserInfo ),
+ &( pHttpsResponse->parserState ),
+ PARSER_STATE_HEADERS_COMPLETE,
+ PROCESSING_STATE_FILLING_HEADER_BUFFER,
+ &( pHttpsResponse->pHeadersCur ),
+ &( pHttpsResponse->pHeadersEnd ) );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Error receiving the HTTP headers. Error code %d", status );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+/* _receiveHttpsHeaders() must be called first before this function is called. */
+static IotHttpsReturnCode_t _receiveHttpsBody( _httpsConnection_t * pHttpsConnection,
+ _httpsResponse_t * pHttpsResponse )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ IotLogDebug( "Now attempting to receive the HTTP response body into a buffer with length %d.",
+ pHttpsResponse->pBodyEnd - pHttpsResponse->pBodyCur );
+
+ pHttpsResponse->bufferProcessingState = PROCESSING_STATE_FILLING_BODY_BUFFER;
+
+ status = _receiveHttpsMessage( pHttpsConnection,
+ &( pHttpsResponse->httpParserInfo ),
+ &( pHttpsResponse->parserState ),
+ PARSER_STATE_BODY_COMPLETE,
+ PROCESSING_STATE_FILLING_BODY_BUFFER,
+ &( pHttpsResponse->pBodyCur ),
+ &( pHttpsResponse->pBodyEnd ) );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Error receiving the HTTP body. Error code %d", status );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ HTTPS_FUNCTION_CLEANUP_BEGIN();
+
+ IotLogDebug( "The remaining content length on the network is %d.",
+ pHttpsResponse->httpParserInfo.responseParser.content_length );
+
+ HTTPS_FUNCTION_CLEANUP_END();
+}
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _flushHttpsNetworkData( _httpsConnection_t * pHttpsConnection,
+ _httpsResponse_t * pHttpsResponse )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ static uint8_t flushBuffer[ IOT_HTTPS_MAX_FLUSH_BUFFER_SIZE ] = { 0 };
+ const char * pHttpParserErrorDescription = NULL;
+ IotHttpsReturnCode_t parserStatus = IOT_HTTPS_OK;
+ IotHttpsReturnCode_t networkStatus = IOT_HTTPS_OK;
+ size_t numBytesRecv = 0;
+
+ /* Even if there is not body, the parser state will become body complete after the headers finish. */
+ while( pHttpsResponse->parserState < PARSER_STATE_BODY_COMPLETE )
+ {
+ IotLogDebug( "Now clearing the rest of the response data on the socket. " );
+ networkStatus = _networkRecv( pHttpsConnection, flushBuffer, IOT_HTTPS_MAX_FLUSH_BUFFER_SIZE, &numBytesRecv );
+
+ /* Run this through the parser so that we can get the end of the HTTP message, instead of simply timing out the socket to stop.
+ * If we relied on the socket timeout to stop reading the network socket, then the server may close the connection. */
+ parserStatus = _parseHttpsMessage( &( pHttpsResponse->httpParserInfo ), ( char * ) flushBuffer, numBytesRecv );
+
+ if( HTTPS_FAILED( parserStatus ) )
+ {
+ pHttpParserErrorDescription = http_errno_description( HTTP_PARSER_ERRNO( &pHttpsResponse->httpParserInfo.responseParser ) );
+ IotLogError( "Network Flush: Failed to parse the response body buffer with error: %d, %s",
+ pHttpsResponse->httpParserInfo.responseParser.http_errno,
+ pHttpParserErrorDescription );
+ break;
+ }
+
+ /* If there is a network error then we want to stop clearing out the buffer. */
+ if( HTTPS_FAILED( networkStatus ) )
+ {
+ IotLogWarn( "Network Flush: Error receiving the rest of the HTTP response. Error code: %d",
+ networkStatus );
+ break;
+ }
+ }
+
+ /* All network errors except timeouts are returned. */
+ if( HTTPS_FAILED( networkStatus ) )
+ {
+ status = networkStatus;
+ }
+ else
+ {
+ status = parserStatus;
+ }
+
+ HTTPS_GOTO_CLEANUP();
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _sendHttpsHeadersAndBody( _httpsConnection_t * pHttpsConnection,
+ _httpsRequest_t * pHttpsRequest )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ /* Send the HTTP headers. */
+ status = _sendHttpsHeaders( pHttpsConnection,
+ pHttpsRequest->pHeaders,
+ pHttpsRequest->pHeadersCur - pHttpsRequest->pHeaders,
+ pHttpsRequest->isNonPersistent,
+ pHttpsRequest->bodyLength );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Error sending the HTTPS headers with error code: %d", status );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ if( ( pHttpsRequest->pBody != NULL ) && ( pHttpsRequest->bodyLength > 0 ) )
+ {
+ status = _sendHttpsBody( pHttpsConnection, pHttpsRequest->pBody, pHttpsRequest->bodyLength );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Error sending final HTTPS body. Return code: %d", status );
+ HTTPS_GOTO_CLEANUP();
+ }
+ }
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+static void _sendHttpsRequest( IotTaskPool_t pTaskPool,
+ IotTaskPoolJob_t pJob,
+ void * pUserContext )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ _httpsRequest_t * pHttpsRequest = ( _httpsRequest_t * ) ( pUserContext );
+ _httpsConnection_t * pHttpsConnection = pHttpsRequest->pHttpsConnection;
+ _httpsResponse_t * pHttpsResponse = pHttpsRequest->pHttpsResponse;
+ IotHttpsReturnCode_t disconnectStatus = IOT_HTTPS_OK;
+ IotHttpsReturnCode_t scheduleStatus = IOT_HTTPS_OK;
+ IotLink_t * pQItem = NULL;
+ _httpsRequest_t * pNextHttpsRequest = NULL;
+
+ ( void ) pTaskPool;
+ ( void ) pJob;
+
+ IotLogDebug( "Task with request ID: %d started.", pHttpsRequest );
+
+ if( pHttpsRequest->cancelled == true )
+ {
+ IotLogDebug( "Request ID: %d was cancelled.", pHttpsRequest );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_SEND_ABORT );
+ }
+
+ /* To protect against out of order network data from a rouge server, signal that the request is
+ * not finished sending. */
+ pHttpsResponse->reqFinishedSending = false;
+
+ /* Queue the response to expect from the network. */
+ IotMutex_Lock( &( pHttpsConnection->connectionMutex ) );
+ IotDeQueue_EnqueueTail( &( pHttpsConnection->respQ ), &( pHttpsResponse->link ) );
+ IotMutex_Unlock( &( pHttpsConnection->connectionMutex ) );
+
+ /* Get the headers from the application. For a synchronous request the application should have appended extra
+ * headers before this point. */
+ if( pHttpsRequest->isAsync && pHttpsRequest->pCallbacks->appendHeaderCallback )
+ {
+ pHttpsRequest->pCallbacks->appendHeaderCallback( pHttpsRequest->pUserPrivData, pHttpsRequest );
+ }
+
+ if( pHttpsRequest->cancelled == true )
+ {
+ IotLogDebug( "Request ID: %d was cancelled.", pHttpsRequest );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_SEND_ABORT );
+ }
+
+ /* Ask the user for data to write body to the network. We only ask the user once. This is so that
+ * we can calculate the Content-Length to send.*/
+ if( pHttpsRequest->isAsync && pHttpsRequest->pCallbacks->writeCallback )
+ {
+ /* If there is data, then a Content-Length header value will be provided and we send the headers
+ * before that user data. */
