mirror of
https://github.com/AquariaOSE/Aquaria.git
synced 2024-11-29 03:33:48 +00:00
1424 lines
35 KiB
C++
1424 lines
35 KiB
C++
// minihttp.cpp - All functionality required for a minimal TCP/HTTP client packed in one file.
|
|
// Released under the WTFPL (See minihttp.h)
|
|
|
|
#ifdef _MSC_VER
|
|
# ifndef _CRT_SECURE_NO_WARNINGS
|
|
# define _CRT_SECURE_NO_WARNINGS
|
|
# endif
|
|
# ifndef _CRT_SECURE_NO_DEPRECATE
|
|
# define _CRT_SECURE_NO_DEPRECATE
|
|
# endif
|
|
#endif
|
|
|
|
#ifdef _WIN32
|
|
# ifndef _WIN32_WINNT
|
|
# define _WIN32_WINNT 0x0501
|
|
# endif
|
|
# include <winsock2.h>
|
|
# include <ws2tcpip.h>
|
|
# define EWOULDBLOCK WSAEWOULDBLOCK
|
|
# define ETIMEDOUT WSAETIMEDOUT
|
|
# define ECONNRESET WSAECONNRESET
|
|
# define ENOTCONN WSAENOTCONN
|
|
# include <io.h>
|
|
#else
|
|
# include <sys/types.h>
|
|
# include <unistd.h>
|
|
# include <fcntl.h>
|
|
# include <sys/socket.h>
|
|
# include <netinet/in.h>
|
|
# include <netdb.h>
|
|
# define SOCKET_ERROR (-1)
|
|
# define INVALID_SOCKET (SOCKET)(~0)
|
|
typedef intptr_t SOCKET;
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sstream>
|
|
#include <cctype>
|
|
#include <cerrno>
|
|
#include <algorithm>
|
|
#include <assert.h>
|
|
|
|
#ifdef MINIHTTP_USE_MBEDTLS
|
|
# include <mbedtls/net.h>
|
|
# include <mbedtls/ssl.h>
|
|
# include <mbedtls/entropy.h>
|
|
# include <mbedtls/ctr_drbg.h>
|
|
#endif
|
|
|
|
#include "minihttp.h"
|
|
|
|
#define SOCKETVALID(s) ((s) != INVALID_SOCKET)
|
|
|
|
|
|
#ifdef _MSC_VER
|
|
# define STRNICMP _strnicmp
|
|
#else
|
|
# define STRNICMP strncasecmp
|
|
#endif
|
|
|
|
#ifdef _DEBUG
|
|
# define traceprint(...) {printf(__VA_ARGS__);}
|
|
#else
|
|
# define traceprint(...) {}
|
|
#endif
|
|
|
|
namespace minihttp {
|
|
|
|
#ifdef MINIHTTP_USE_MBEDTLS
|
|
// ------------------------ SSL STUFF -------------------------
|
|
bool HasSSL()
|
|
{
|
|
// compile time assertion that mbedtls_net_context really is just an int
|
|
switch(0) { case 0:; case (sizeof(mbedtls_net_context) == sizeof(int)):; }
|
|
|
|
return true;
|
|
}
|
|
|
|
void traceprint_ssl(void *ctx, int level, const char *file, int line, const char *str )
|
|
{
|
|
(void)ctx;
|
|
printf("ssl(%s:%04d) [%d] %s\n", file, line, level, str);
|
|
}
|
|
|
|
struct SSLCtx
|
|
{
|
|
SSLCtx()
|
|
{
|
|
mbedtls_entropy_init(&entropy);
|
|
mbedtls_x509_crt_init(&cacert);
|
|
mbedtls_ssl_init(&ssl);
|
|
mbedtls_ctr_drbg_init(&ctr_drbg);
|
|
mbedtls_ssl_config_init(&conf);
|
|
}
|
|
~SSLCtx()
|
|
{
|
|
mbedtls_entropy_free(&entropy);
|
|
mbedtls_x509_crt_free(&cacert);
|
|
mbedtls_ssl_free(&ssl);
|
|
mbedtls_ctr_drbg_free(&ctr_drbg);
|
|
mbedtls_ssl_config_free(&conf);
|
|
}
|
|
bool init()
|
|
{
|
|
const char *pers = "minihttp";
|
|
const size_t perslen = strlen(pers);
|
|
int err = mbedtls_ctr_drbg_seed(&ctr_drbg, mbedtls_entropy_func, &entropy, (const unsigned char *)pers, perslen);
|
|
if(err)
|
|
{
|
|
traceprint("SSLCtx::init(): mbedtls_ctr_drbg_seed() returned %d\n", err);
|
|
return false;
|
|
}
|
|
|
|
err = mbedtls_ssl_config_defaults(&conf,
|
|
MBEDTLS_SSL_IS_CLIENT,
|
|
MBEDTLS_SSL_TRANSPORT_STREAM,
|
|
MBEDTLS_SSL_PRESET_DEFAULT);
|
|
if(err)
|
|
{
|
|
traceprint("SSLCtx::init(): mbedtls_ssl_config_defaults() returned %d\n", err);
|
|
return false;
|
|
}
|
|
|
|
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_OPTIONAL);
|
|
mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL);
|
|
|
|
/* SSLv3 is deprecated, set minimum to TLS 1.0 */
|
|
mbedtls_ssl_conf_min_version(&conf, MBEDTLS_SSL_MAJOR_VERSION_3, MBEDTLS_SSL_MINOR_VERSION_1);
|
|
|
|
mbedtls_ssl_conf_rng(&conf, mbedtls_ctr_drbg_random, &ctr_drbg);
|
|
mbedtls_ssl_conf_dbg(&conf, traceprint_ssl, NULL);
|
|
|
|
err = mbedtls_ssl_setup(&ssl, &conf);
|
|
if(err)
|
|
{
|
|
traceprint("SSLCtx::init(): mbedtls_ssl_init() returned %d\n", err);
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
void reset()
|
|
{
|
|
mbedtls_ssl_session_reset(&ssl);
|
|
}
|
|
|
|
mbedtls_entropy_context entropy;
|
|
mbedtls_ctr_drbg_context ctr_drbg;
|
|
mbedtls_ssl_context ssl;
|
|
mbedtls_x509_crt cacert;
|
|
mbedtls_ssl_config conf;
|
|
};
|
|
|
|
|
|
// ------------------------------------------------------------
|
|
#else// MINIHTTP_USE_MBEDTLS
|
|
bool HasSSL() { return false; }
|
|
#endif
|
|
|
|
#define DEFAULT_BUFSIZE 4096
|
|
|
|
inline int _GetError()
|
|
{
|
|
#ifdef _WIN32
|
|
return WSAGetLastError();
|
|
#else
|
|
return errno;
|
|
#endif
|
|
}
|
|
|
|
inline std::string _GetErrorStr(int e)
|
|
{
|
|
std::string ret;
|
|
#ifdef _WIN32
|
|
LPTSTR s;
|
|
::FormatMessage(FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM, NULL, e, 0, (LPTSTR)&s, 0, NULL);
|
|
if(s)
|
|
ret = s;
|
|
::LocalFree(s);
|
|
#else
|
|
const char *s = strerror(e);
|
|
if(s)
|
|
ret = s;
|
|
#endif
|
|
return ret;
|
|
}
|
|
|
|
static bool _networkInitDone = false;
|
|
|
|
bool InitNetwork()
|
|
{
|
|
#ifdef _WIN32
|
|
WSADATA wsadata;
|
|
if(WSAStartup(MAKEWORD(2,2), &wsadata))
|
|
{
|
|