+ pHttpsRequest->pCallbacks->writeCallback( pHttpsRequest->pUserPrivData, pHttpsRequest );
+ }
+
+ if( HTTPS_FAILED( pHttpsRequest->bodyTxStatus ) )
+ {
+ IotLogError( "Failed to send the headers and body over the network during the writeCallback. Error code: %d.",
+ status );
+ HTTPS_SET_AND_GOTO_CLEANUP( pHttpsRequest->bodyTxStatus );
+ }
+
+ if( pHttpsRequest->cancelled == true )
+ {
+ IotLogDebug( "Request ID: %d was cancelled.", pHttpsRequest );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_SEND_ABORT );
+ }
+
+ /* If this is a synchronous request then the header and body were configured beforehand. The header and body
+ * are sent now. For an asynchronous request, the header and body are sent in IotHttpsClient_WriteRequestBody()
+ * which is to be invoked in #IotHttpsClientCallbacks_t.writeCallback(). If the application never invokes
+ * IotHttpsClient_WriteRequestBody(), then pHttpsRequest->pBody will be NULL. In this case we still want to
+ * send whatever headers we have. */
+ if( ( pHttpsRequest->isAsync == false ) ||
+ ( ( pHttpsRequest->isAsync ) && ( pHttpsRequest->pBody == NULL ) ) )
+ {
+ status = _sendHttpsHeadersAndBody( pHttpsConnection, pHttpsRequest );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Failed to send the headers and body on the network. Error code: %d", status );
+ HTTPS_GOTO_CLEANUP();
+ }
+ }
+
+ HTTPS_FUNCTION_CLEANUP_BEGIN();
+
+ /* The request has finished sending. This indicates to the network receive callback that the request was
+ * finished, so a response received on the network is valid. This also lets a possible application called
+ * IotHttpsClient_Disconnect() know that the connection is not busy, so the connection can be destroyed. */
+ pHttpsResponse->reqFinishedSending = true;
+
+ if( HTTPS_FAILED( status ) )
+ {
+ /* If the headers or body failed to send, then there should be no response expected from the server. */
+ /* Cancel the response incase there is a response from the server. */
+ _cancelResponse( pHttpsResponse );
+ IotMutex_Lock( &( pHttpsConnection->connectionMutex ) );
+
+ if( IotLink_IsLinked( &( pHttpsResponse->link ) ) )
+ {
+ IotDeQueue_Remove( &( pHttpsResponse->link ) );
+ }
+
+ IotMutex_Unlock( &( pHttpsConnection->connectionMutex ) );
+
+ /* Set the error status in the sync workflow. */
+ pHttpsResponse->syncStatus = status;
+
+ /* Return the error status or cancel status to the application for an asynchronous workflow. */
+ if( pHttpsRequest->isAsync && pHttpsRequest->pCallbacks->errorCallback )
+ {
+ pHttpsRequest->pCallbacks->errorCallback( pHttpsRequest->pUserPrivData, pHttpsRequest, NULL, status );
+ }
+
+ /* We close the connection on all network errors. All network errors in receiving the response, close the
+ * connection. For consistency in behavior, if there is a network error in send, the connection should also be
+ * closed. */
+ if( status == IOT_HTTPS_NETWORK_ERROR )
+ {
+ IotLogDebug( "Disconnecting request %d.", pHttpsRequest );
+ disconnectStatus = IotHttpsClient_Disconnect( pHttpsConnection );
+
+ if( pHttpsRequest->isAsync && pHttpsRequest->pCallbacks->connectionClosedCallback )
+ {
+ pHttpsRequest->pCallbacks->connectionClosedCallback( pHttpsRequest->pUserPrivData,
+ pHttpsConnection,
+ disconnectStatus );
+ }
+
+ if( HTTPS_FAILED( disconnectStatus ) )
+ {
+ IotLogWarn( "Failed to disconnect request %d. Error code: %d.", pHttpsRequest, disconnectStatus );
+ }
+ }
+ else
+ {
+ /* Because this request failed, the network receive callback may never be invoked to schedule other possible
+ * requests in the queue. In order to avoid requests never getting scheduled on a connected connection,
+ * the first item in the queue is scheduled if it can be. */
+ IotMutex_Lock( &( pHttpsConnection->connectionMutex ) );
+
+ /* Get the next item in the queue by removing this current (which is the first) and peeking at the head
+ * again. */
+ IotDeQueue_Remove( &( pHttpsRequest->link ) );
+ pQItem = IotDeQueue_PeekHead( &( pHttpsConnection->reqQ ) );
+ /* This current request is put back because it is removed again for all cases at the end of this routine. */
+ IotDeQueue_EnqueueHead( &( pHttpsConnection->reqQ ), &( pHttpsRequest->link ) );
+ IotMutex_Unlock( &( pHttpsConnection->connectionMutex ) );
+
+ if( pQItem != NULL )
+ {
+ /* Set this next request to send. */
+ pNextHttpsRequest = IotLink_Container( _httpsRequest_t, pQItem, link );
+
+ if( pNextHttpsRequest->scheduled == false )
+ {
+ IotLogDebug( "Request %d is next in the queue. Now scheduling a task to send the request.", pNextHttpsRequest );
+ scheduleStatus = _scheduleHttpsRequestSend( pNextHttpsRequest );
+
+ /* If there was an error with scheduling the new task, then report it. */
+ if( HTTPS_FAILED( scheduleStatus ) )
+ {
+ IotLogError( "Error scheduling HTTPS request %d. Error code: %d", pNextHttpsRequest, scheduleStatus );
+
+ if( pNextHttpsRequest->isAsync && pNextHttpsRequest->pCallbacks->errorCallback )
+ {
+ pNextHttpsRequest->pCallbacks->errorCallback( pNextHttpsRequest->pUserPrivData, pNextHttpsRequest, NULL, scheduleStatus );
+ }
+ else
+ {
+ pNextHttpsRequest->pHttpsResponse->syncStatus = scheduleStatus;
+ }
+ }
+ }
+ }
+ }
+
+ /* Post to the response finished semaphore to unlock the application waiting on a synchronous request. */
+ if( pHttpsRequest->isAsync == false )
+ {
+ IotSemaphore_Post( &( pHttpsResponse->respFinishedSem ) );
+ }
+ else if( pHttpsRequest->pCallbacks->responseCompleteCallback )
+ {
+ /* Call the response complete callback. We always call this even if we did not receive the response to
+ * let the application know that the request has completed. */
+ pHttpsRequest->pCallbacks->responseCompleteCallback( pHttpsRequest->pUserPrivData, NULL, status, 0 );
+ }
+ }
+
+ IotMutex_Lock( &( pHttpsConnection->connectionMutex ) );
+ /* Now that the current request is finished, we dequeue the current request from the queue. */
+ IotDeQueue_DequeueHead( &( pHttpsConnection->reqQ ) );
+ IotMutex_Unlock( &( pHttpsConnection->connectionMutex ) );
+
+ /* This routine returns a void so there is no HTTPS_FUNCTION_CLEANUP_END();. */
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t _scheduleHttpsRequestSend( _httpsRequest_t * pHttpsRequest )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ IotTaskPoolError_t taskPoolStatus = IOT_TASKPOOL_SUCCESS;
+ _httpsConnection_t * pHttpsConnection = pHttpsRequest->pHttpsConnection;
+
+ /* Set the request to scheduled even if scheduling fails. */
+ pHttpsRequest->scheduled = true;
+
+ taskPoolStatus = IotTaskPool_CreateJob( _sendHttpsRequest,
+ ( void * ) ( pHttpsRequest ),
+ &( pHttpsConnection->taskPoolJobStorage ),
+ &( pHttpsConnection->taskPoolJob ) );
+
+ /* Creating a task pool job should never fail when parameters are valid. */