traceprint("WSAStartup ERROR: %s", _GetErrorStr(_GetError()).c_str());
|
|
return false;
|
|
}
|
|
#endif
|
|
_networkInitDone = true;
|
|
return true;
|
|
}
|
|
|
|
void StopNetwork()
|
|
{
|
|
#ifdef _WIN32
|
|
WSACleanup();
|
|
#endif
|
|
_networkInitDone = false;
|
|
}
|
|
|
|
static bool _Resolve(const char *host, unsigned int port, struct sockaddr_in *addr)
|
|
{
|
|
char port_str[16];
|
|
sprintf(port_str, "%u", port);
|
|
|
|
struct addrinfo hnt, *res = 0;
|
|
memset(&hnt, 0, sizeof(hnt));
|
|
hnt.ai_family = AF_INET;
|
|
hnt.ai_socktype = SOCK_STREAM;
|
|
if (getaddrinfo(host, port_str, &hnt, &res))
|
|
{
|
|
traceprint("RESOLVE ERROR: %s", _GetErrorStr(_GetError()).c_str());
|
|
return false;
|
|
}
|
|
if (res)
|
|
{
|
|
if (res->ai_family != AF_INET)
|
|
{
|
|
traceprint("RESOLVE WTF: %s", _GetErrorStr(_GetError()).c_str());
|
|
freeaddrinfo(res);
|
|
return false;
|
|
}
|
|
memcpy(addr, res->ai_addr, res->ai_addrlen);
|
|
freeaddrinfo(res);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
// FIXME: this does currently not handle links like:
|
|
// http://example.com/index.html#pos
|
|
|
|
|
|
bool SplitURI(const std::string& uri, std::string& protocol, std::string& host, std::string& file, int& port, bool& useSSL)
|
|
{
|
|
const char *p = uri.c_str();
|
|
const char *sl = strstr(p, "//");
|
|
unsigned int offs = 0;
|
|
port = -1;
|
|
bool ssl = false;
|
|
if(sl)
|
|
{
|
|
size_t colon = uri.find(':');
|
|
size_t firstslash = uri.find('/');
|
|
if(colon < firstslash)
|
|
protocol = uri.substr(0, colon);
|
|
if(strncmp(p, "http://", 7) == 0)
|
|
{
|
|
offs = 7;
|
|
port = 80;
|
|
}
|
|
else if(strncmp(p, "https://", 8) == 0)
|
|
{
|
|
offs = 8;
|
|
port = 443;
|
|
ssl = true;
|
|
}
|
|
else
|
|
return false;
|
|
|
|
p = sl + 2;
|
|
}
|
|
|
|
sl = strchr(p, '/');
|
|
if(!sl)
|
|
{
|
|
host = p;
|
|
file = "/";
|
|
}
|
|
else
|
|
{
|
|
host = uri.substr(offs, sl - p);
|
|
file = sl;
|
|
}
|
|
|
|
size_t colon = host.find(':');
|
|
if(colon != std::string::npos)
|
|
{
|
|
port = atoi(host.c_str() + colon);
|
|
host.erase(colon);
|
|
}
|
|
useSSL = ssl;
|
|
|
|
return true;
|
|
}
|
|
|
|
void URLEncode(const std::string& s, std::string& enc)
|
|
{
|
|
const size_t len = s.length();
|
|
char buf[3];
|
|
buf[0] = '%';
|
|
for(size_t i = 0; i < len; i++)
|
|
{
|
|
const unsigned char c = s[i];
|
|
// from https://www.ietf.org/rfc/rfc1738.txt, page 3
|
|
// with some changes for compatibility
|
|
if(isalnum(c) || c == '-' || c == '_' || c == '.' || c == ',')
|
|
enc += (char)c;