+ if( taskPoolStatus != IOT_TASKPOOL_SUCCESS )
+ {
+ IotLogError( "Error creating a taskpool job for request servicing. Error code: %d", taskPoolStatus );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_INTERNAL_ERROR );
+ }
+
+ taskPoolStatus = IotTaskPool_Schedule( IOT_SYSTEM_TASKPOOL, pHttpsConnection->taskPoolJob, 0 );
+
+ if( taskPoolStatus != IOT_TASKPOOL_SUCCESS )
+ {
+ IotLogError( "Failed to schedule taskpool job. Error code: %d", taskPoolStatus );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_ASYNC_SCHEDULING_ERROR );
+ }
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t _addRequestToConnectionReqQ( _httpsRequest_t * pHttpsRequest )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ _httpsConnection_t * pHttpsConnection = pHttpsRequest->pHttpsConnection;
+ bool scheduleRequest = false;
+
+ /* Log information about the request*/
+ IotLogDebug( "Now queueing request %d.", pHttpsRequest );
+
+ if( pHttpsRequest->isNonPersistent )
+ {
+ IotLogDebug( "Request %d is non-persistent.", pHttpsRequest );
+ }
+ else
+ {
+ IotLogDebug( "Request %d is persistent. ", pHttpsRequest );
+ }
+
+ if( pHttpsRequest->isAsync )
+ {
+ IotLogDebug( " Request %d is asynchronous.", pHttpsRequest );
+ }
+ else
+ {
+ IotLogDebug( " Request %d is synchronous.", pHttpsRequest );
+ }
+
+ /* This is a new request and has not been scheduled if this routine is called. */
+ pHttpsRequest->scheduled = false;
+
+ /* Place the request into the queue. */
+ IotMutex_Lock( &( pHttpsConnection->connectionMutex ) );
+
+ /* If there is an active response, scheduling the next request at the same time may corrupt the workflow. Part of
+ * the next response for the next request may be present in the currently receiving response's buffers. To avoid
+ * this, check if there are pending responses to determine if this request should be scheduled right away or not.
+ *
+ * If there are other requests in the queue, and there are responses in the queue, then the network receive callback
+ * will handle scheduling the next requests (or is already scheduled and currently sending). */
+ if( ( IotDeQueue_IsEmpty( &( pHttpsConnection->reqQ ) ) ) &&
+ ( IotDeQueue_IsEmpty( &( pHttpsConnection->respQ ) ) ) )
+ {
+ scheduleRequest = true;
+ }
+
+ /* Place into the connection's request to have a taskpool worker schedule to serve it later. */
+ IotDeQueue_EnqueueTail( &( pHttpsConnection->reqQ ), &( pHttpsRequest->link ) );
+ IotMutex_Unlock( &( pHttpsConnection->connectionMutex ) );
+
+ if( scheduleRequest )
+ {
+ /* This routine schedules a task pool worker to send the request. If a worker is available immediately, then
+ * the request is sent right away. */
+ status = _scheduleHttpsRequestSend( pHttpsRequest );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Failed to schedule the request in the queue for request %d. Error code: %d", pHttpsRequest, status );
+
+ /* If we fail to schedule the only request in the queue we should remove it. */
+ IotMutex_Lock( &( pHttpsConnection->connectionMutex ) );
+ IotDeQueue_Remove( &( pHttpsRequest->link ) );
+ IotMutex_Unlock( &( pHttpsConnection->connectionMutex ) );
+
+ HTTPS_GOTO_CLEANUP();
+ }
+ }
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+static void _cancelRequest( _httpsRequest_t * pHttpsRequest )
+{
+ pHttpsRequest->cancelled = true;
+}
+
+/*-----------------------------------------------------------*/
+
+static void _cancelResponse( _httpsResponse_t * pHttpsResponse )
+{
+ pHttpsResponse->cancelled = true;
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t IotHttpsClient_Init( void )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ /* This sets all member in the _httpParserSettings to zero. It does not return any errors. */
+ http_parser_settings_init( &_httpParserSettings );
+
+ /* Set the http-parser callbacks. */
+ _httpParserSettings.on_message_begin = _httpParserOnMessageBeginCallback;
+ _httpParserSettings.on_status = _httpParserOnStatusCallback;
+ _httpParserSettings.on_header_field = _httpParserOnHeaderFieldCallback;
+ _httpParserSettings.on_header_value = _httpParserOnHeaderValueCallback;
+ _httpParserSettings.on_headers_complete = _httpParserOnHeadersCompleteCallback;
+ _httpParserSettings.on_body = _httpParserOnBodyCallback;
+ _httpParserSettings.on_message_complete = _httpParserOnMessageCompleteCallback;
+
+/* This code prints debugging information and is, therefore, compiled only when
+ * log level is set to IOT_LOG_DEBUG. */
+ #if ( LIBRARY_LOG_LEVEL == IOT_LOG_DEBUG )
+ _httpParserSettings.on_chunk_header = _httpParserOnChunkHeaderCallback;
+ _httpParserSettings.on_chunk_complete = _httpParserOnChunkCompleteCallback;
+ #endif
+ HTTPS_GOTO_CLEANUP();
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+static IotHttpsReturnCode_t _initializeResponse( IotHttpsResponseHandle_t * pRespHandle,
+ IotHttpsResponseInfo_t * pRespInfo,
+ _httpsRequest_t * pHttpsRequest )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ _httpsResponse_t * pHttpsResponse = NULL;
+
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pRespInfo->userBuffer.pBuffer );
+
+ /* Check of the user buffer is large enough for the response context + default headers. */
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( pRespInfo->userBuffer.bufferLen >= responseUserBufferMinimumSize,
+ IOT_HTTPS_INSUFFICIENT_MEMORY,
+ "Buffer size is too small to initialize the response context. User buffer size: %d, required minimum size; %d.",
+ pRespInfo->userBuffer.bufferLen,
+ responseUserBufferMinimumSize );
+
+ /* Initialize the corresponding response to this request. */
+ pHttpsResponse = ( _httpsResponse_t * ) ( pRespInfo->userBuffer.pBuffer );
+
+ /* Clear out the response user buffer. This is important because we
+ * give the whole buffer to the parser as opposed to the actual content
+ * length and rely on the parser to stop when a complete HTTP response
+ * is found. To make sure that any data in the buffer which is not part
+ * of the received HTTP response, does not get interpreted as part of
+ * the HTTP repose, we zero out the buffer here. */
+ memset( pRespInfo->userBuffer.pBuffer, 0, pRespInfo->userBuffer.bufferLen );
+
+ pHttpsResponse->pHeaders = ( uint8_t * ) ( pHttpsResponse ) + sizeof( _httpsResponse_t );
+ pHttpsResponse->pHeadersEnd = ( uint8_t * ) ( pHttpsResponse ) + pRespInfo->userBuffer.bufferLen;
+ pHttpsResponse->pHeadersCur = pHttpsResponse->pHeaders;
+
+ if( pHttpsRequest->isAsync )
+ {
+ pHttpsResponse->isAsync = true;
+
+ /* For an asynchronous request the response body is provided by the application in the
+ * IotHttpsCallbacks_t.readReadyCallback(). These pointers will be updated when IotHttpsClient_ReadResponseBody()
+ * is invoked. */
+ pHttpsResponse->pBody = NULL;
+ pHttpsResponse->pBodyCur = NULL;
+ pHttpsResponse->pBodyEnd = NULL;
+
+ pHttpsResponse->pCallbacks = pHttpsRequest->pCallbacks;
+ pHttpsResponse->pUserPrivData = pHttpsRequest->pUserPrivData;
+ }
+ else
+ {
+ pHttpsResponse->isAsync = false;
+ /* The request body pointer is allowed to be NULL. u.pSyncInfo was checked for NULL earlier in this function. */
+ pHttpsResponse->pBody = pRespInfo->pSyncInfo->pBody;
+ pHttpsResponse->pBodyCur = pHttpsResponse->pBody;
+ pHttpsResponse->pBodyEnd = pHttpsResponse->pBody + pRespInfo->pSyncInfo->bodyLen;
+
+ /* Clear out the body bufffer. This is important because we give the
+ * whole buffer to the parser as opposed to the actual content length and
+ * rely on the parser to stop when a complete HTTP response is found. To
+ * make sure that any data in the buffer which is not part of the received
+ * HTTP response, does not get interpreted as part of the HTTP repose, we
+ * zero out the buffer here. */
+ memset( pRespInfo->pSyncInfo->pBody, 0, pRespInfo->pSyncInfo->bodyLen );
+ }
+
+ /* Reinitialize the parser and set the fill buffer state to empty. This does not return any errors. */
+ http_parser_init( &( pHttpsResponse->httpParserInfo.responseParser ), HTTP_RESPONSE );
+ http_parser_init( &( pHttpsResponse->httpParserInfo.readHeaderParser ), HTTP_RESPONSE );
+ /* Set the third party http parser function. */
+ pHttpsResponse->httpParserInfo.parseFunc = http_parser_execute;
+ pHttpsResponse->httpParserInfo.readHeaderParser.data = ( void * ) ( pHttpsResponse );
+ pHttpsResponse->httpParserInfo.responseParser.data = ( void * ) ( pHttpsResponse );
+
+ pHttpsResponse->status = 0;
+ pHttpsResponse->method = pHttpsRequest->method;
+ pHttpsResponse->parserState = PARSER_STATE_NONE;
+ pHttpsResponse->bufferProcessingState = PROCESSING_STATE_NONE;
+ pHttpsResponse->pReadHeaderField = NULL;
+ pHttpsResponse->readHeaderFieldLength = 0;
+ pHttpsResponse->pReadHeaderValue = NULL;
+ pHttpsResponse->readHeaderValueLength = 0;
+ pHttpsResponse->foundHeaderField = 0;
+ pHttpsResponse->pHttpsConnection = NULL;
+
+ pHttpsResponse->pBodyInHeaderBuf = NULL;
+ pHttpsResponse->pBodyCurInHeaderBuf = NULL;
+ pHttpsResponse->bodyRxStatus = IOT_HTTPS_OK;
+ pHttpsResponse->cancelled = false;
+ pHttpsResponse->syncStatus = IOT_HTTPS_OK;
+ /* There is no request associated with this response right now, so it is finished sending. */
+ pHttpsResponse->reqFinishedSending = true;
+ pHttpsResponse->isNonPersistent = pHttpsRequest->isNonPersistent;
+
+ /* Set the response handle to return. */
+ *pRespHandle = pHttpsResponse;
+
+ HTTPS_FUNCTION_CLEANUP_BEGIN();
+
+ if( HTTPS_FAILED( status ) )
+ {
+ pRespHandle = NULL;
+ }
+
+ HTTPS_FUNCTION_CLEANUP_END();
+}
+
+/*-----------------------------------------------------------*/
+
+void IotHttpsClient_Cleanup( void )
+{
+ /* There is nothing to clean up here as of now. */
+}
+
+/* --------------------------------------------------------- */
+
+IotHttpsReturnCode_t IotHttpsClient_Connect( IotHttpsConnectionHandle_t * pConnHandle,
+ IotHttpsConnectionInfo_t * pConnInfo )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ /* Check for NULL parameters in a public API. */
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pConnHandle );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pConnInfo );
+
+ /* If a valid connection handle is passed in. */
+ if( *pConnHandle != NULL )
+ {
+ /* If the handle in a connected state, then we want to disconnect before reconnecting. The ONLY way to put the
+ * handle is a disconnect state is to call IotHttpsClient_Disconnect(). */
+ if( ( *pConnHandle )->isConnected )
+ {
+ status = IotHttpsClient_Disconnect( *pConnHandle );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Error disconnecting a connected *pConnHandle passed to IotHttpsClient_Connect().Error code %d", status );
+ *pConnHandle = NULL;
+ HTTPS_GOTO_CLEANUP();
+ }
+ }
+ }
+
+ /* Connect to the server now. Initialize all resources needed for the connection context as well here. */
+ status = _createHttpsConnection( pConnHandle, pConnInfo );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Error in IotHttpsClient_Connect(). Error code %d.", status );
+ }
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t IotHttpsClient_Disconnect( IotHttpsConnectionHandle_t connHandle )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ _httpsRequest_t * pHttpsRequest = NULL;
+ _httpsResponse_t * pHttpsResponse = NULL;
+ IotLink_t * pRespItem = NULL;
+ IotLink_t * pReqItem = NULL;
+
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( connHandle );
+
+ /* If this routine is currently is progress by another thread, for instance the taskpool worker that received a
+ * network error after sending, then return right away because connection resources are being used. */
+ if( IotMutex_TryLock( &( connHandle->connectionMutex ) ) == false )
+ {
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_BUSY );
+ }
+
+ /* Do not attempt to disconnect an already disconnected connection.
+ * It can happen when a user calls this functions and we return IOT_HTTPS_BUSY. */
+ if( connHandle->isConnected )
+ {
+ /* Mark the network as disconnected whether the disconnect passes or not. */
+ connHandle->isConnected = false;
+ _networkDisconnect( connHandle );
+ }
+
+ /* If there is a response in the connection's response queue and the associated request has not finished sending,
+ * then we cannot destroy the connection until it finishes. */
+ pRespItem = IotDeQueue_DequeueHead( &( connHandle->respQ ) );
+
+ if( pRespItem != NULL )
+ {
+ pHttpsResponse = IotLink_Container( _httpsResponse_t, pRespItem, link );
+
+ if( pHttpsResponse->reqFinishedSending == false )
+ {
+ IotLogError( "Connection is in use. Disconnected, but cannot destroy the connection." );
+ status = IOT_HTTPS_BUSY;
+
+ /* The request is busy, to as quickly as possible allow a successful retry call of this function we must
+ * cancel the busy request which is the first in the queue. */
+ pReqItem = IotDeQueue_PeekHead( &( connHandle->reqQ ) );
+
+ if( pReqItem != NULL )
+ {
+ pHttpsRequest = IotLink_Container( _httpsRequest_t, pReqItem, link );
+ _cancelRequest( pHttpsRequest );
+ }
+
+ /* We set the status as busy, but we do not goto the cleanup right away because we still want to remove
+ * all pending requests. */
+ }
+
+ /* Delete all possible pending responses. (This is defensive.) */
+ IotDeQueue_RemoveAll( &( connHandle->respQ ), NULL, 0 );
+
+ /* Put the response that was dequeued back so that the application can call this function again to check later
+ * that is exited and marked itself as finished sending.