|
|
else if(c == ' ')
|
|
enc += '+';
|
|
else
|
|
{
|
|
unsigned nib = (c >> 4) & 0xf;
|
|
buf[1] = nib < 10 ? '0' + nib : 'a' + (nib-10);
|
|
nib = c & 0xf;
|
|
buf[2] = nib < 10 ? '0' + nib : 'a' + (nib-10);
|
|
enc.append(&buf[0], 3);
|
|
}
|
|
}
|
|
}
|
|
|
|
static bool _SetNonBlocking(SOCKET s, bool nonblock)
|
|
{
|
|
if(!SOCKETVALID(s))
|
|
return false;
|
|
#ifdef MINIHTTP_USE_MBEDTLS
|
|
if(nonblock)
|
|
return mbedtls_net_set_nonblock((mbedtls_net_context*)&s) == 0; // this horrible hackery is okay as long as the compile assert in HasSSL() holds
|
|
else
|
|
return mbedtls_net_set_block((mbedtls_net_context*)&s) == 0;
|
|
#elif defined(_WIN32)
|
|
ULONG tmp = !!nonblock;
|
|
if(::ioctlsocket(s, FIONBIO, &tmp) == SOCKET_ERROR)
|
|
return false;
|
|
#else
|
|
int tmp = ::fcntl(s, F_GETFL);
|
|
if(tmp < 0)
|
|
return false;
|
|
if(::fcntl(s, F_SETFL, nonblock ? (tmp|O_NONBLOCK) : (tmp|=~O_NONBLOCK)) < 0)
|
|
return false;
|
|
#endif
|
|
return true;
|
|
}
|
|
|
|
TcpSocket::TcpSocket()
|
|
: _inbuf(NULL)
|
|
, _readptr(NULL)
|
|
, _inbufSize(0)
|
|
, _recvSize(0)
|
|
, _lastport(0)
|
|
, _s(INVALID_SOCKET)
|
|
, _sslctx(NULL)
|
|
{
|
|
#ifdef MINIHTTP_USE_MBEDTLS
|
|
mbedtls_net_init((mbedtls_net_context*)&_s);
|
|
#endif
|
|
}
|
|
|
|
TcpSocket::~TcpSocket()
|
|
{
|
|
close();
|
|
if(_inbuf)
|
|
free(_inbuf);
|
|
}
|
|
|
|
bool TcpSocket::isOpen(void)
|
|
{
|
|
return SOCKETVALID(_s);
|
|
}
|
|
|
|
void TcpSocket::close(void)
|
|
{
|
|
if(!SOCKETVALID(_s))
|
|
return;
|
|
|
|
traceprint("TcpSocket::close\n");
|
|
|
|
_OnCloseInternal();
|
|
|
|
#ifdef MINIHTTP_USE_MBEDTLS
|
|
if(_sslctx)
|
|
((SSLCtx*)_sslctx)->reset();
|
|
mbedtls_net_free((mbedtls_net_context*)&_s);
|
|
shutdownSSL();
|
|
#else
|
|
# ifdef _WIN32
|
|
::closesocket((SOCKET)_s);
|
|
# else
|
|
::close(_s);
|
|
# endif
|
|
#endif
|
|
|
|
_s = INVALID_SOCKET;
|
|
_recvSize = 0;
|
|
}
|
|
|
|
void TcpSocket::_OnCloseInternal()
|
|
{
|
|
_OnClose();
|
|
}
|
|
|
|
bool TcpSocket::SetNonBlocking(bool nonblock)
|
|
{
|
|
_nonblocking = nonblock;
|
|
return _SetNonBlocking(_s, nonblock);
|
|
}
|
|
|
|
void TcpSocket::SetBufsizeIn(unsigned int s)
|
|
{
|
|
if(s < 512)
|
|
s = 512;
|
|
if(s != _inbufSize)
|
|
_inbuf = (char*)realloc(_inbuf, s);
|
|
_inbufSize = s;
|
|
_writeSize = s - 1;
|
|
_readptr = _writeptr = _inbuf;
|
|
}
|
|
|
|
static bool _openSocket(SOCKET *ps, const char *host, unsigned port)
|
|
{
|
|
#ifdef MINIHTTP_USE_MBEDTLS
|
|
int s;
|
|
char portstr[16];
|
|