+ * If during the last check and this check reqFinishedSending gets set to true, that is OK because on the next
+ * call to this routine, the disconnect will succeed. */
+ if( pHttpsResponse->reqFinishedSending == false )
+ {
+ IotDeQueue_EnqueueHead( &( connHandle->respQ ), pRespItem );
+ }
+ }
+
+ /* Remove all pending requests. If this routine is called from the application context and there is a
+ * network receive callback in process, this routine will wait in _networkDestroy until that routine returns.
+ * If this is routine is called from the network receive callback context, then the destroy happens after the
+ * network receive callback context returns. */
+ IotDeQueue_RemoveAll( &( connHandle->reqQ ), NULL, 0 );
+
+ /* Do not attempt to destroy an already destroyed connection. This can happen when the user calls this function and
+ * IOT_HTTPS_BUSY is returned. */
+ if( HTTPS_SUCCEEDED( status ) )
+ {
+ if( connHandle->isDestroyed == false )
+ {
+ connHandle->isDestroyed = true;
+ _networkDestroy( connHandle );
+ }
+ }
+
+ HTTPS_FUNCTION_CLEANUP_BEGIN();
+
+ /* This function is no longer in process, so disconnecting is no longer in process. This signals to the retry
+ * on this function that it can proceed with the disconnecting activities. */
+ if( connHandle != NULL )
+ {
+ IotMutex_Unlock( &( connHandle->connectionMutex ) );
+ }
+
+ HTTPS_FUNCTION_CLEANUP_END();
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t IotHttpsClient_InitializeRequest( IotHttpsRequestHandle_t * pReqHandle,
+ IotHttpsRequestInfo_t * pReqInfo )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ _httpsRequest_t * pHttpsRequest = NULL;
+ size_t additionalLength = 0;
+ size_t spaceLen = 1;
+ char * pSpace = " ";
+ size_t httpsMethodLen = 0;
+ size_t httpsProtocolVersionLen = FAST_MACRO_STRLEN( HTTPS_PROTOCOL_VERSION );
+
+ /* Check for NULL parameters in the public API. */
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pReqHandle );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pReqInfo );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pReqInfo->userBuffer.pBuffer );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pReqInfo->pHost );
+
+ if( pReqInfo->isAsync )
+ {
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pReqInfo->u.pAsyncInfo );
+ }
+ else
+ {
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pReqInfo->u.pSyncInfo );
+ }
+
+ /* Check of the user buffer is large enough for the request context + default headers. */
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( pReqInfo->userBuffer.bufferLen >= requestUserBufferMinimumSize,
+ IOT_HTTPS_INSUFFICIENT_MEMORY,
+ "Buffer size is too small to initialize the request context. User buffer size: %d, required minimum size; %d.",
+ pReqInfo->userBuffer.bufferLen,
+ requestUserBufferMinimumSize );
+
+ /* Set the request contet to the start of the userbuffer. */
+ pHttpsRequest = ( _httpsRequest_t * ) ( pReqInfo->userBuffer.pBuffer );
+ /* Clear out the user buffer. */
+ memset( pReqInfo->userBuffer.pBuffer, 0, pReqInfo->userBuffer.bufferLen );
+
+ /* Set the start of the headers to the end of the request context in the user buffer. */
+ pHttpsRequest->pHeaders = ( uint8_t * ) pHttpsRequest + sizeof( _httpsRequest_t );
+ pHttpsRequest->pHeadersEnd = ( uint8_t * ) pHttpsRequest + pReqInfo->userBuffer.bufferLen;
+ pHttpsRequest->pHeadersCur = pHttpsRequest->pHeaders;
+
+ /* Get the length of the HTTP method. */
+ httpsMethodLen = strlen( _pHttpsMethodStrings[ pReqInfo->method ] );
+
+ /* Add the request line to the header buffer. */
+ additionalLength = httpsMethodLen + \
+ spaceLen + \
+ pReqInfo->pathLen + \
+ spaceLen + \
+ httpsProtocolVersionLen + \
+ HTTPS_END_OF_HEADER_LINES_INDICATOR_LENGTH;
+
+ if( ( additionalLength + pHttpsRequest->pHeadersCur ) > ( pHttpsRequest->pHeadersEnd ) )
+ {
+ IotLogError( "Request line does not fit into the request user buffer: \"%s %.*s HTTP/1.1\\r\\n\" . ",
+ _pHttpsMethodStrings[ pReqInfo->method ],
+ pReqInfo->pathLen,
+ pReqInfo->pPath );
+ IotLogError( "The length needed is %d and the space available is %d.", additionalLength, pHttpsRequest->pHeadersEnd - pHttpsRequest->pHeadersCur );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_INSUFFICIENT_MEMORY );
+ }
+
+ /* Write "<METHOD> <PATH> HTTP/1.1\r\n" to the start of the header space. */
+ memcpy( pHttpsRequest->pHeadersCur, _pHttpsMethodStrings[ pReqInfo->method ], httpsMethodLen );
+ pHttpsRequest->pHeadersCur += httpsMethodLen;
+ memcpy( pHttpsRequest->pHeadersCur, pSpace, spaceLen );
+ pHttpsRequest->pHeadersCur += spaceLen;
+
+ if( pReqInfo->pPath == NULL )
+ {
+ pReqInfo->pPath = HTTPS_EMPTY_PATH;
+ pReqInfo->pathLen = FAST_MACRO_STRLEN( HTTPS_EMPTY_PATH );
+ }
+
+ memcpy( pHttpsRequest->pHeadersCur, pReqInfo->pPath, pReqInfo->pathLen );
+ pHttpsRequest->pHeadersCur += pReqInfo->pathLen;
+ memcpy( pHttpsRequest->pHeadersCur, pSpace, spaceLen );
+ pHttpsRequest->pHeadersCur += spaceLen;
+ memcpy( pHttpsRequest->pHeadersCur, HTTPS_PROTOCOL_VERSION, httpsProtocolVersionLen );
+ pHttpsRequest->pHeadersCur += httpsProtocolVersionLen;
+ memcpy( pHttpsRequest->pHeadersCur, HTTPS_END_OF_HEADER_LINES_INDICATOR, HTTPS_END_OF_HEADER_LINES_INDICATOR_LENGTH );
+ pHttpsRequest->pHeadersCur += HTTPS_END_OF_HEADER_LINES_INDICATOR_LENGTH;
+
+ /* Add the User-Agent header. */
+ status = _addHeader( pHttpsRequest, HTTPS_USER_AGENT_HEADER, FAST_MACRO_STRLEN( HTTPS_USER_AGENT_HEADER ), IOT_HTTPS_USER_AGENT, FAST_MACRO_STRLEN( IOT_HTTPS_USER_AGENT ) );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Failed to write header to the request user buffer: \"User-Agent: %s\\r\\n\" . Error code: %d",
+ IOT_HTTPS_USER_AGENT,
+ status );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ status = _addHeader( pHttpsRequest, HTTPS_HOST_HEADER, FAST_MACRO_STRLEN( HTTPS_HOST_HEADER ), pReqInfo->pHost, pReqInfo->hostLen );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Failed to write \"Host: %.*s\\r\\n\" to the request user buffer. Error code: %d",
+ pReqInfo->hostLen,
+ pReqInfo->pHost,
+ status );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ if( pReqInfo->isAsync )
+ {
+ pHttpsRequest->isAsync = true;
+ /* If this is an asynchronous request then save the callbacks to use. */
+ pHttpsRequest->pCallbacks = &( pReqInfo->u.pAsyncInfo->callbacks );
+ pHttpsRequest->pUserPrivData = pReqInfo->u.pAsyncInfo->pPrivData;
+ /* The body pointer and body length will be filled in when the application sends data in the writeCallback. */
+ pHttpsRequest->pBody = NULL;
+ pHttpsRequest->bodyLength = 0;
+ }
+ else
+ {
+ pHttpsRequest->isAsync = false;
+ /* Set the HTTP request entity body. This is allowed to be NULL for no body like for a GET request. */
+ pHttpsRequest->pBody = pReqInfo->u.pSyncInfo->pBody;
+ pHttpsRequest->bodyLength = pReqInfo->u.pSyncInfo->bodyLen;
+ }
+
+ /* Save the method of this request. */
+ pHttpsRequest->method = pReqInfo->method;
+ /* Set the connection persistence flag for keeping the connection open after receiving a response. */
+ pHttpsRequest->isNonPersistent = pReqInfo->isNonPersistent;
+ /* Initialize the request cancellation. */
+ pHttpsRequest->cancelled = false;
+ /* Initialize the status of sending the body over the network in a possible asynchronous request. */
+ pHttpsRequest->bodyTxStatus = IOT_HTTPS_OK;
+ /* This is a new request and therefore not scheduled yet. */
+ pHttpsRequest->scheduled = false;
+
+ /* Set the request handle to return. */
+ *pReqHandle = pHttpsRequest;
+
+ HTTPS_FUNCTION_CLEANUP_BEGIN();
+
+ if( HTTPS_FAILED( status ) && ( pReqHandle != NULL ) )
+ {
+ /* Set the request handle to return to NULL, if we failed anywhere. */
+ *pReqHandle = NULL;
+ }
+
+ HTTPS_FUNCTION_CLEANUP_END();
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t IotHttpsClient_AddHeader( IotHttpsRequestHandle_t reqHandle,
+ char * pName,
+ uint32_t nameLen,
+ char * pValue,
+ uint32_t valueLen )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ /* Check for NULL pointer paramters. */
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pName );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pValue );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( reqHandle );
+
+ /* Check for name long enough for header length calculation to overflow */
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( nameLen <= ( UINT32_MAX >> 2 ),
+ IOT_HTTPS_INVALID_PARAMETER,
+ "Attempting to generate headers with name length %d > %d. This is not allowed.",
+ nameLen, UINT32_MAX >> 2 );
+
+ /* Check for value long enough for header length calculation to overflow */
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( valueLen <= ( UINT32_MAX >> 2 ),
+ IOT_HTTPS_INVALID_PARAMETER,
+ "Attempting to generate headers with value length %d > %d. This is not allowed.",
+ valueLen, UINT32_MAX >> 2 );
+
+ /* Check for auto-generated header "Content-Length". This header is created and send automatically when right before
+ * request body is sent on the network. */
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( strncmp( pName, HTTPS_CONTENT_LENGTH_HEADER, FAST_MACRO_STRLEN( HTTPS_CONTENT_LENGTH_HEADER ) ) != 0,
+ IOT_HTTPS_INVALID_PARAMETER,
+ "Attempting to add auto-generated header %s. This is not allowed.",
+ HTTPS_CONTENT_LENGTH_HEADER );
+
+ /* Check for auto-generated header "Connection". This header is created and send automatically when right before
+ * request body is sent on the network. */
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( strncmp( pName, HTTPS_CONNECTION_HEADER, FAST_MACRO_STRLEN( HTTPS_CONNECTION_HEADER ) ) != 0,
+ IOT_HTTPS_INVALID_PARAMETER,
+ "Attempting to add auto-generated header %s. This is not allowed.",
+ HTTPS_CONNECTION_HEADER );
+
+ /* Check for auto-generated header "Host". This header is created and placed into the header buffer space
+ * in IotHttpsClient_InitializeRequest(). */
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( strncmp( pName, HTTPS_HOST_HEADER, FAST_MACRO_STRLEN( HTTPS_HOST_HEADER ) ) != 0,
+ IOT_HTTPS_INVALID_PARAMETER,
+ "Attempting to add auto-generated header %s. This is not allowed.",
+ HTTPS_HOST_HEADER );
+
+ /* Check for auto-generated header "User-Agent". This header is created and placed into the header buffer space
+ * in IotHttpsClient_InitializeRequest(). */
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( strncmp( pName, HTTPS_USER_AGENT_HEADER, FAST_MACRO_STRLEN( HTTPS_USER_AGENT_HEADER ) ) != 0,
+ IOT_HTTPS_INVALID_PARAMETER,
+ "Attempting to add auto-generated header %s. This is not allowed.",
+ HTTPS_USER_AGENT_HEADER );
+
+
+ status = _addHeader( reqHandle, pName, nameLen, pValue, valueLen );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Error in IotHttpsClient_AddHeader(), error code %d.", status );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t IotHttpsClient_SendSync( IotHttpsConnectionHandle_t connHandle,
+ IotHttpsRequestHandle_t reqHandle,
+ IotHttpsResponseHandle_t * pRespHandle,
+ IotHttpsResponseInfo_t * pRespInfo,
+ uint32_t timeoutMs )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ bool respFinishedSemCreated = false;
+ _httpsResponse_t * pHttpsResponse = NULL;
+
+ /* Parameter checks. */
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( connHandle );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( reqHandle );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pRespHandle );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pRespInfo );
+ /* Stop the application from scheduling requests on a closed connection. */
+ HTTPS_ON_ARG_ERROR_GOTO_CLEANUP( connHandle->isConnected );
+
+ /* If an asynchronous request/response is configured, that is invalid for this API. */
+ if( reqHandle->isAsync )
+ {
+ IotLogError( "Called IotHttpsClient_SendSync on an asynchronous configured request." );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_INVALID_PARAMETER );
+ }
+
+ /* Initialize the response handle to return. */
+ status = _initializeResponse( pRespHandle, pRespInfo, reqHandle );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Failed to initialize the response on the synchronous request %d.", reqHandle );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ /* Set the internal response to use. */
+ pHttpsResponse = *pRespHandle;
+
+ /* The implicit connection passed and we need to the set the connection handle in the request and response. */
+ reqHandle->pHttpsConnection = connHandle;
+ pHttpsResponse->pHttpsConnection = connHandle;
+
+ /* Create the semaphore used to wait on the response to finish being received. */
+ respFinishedSemCreated = IotSemaphore_Create( &( pHttpsResponse->respFinishedSem ), 0 /* initialValue */, 1 /* maxValue */ );
+
+ if( respFinishedSemCreated == false )
+ {
+ IotLogError( "Failed to create an internal semaphore." );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_INTERNAL_ERROR );
+ }
+
+ /* Associate the response to the request so that we can schedule it to be received when the request gets scheduled to send. */
+ reqHandle->pHttpsResponse = pHttpsResponse;
+
+ /* Schedule this request to be sent by adding it to the connection's request queue. */
+ status = _addRequestToConnectionReqQ( reqHandle );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Failed to schedule the synchronous request. Error code: %d", status );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ /* Wait for the request to finish. */
+ if( timeoutMs == 0 )
+ {
+ IotSemaphore_Wait( &( pHttpsResponse->respFinishedSem ) );
+ }
+ else
+ {
+ if( IotSemaphore_TimedWait( &( pHttpsResponse->respFinishedSem ), timeoutMs ) == false )
+ {
+ IotLogError( "Timed out waiting for the synchronous request to finish. Timeout ms: %d", timeoutMs );
+ _cancelRequest( reqHandle );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_TIMEOUT_ERROR );
+ }
+ }
+
+ HTTPS_FUNCTION_CLEANUP_BEGIN();
+
+ if( respFinishedSemCreated )
+ {
+ IotSemaphore_Destroy( &( pHttpsResponse->respFinishedSem ) );
+ }
+