sprintf(portstr, "%d", port);
|
|
int err = mbedtls_net_connect((mbedtls_net_context*)&s, host, portstr, MBEDTLS_NET_PROTO_TCP);
|
|
if(err)
|
|
{
|
|
traceprint("open_ssl: net_connect(%s, %u) returned %d\n", host, port, err);
|
|
return false;
|
|
}
|
|
#else
|
|
sockaddr_in addr;
|
|
if(!_Resolve(host, port, &addr))
|
|
{
|
|
traceprint("RESOLV ERROR: %s\n", _GetErrorStr(_GetError()).c_str());
|
|
return false;
|
|
}
|
|
|
|
SOCKET s = socket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
if(!SOCKETVALID(s))
|
|
{
|
|
traceprint("SOCKET ERROR: %s\n", _GetErrorStr(_GetError()).c_str());
|
|
return false;
|
|
}
|
|
|
|
if (::connect(s, (sockaddr*)&addr, sizeof(sockaddr)))
|
|
{
|
|
traceprint("CONNECT ERROR: %s\n", _GetErrorStr(_GetError()).c_str());
|
|
return false;
|
|
}
|
|
#endif
|
|
|
|
*ps = s;
|
|
return true;
|
|
}
|
|
|
|
#ifdef MINIHTTP_USE_MBEDTLS
|
|
static bool _openSSL(void *ps, SSLCtx *ctx)
|
|
{
|
|
mbedtls_ssl_set_bio(&ctx->ssl, (mbedtls_net_context*)ps, mbedtls_net_send, mbedtls_net_recv, NULL);
|
|
|
|
traceprint("SSL handshake now...\n");
|
|
int err;
|
|
while( (err = mbedtls_ssl_handshake(&ctx->ssl)) )
|
|
{
|
|
if(err != MBEDTLS_ERR_SSL_WANT_READ && err != MBEDTLS_ERR_SSL_WANT_WRITE)
|
|
{
|
|
traceprint("open_ssl: ssl_handshake returned -0x%x\n\n", -err);
|
|
return false;
|
|
}
|
|
}
|
|
traceprint("SSL handshake done\n");
|
|
return true;
|
|
}
|
|
#endif
|
|
|
|
bool TcpSocket::open(const char *host /* = NULL */, unsigned int port /* = 0 */)
|
|
{
|
|
if(isOpen())
|
|
{
|
|
if( (host && host != _host) || (port && port != _lastport) )
|
|
close();
|
|
// ... and continue connecting to new host/port
|
|
else
|
|
return true; // still connected, to same host and port.
|
|
}
|
|
|
|
if(host)
|
|
_host = host;
|
|
else
|
|
host = _host.c_str();
|
|
|
|
if(port)
|
|
_lastport = port;
|
|
else
|
|
{
|
|
port = _lastport;
|
|
if(!port)
|
|
return false;
|
|
}
|
|
|
|
traceprint("TcpSocket::open(): host = [%s], port = %d\n", host, port);
|
|
|
|
assert(!SOCKETVALID(_s));
|
|
|
|
_recvSize = 0;
|
|
|
|
{
|
|
SOCKET s;
|
|
if(!_openSocket(&s, host, port))
|
|
return false;
|
|
_s = s;
|
|
|
|
#ifdef SO_NOSIGPIPE
|
|
// Don't fire SIGPIPE when trying to write to a closed socket
|
|
{
|
|
int set = 1;
|
|
setsockopt(s, SOL_SOCKET, SO_NOSIGPIPE, (void *)&set, sizeof(int));
|
|
}
|
|
#endif
|
|
|
|
}
|
|
|
|
_SetNonBlocking(_s, _nonblocking); // restore setting if it was set in invalid state. static call because _s is intentionally still invalid here.