+ /* If the syncStatus is anything other than IOT_HTTPS_OK, then the request was scheduled. */
+ if( ( pHttpsResponse != NULL ) && HTTPS_FAILED( pHttpsResponse->syncStatus ) )
+ {
+ status = pHttpsResponse->syncStatus;
+ }
+
+ if( HTTPS_FAILED( status ) )
+ {
+ if( pRespHandle != NULL )
+ {
+ *pRespHandle = NULL;
+ }
+
+ IotLogError( "IotHttpsClient_SendSync() failed." );
+ }
+
+ HTTPS_FUNCTION_CLEANUP_END();
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t IotHttpsClient_WriteRequestBody( IotHttpsRequestHandle_t reqHandle,
+ uint8_t * pBuf,
+ uint32_t len,
+ int isComplete )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( reqHandle );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pBuf );
+
+ /* This function is not valid for a synchronous response. Applications need to configure the request body in
+ * IotHttpsRequestInfo_t.pSyncInfo_t.reqData before calling IotHttpsClient_SendSync(). */
+ HTTPS_ON_ARG_ERROR_GOTO_CLEANUP( reqHandle->isAsync );
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( isComplete == 1,
+ IOT_HTTPS_NOT_SUPPORTED,
+ "isComplete must be 1 in IotHttpsClient_WriteRequestBody() for the current version of the HTTPS Client library." );
+
+ /* If the bodyLength is greater than 0, then we already called this function and we need to enforce that this
+ * function must only be called once. We only call this function once so that we can calculate the Content-Length. */
+ if( reqHandle->bodyLength > 0 )
+ {
+ IotLogError( "Error this function must be called once with the data needed to send. Variable length HTTP "
+ "request body is not supported in this library." );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_MESSAGE_FINISHED );
+ }
+
+ /* Set the pointer to the body and the length for the content-length calculation. */
+ reqHandle->pBody = ( uint8_t * ) pBuf;
+ reqHandle->bodyLength = len;
+
+ /* We send the HTTPS headers and body in this function so that the application has the freedom to specify a body
+ * that may be buffer on stack. */
+ status = _sendHttpsHeadersAndBody( reqHandle->pHttpsConnection, reqHandle );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Failed to send the headers and body. Error code %d.", status );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ HTTPS_FUNCTION_CLEANUP_BEGIN();
+
+ if( reqHandle != NULL )
+ {
+ reqHandle->bodyTxStatus = status;
+ }
+
+ HTTPS_FUNCTION_CLEANUP_END();
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t IotHttpsClient_ReadResponseBody( IotHttpsResponseHandle_t respHandle,
+ uint8_t * pBuf,
+ uint32_t * pLen )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ uint32_t bodyLengthInHeaderBuf = 0;
+
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( respHandle );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pBuf );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pLen );
+ HTTPS_ON_ARG_ERROR_GOTO_CLEANUP( respHandle->isAsync );
+
+ /* Set the current body in the respHandle to use in _receiveHttpsBody(). _receiveHttpsBody is generic
+ * to both async and sync request/response handling. In the sync version the body is configured during
+ * initializing the request. In the async version the body is given in this function on the fly. */
+ respHandle->pBody = pBuf;
+ respHandle->pBodyCur = respHandle->pBody;
+ respHandle->pBodyEnd = respHandle->pBodyCur + *pLen;
+
+ /* When there is part of the body in the header pBuffer. We need to move that data to this body pBuffer
+ * provided in this function. */
+ bodyLengthInHeaderBuf = respHandle->pBodyCurInHeaderBuf - respHandle->pBodyInHeaderBuf;
+
+ if( bodyLengthInHeaderBuf > 0 )
+ {
+ uint32_t copyLength = bodyLengthInHeaderBuf > *pLen ? *pLen : bodyLengthInHeaderBuf;
+ memcpy( respHandle->pBodyCur, respHandle->pBodyInHeaderBuf, copyLength );
+ respHandle->pBodyCur += copyLength;
+
+ /* This function may be called multiple times until all of the body that may be present in the header buffer is
+ * moved out. */
+ respHandle->pBodyInHeaderBuf += copyLength;
+ }
+
+ /* If there is room in the body buffer just provided by the application and we have not completed the current
+ * HTTP response message, then try to receive more body. */
+ if( ( ( respHandle->pBodyEnd - respHandle->pBodyCur ) > 0 ) && ( respHandle->parserState < PARSER_STATE_BODY_COMPLETE ) )
+ {
+ status = _receiveHttpsBody( respHandle->pHttpsConnection, respHandle );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Failed to receive the HTTP response body on the network. Error code: %d.", status );
+ HTTPS_GOTO_CLEANUP();
+ }
+ }
+
+ *pLen = respHandle->pBodyCur - respHandle->pBody;
+
+ HTTPS_FUNCTION_CLEANUP_BEGIN();
+
+ if( respHandle != NULL )
+ {
+ respHandle->bodyRxStatus = status;
+ }
+
+ HTTPS_FUNCTION_CLEANUP_END();
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t IotHttpsClient_CancelRequestAsync( IotHttpsRequestHandle_t reqHandle )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( reqHandle );
+
+ _cancelRequest( reqHandle );
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t IotHttpsClient_CancelResponseAsync( IotHttpsResponseHandle_t respHandle )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( respHandle );
+
+ _cancelResponse( respHandle );
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t IotHttpsClient_SendAsync( IotHttpsConnectionHandle_t connHandle,
+ IotHttpsRequestHandle_t reqHandle,
+ IotHttpsResponseHandle_t * pRespHandle,
+ IotHttpsResponseInfo_t * pRespInfo )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( connHandle );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( reqHandle );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pRespHandle );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pRespInfo );
+ HTTPS_ON_ARG_ERROR_GOTO_CLEANUP( reqHandle->isAsync );
+ /* Stop the application from scheduling requests on a closed connection. */
+ HTTPS_ON_ARG_ERROR_GOTO_CLEANUP( connHandle->isConnected );
+
+ /* Initialize the response handle to return. */
+ status = _initializeResponse( pRespHandle, pRespInfo, reqHandle );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Failed to initialize the response on the synchronous request %d.", reqHandle );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ /* Set the connection handle in the request handle so that we can use it in the _writeRequestBody() callback. */
+ reqHandle->pHttpsConnection = connHandle;
+
+ /* Set the connection handle in the response handle sp that we can use it in the _readReadyCallback() callback. */
+ ( *pRespHandle )->pHttpsConnection = connHandle;
+
+ /* Associate the response to the request so that we can schedule it to be received when the request gets scheduled to send. */
+ reqHandle->pHttpsResponse = *pRespHandle;
+
+ /* Add the request to the connection's request queue. */
+ status = _addRequestToConnectionReqQ( reqHandle );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ IotLogError( "Failed to add request %d to the connection's request queue. Error code: %d.", reqHandle, status );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t IotHttpsClient_ReadResponseStatus( IotHttpsResponseHandle_t respHandle,