|
|
|
|
#ifdef MINIHTTP_USE_MBEDTLS
|
|
if(_sslctx)
|
|
{
|
|
traceprint("TcpSocket::open(): SSL requested...\n");
|
|
if(!_openSSL(&_s, (SSLCtx*)_sslctx))
|
|
{
|
|
close();
|
|
return false;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
_OnOpen();
|
|
|
|
return true;
|
|
}
|
|
|
|
#ifdef MINIHTTP_USE_MBEDTLS
|
|
void TcpSocket::shutdownSSL()
|
|
{
|
|
delete ((SSLCtx*)_sslctx);
|
|
_sslctx = NULL;
|
|
}
|
|
|
|
bool TcpSocket::initSSL(const char *certs)
|
|
{
|
|
SSLCtx *ctx = (SSLCtx*)_sslctx;
|
|
if(ctx)
|
|
ctx->reset();
|
|
else
|
|
{
|
|
ctx = new SSLCtx();
|
|
_sslctx = ctx;
|
|
if(!ctx->init())
|
|
{
|
|
shutdownSSL();
|
|
return false;
|
|
}
|
|
}
|
|
|
|
if(certs)
|
|
{
|
|
int err = mbedtls_x509_crt_parse(&ctx->cacert, (const unsigned char*)certs, strlen(certs));
|
|
if(err)
|
|
{
|
|
shutdownSSL();
|
|
traceprint("x509_crt_parse() returned %d\n", err);
|
|
return false;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
SSLResult TcpSocket::verifySSL(char *buf, unsigned bufsize)
|
|
{
|
|
if(!_sslctx)
|
|
return SSLR_NO_SSL;
|
|
|
|
SSLCtx *ctx = (SSLCtx*)_sslctx;
|
|
unsigned r = SSLR_OK;
|
|
int res = mbedtls_ssl_get_verify_result(&ctx->ssl);
|
|
if(res)
|
|
{
|
|
if(res & MBEDTLS_X509_BADCERT_EXPIRED)
|
|
r |= SSLR_CERT_EXPIRED;
|
|
|
|
if(res & MBEDTLS_X509_BADCERT_REVOKED)
|
|
r |= SSLR_CERT_REVOKED;
|
|
|
|
if(res & MBEDTLS_X509_BADCERT_CN_MISMATCH)
|
|
r |= SSLR_CERT_CN_MISMATCH;
|
|
|
|
if(res & MBEDTLS_X509_BADCERT_NOT_TRUSTED)
|
|
r |= SSLR_CERT_NOT_TRUSTED;
|
|
|
|
if(res & MBEDTLS_X509_BADCERT_MISSING)
|
|
r |= SSLR_CERT_MISSING;
|
|
|
|
if(res & MBEDTLS_X509_BADCERT_SKIP_VERIFY)
|
|
r |= SSLR_CERT_SKIP_VERIFY;
|
|
|
|
if(res & MBEDTLS_X509_BADCERT_FUTURE)
|
|
r |= SSLR_CERT_FUTURE;
|
|
|
|
// More than just this?
|
|
if(res & (MBEDTLS_X509_BADCERT_SKIP_VERIFY | MBEDTLS_X509_BADCERT_NOT_TRUSTED))
|
|
r |= SSLR_FAIL;
|
|
}
|
|
|
|
if(buf && bufsize)
|
|
mbedtls_x509_crt_verify_info(buf, bufsize, "", res);
|
|
|
|
return (SSLResult)r;
|
|
}
|
|
#else // MINIHTTP_USE_MBEDTLS
|
|
void TcpSocket::shutdownSSL() {}
|
|
bool TcpSocket::initSSL(const char *certs)
|
|
{
|
|
traceprint("initSSL: Compiled without SSL support!\n");
|
|
return false;
|
|
}
|
|
SSLResult TcpSocket::verifySSL(char *buf, unsigned buflen) { return SSLR_NO_SSL; }
|
|
#endif
|
|
|
|
bool TcpSocket::SendBytes(const void *str, unsigned int len)
|
|
{
|
|
if(!len)
|
|
return true;
|
|
if(!SOCKETVALID(_s))
|
|
return false;
|
|
//traceprint("SEND: '%s'\n", str);
|
|
|
|
unsigned written = 0;
|
|
while(true) // FIXME: buffer bytes to an internal queue instead?