+ uint16_t * pStatus )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( respHandle );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pStatus );
+
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( respHandle->status != 0,
+ IOT_HTTPS_NOT_FOUND,
+ "The HTTP response status was not found in the HTTP response header buffer." );
+
+ *pStatus = respHandle->status;
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t IotHttpsClient_ReadHeader( IotHttpsResponseHandle_t respHandle,
+ char * pName,
+ uint32_t nameLen,
+ char * pValue,
+ uint32_t valueLen )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ const char * pHttpParserErrorDescription = NULL;
+ IotHttpsResponseBufferState_t savedBufferState = PROCESSING_STATE_NONE;
+ IotHttpsResponseParserState_t savedParserState = PARSER_STATE_NONE;
+ size_t numParsed = 0;
+
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( respHandle );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pName );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pValue );
+ HTTPS_ON_ARG_ERROR_MSG_GOTO_CLEANUP( valueLen > 0,
+ IOT_HTTPS_INVALID_PARAMETER,
+ "pValue has insufficient space to store a value string (length is 0)" );
+
+ /* The buffer processing state is changed to searching the header buffer in this function. The parser state is
+ * changed in the response to wherever the parser is currently located in the response. If this function is called
+ * in the middle of processing a response (for example in readReadyCallback() routine of an asynchronous response),
+ * then parsing the response need to be able to start at the same place it was before calling this function. */
+ savedBufferState = respHandle->bufferProcessingState;
+ savedParserState = respHandle->parserState;
+
+ /* The header search parameters in the response handle are used as context in the http-parser callbacks. During
+ * the callback, pReadHeaderField is checked against the currently parsed header name. foundHeaderField is set to
+ * true when the pReadHeaderField is found in a header field callback. The bufferProcessingState tells the callback
+ * to skip the logic pertaining to when the response is being parsed for the first time. pReadHeaderValue will store
+ * the header value found. readHeaderValueLength will store the length of the header value found from within the
+ * response headers. */
+ respHandle->pReadHeaderField = pName;
+ respHandle->readHeaderFieldLength = nameLen;
+ respHandle->foundHeaderField = false;
+ respHandle->bufferProcessingState = PROCESSING_STATE_SEARCHING_HEADER_BUFFER;
+ respHandle->pReadHeaderValue = NULL;
+ respHandle->readHeaderValueLength = 0;
+
+ /* Start over the HTTP parser so that it will parser from the beginning of the message. */
+ http_parser_init( &( respHandle->httpParserInfo.readHeaderParser ), HTTP_RESPONSE );
+
+ IotLogDebug( "Now parsing HTTP Message buffer to read a header." );
+ numParsed = respHandle->httpParserInfo.parseFunc( &( respHandle->httpParserInfo.readHeaderParser ), &_httpParserSettings, ( char * ) ( respHandle->pHeaders ), respHandle->pHeadersCur - respHandle->pHeaders );
+ IotLogDebug( "Parsed %d characters in IotHttpsClient_ReadHeader().", numParsed );
+
+ /* There shouldn't be any errors parsing the response body given that the handle is from a validly
+ * received response, so this check is defensive. If there were errors parsing the original response headers, then
+ * the response handle would have been invalidated and the connection closed. */
+ if( ( respHandle->httpParserInfo.readHeaderParser.http_errno != 0 ) &&
+ ( HTTP_PARSER_ERRNO( &( respHandle->httpParserInfo.readHeaderParser ) ) > HPE_CB_chunk_complete ) )
+ {
+ pHttpParserErrorDescription = http_errno_description( HTTP_PARSER_ERRNO( &( respHandle->httpParserInfo.readHeaderParser ) ) );
+ IotLogError( "http_parser failed on the http response with error: %s", pHttpParserErrorDescription );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_PARSING_ERROR );
+ }
+
+ /* Not only do we need an indication that the header field was found, but also that the value was found as well.
+ * The value is found when it is non-NULL. The case where the header field is found, but the value is not found
+ * occurs when there are incomplete headers stored in the header buffer. The header buffer could end with a header
+ * field name. */
+ if( respHandle->foundHeaderField && ( respHandle->pReadHeaderValue != NULL ) )
+ {
+ /* The len of the pValue buffer must account for the NULL terminator. */
+ if( respHandle->readHeaderValueLength > ( valueLen - 1 ) )
+ {
+ IotLogError( "IotHttpsClient_ReadHeader(): The length of the pValue buffer specified is less than the actual length of the pValue. " );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_INSUFFICIENT_MEMORY );
+ }
+ else
+ {
+ memcpy( pValue, respHandle->pReadHeaderValue, respHandle->readHeaderValueLength );
+ pValue[ respHandle->readHeaderValueLength ] = '\0';
+ }
+ }
+ else
+ {
+ IotLogWarn( "IotHttpsClient_ReadHeader(): The header field %s was not found.", pName );
+ HTTPS_SET_AND_GOTO_CLEANUP( IOT_HTTPS_NOT_FOUND );
+ }
+
+ HTTPS_FUNCTION_CLEANUP_BEGIN();
+
+ /* Always restore the state back to what it was before entering this function. */
+ if( respHandle != NULL )
+ {
+ respHandle->bufferProcessingState = savedBufferState;
+ respHandle->parserState = savedParserState;
+ }
+
+ HTTPS_FUNCTION_CLEANUP_END();
+}
+
+/*-----------------------------------------------------------*/
+
+IotHttpsReturnCode_t IotHttpsClient_ReadContentLength( IotHttpsResponseHandle_t respHandle,
+ uint32_t * pContentLength )
+{
+ HTTPS_FUNCTION_ENTRY( IOT_HTTPS_OK );
+
+ const int CONTENT_LENGTH_NUMBERIC_BASE = 10;
+ char pContentLengthStr[ HTTPS_MAX_CONTENT_LENGTH_LINE_LENGTH ] = { 0 };
+
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( respHandle );
+ HTTPS_ON_NULL_ARG_GOTO_CLEANUP( pContentLength );
+
+ /* If there is no content-length header or if we were not able to store it in the header buffer this will be
+ * invalid. We do not use the content-length member of the http-parser state structure to get the content
+ * length as this is a PRIVATE member. Because it is a PRIVATE member it can be any value. */
+ status = IotHttpsClient_ReadHeader( respHandle, HTTPS_CONTENT_LENGTH_HEADER, FAST_MACRO_STRLEN( HTTPS_CONTENT_LENGTH_HEADER ), pContentLengthStr, HTTPS_MAX_CONTENT_LENGTH_LINE_LENGTH );
+
+ if( HTTPS_FAILED( status ) )
+ {
+ *pContentLength = 0;
+ IotLogError( "Could not read the Content-Length for the response." );
+ HTTPS_GOTO_CLEANUP();
+ }
+
+ *pContentLength = strtoul( pContentLengthStr, NULL, CONTENT_LENGTH_NUMBERIC_BASE );
+
+ HTTPS_FUNCTION_EXIT_NO_CLEANUP();
+}
+
+/*-----------------------------------------------------------*/
+
+/* Provide access to internal functions and variables if testing. */
+#if IOT_BUILD_TESTS == 1
+ #include "iot_test_access_https_client.c"
+#endif