|
|
{
|
|
int ret = _writeBytes((const unsigned char*)str + written, len - written);
|
|
if(ret > 0)
|
|
{
|
|
assert((unsigned)ret <= len);
|
|
written += (unsigned)ret;
|
|
if(written >= len)
|
|
break;
|
|
}
|
|
else if(ret < 0)
|
|
{
|
|
int err = ret == -1 ? _GetError() : ret;
|
|
traceprint("SendBytes: error %d: %s\n", err, _GetErrorStr(err).c_str());
|
|
close();
|
|
return false;
|
|
}
|
|
// and if ret == 0, keep trying.
|
|
}
|
|
|
|
assert(written == len);
|
|
return true;
|
|
}
|
|
|
|
int TcpSocket::_writeBytes(const unsigned char *buf, size_t len)
|
|
{
|
|
int ret = 0;
|
|
|
|
#ifdef MINIHTTP_USE_MBEDTLS
|
|
int err;
|
|
if(_sslctx)
|
|
err = mbedtls_ssl_write(&((SSLCtx*)_sslctx)->ssl, buf, len);
|
|
else
|
|
err = mbedtls_net_send(&_s, buf, len);
|
|
|
|
switch(err)
|
|
{
|
|
case MBEDTLS_ERR_SSL_WANT_WRITE:
|
|
ret = 0; // FIXME: Nothing written, try later?
|
|
default:
|
|
ret = err;
|
|
}
|
|
#else
|
|
int flags = 0;
|
|
#ifdef MSG_NOSIGNAL
|
|
flags |= MSG_NOSIGNAL;
|
|
#endif
|
|
return ::send(_s, (const char*)buf, len, flags);
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
void TcpSocket::_ShiftBuffer(void)
|
|
{
|
|
size_t by = _readptr - _inbuf;
|
|
memmove(_inbuf, _readptr, by);
|
|
_readptr = _inbuf;
|
|
_writeptr = _inbuf + by;
|
|
_writeSize = _inbufSize - by - 1;
|
|
}
|
|
|
|
void TcpSocket::_OnData()
|
|
{
|
|
_OnRecv(_readptr, _recvSize);
|
|
}
|
|
|
|
int TcpSocket::_readBytes(unsigned char *buf, size_t maxlen)
|
|
{
|
|
#ifdef MINIHTTP_USE_MBEDTLS
|
|
if(_sslctx)
|
|
return mbedtls_ssl_read(&((SSLCtx*)_sslctx)->ssl, buf, maxlen);
|
|
else
|
|
return mbedtls_net_recv(&_s, buf, maxlen);
|
|
#else
|
|
return recv(_s, (char*)buf, maxlen, 0); // last char is used as string terminator
|
|
#endif
|
|
}
|
|
|
|
bool TcpSocket::update(void)
|
|
{
|
|
if(!_OnUpdate())
|
|
return false;
|
|
|
|
if(!isOpen())
|
|
return false;
|
|
|
|
if(!_inbuf)
|
|
SetBufsizeIn(DEFAULT_BUFSIZE);
|
|
|
|
int bytes = _readBytes((unsigned char*)_writeptr, _writeSize);
|
|
//traceprint("TcpSocket::update: _readBytes() result %d\n", bytes);
|
|
if(bytes > 0) // we received something
|
|
{
|
|
_inbuf[bytes] = 0;
|
|
_recvSize = bytes;
|
|
|
|
// reset pointers for next read
|
|
_writeSize = _inbufSize - 1;
|
|
_readptr = _writeptr = _inbuf;
|
|
|
|
_OnData();
|
|
}
|
|
else if(bytes == 0) // remote has closed the connection
|
|
{
|
|
close();
|
|
}
|
|
else // whoops, error?
|
|
{
|
|
// Possible that the error is returned directly (in that case, < -1, or -1 is returned and the error has to be retrieved seperately.
|
|
// But in the latter case, error numbers may be positive (at least on windows...)
|
|
int err = bytes == -1 ? _GetError() : bytes;
|
|
switch(err)
|
|
{
|
|
case EWOULDBLOCK:
|
|
#if defined(EAGAIN) && (EWOULDBLOCK != EAGAIN)
|
|
case EAGAIN: // linux man pages say this can also happen instead of EWOULDBLOCK
|
|
#endif
|
|
return false;
|
|
|
|
#ifdef MINIHTTP_USE_MBEDTLS
|
|
case MBEDTLS_ERR_SSL_WANT_READ:
|
|
break; // Try again later
|
|
#endif
|
|
|
|
default:
|
|
traceprint("SOCKET UPDATE ERROR: (%d): %s\n", err, _GetErrorStr(err).c_str());
|
|
case ECONNRESET:
|
|
case ENOTCONN:
|
|
case ETIMEDOUT:
|
|
#ifdef _WIN32
|
|
case WSAECONNABORTED:
|
|
case WSAESHUTDOWN:
|
|
#endif
|
|
close();
|
|
break;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
|
|
// ==========================
|
|
// ===== HTTP SPECIFIC ======
|
|
// ==========================
|
|
#ifdef MINIHTTP_SUPPORT_HTTP
|
|
|
|
static void strToLower(std::string& s)
|
|
{
|
|
std::transform(s.begin(), s.end(), s.begin(), tolower);
|
|
}
|
|
|
|
POST& POST::add(const char *key, const char *value)
|
|
{
|
|
if(!empty())
|
|
data += '&';
|
|
URLEncode(key, data);
|
|
data += '=';
|
|
URLEncode(value, data);
|
|
return *this;
|
|
}
|
|
|
|
|
|
HttpSocket::HttpSocket()
|
|
: TcpSocket()
|
|
, _keep_alive(0)
|
|
, _remaining(0)
|
|
, _status(0)
|
|
, _inProgress(false)
|
|
, _chunkedTransfer(false)
|
|
, _mustClose(true)
|
|
, _followRedir(true)
|
|
, _alwaysHandle(false)
|
|
{
|
|
}
|
|
|
|
HttpSocket::~HttpSocket()
|
|
{
|
|
}
|
|
|
|
void HttpSocket::_OnOpen()
|
|
{
|
|
TcpSocket::_OnOpen();
|
|
_chunkedTransfer = false;
|
|
_mustClose = true;
|
|
}
|
|
|
|
void HttpSocket::_OnCloseInternal()
|
|
{
|
|
if(!IsRedirecting() || _alwaysHandle)
|
|
_OnClose();
|
|
}
|
|
|
|
bool HttpSocket::_OnUpdate()
|
|
{
|
|
if(!TcpSocket::_OnUpdate())
|
|
return false;
|
|
|
|
if(_inProgress && !_chunkedTransfer && !_remaining && _status)
|
|
_FinishRequest();
|
|
|
|
//traceprint("HttpSocket::_OnUpdate, Q = %d\n", (unsigned)_requestQ.size());
|
|
|
|
// initiate transfer if queue is not empty, but the socket somehow forgot to proceed
|
|
if(_requestQ.size() && !_remaining && !_chunkedTransfer && !_inProgress)
|
|
_DequeueMore();
|
|
|
|
return true;
|
|
}
|
|
|
|
bool HttpSocket::Download(const std::string& url, const char *extraRequest /*= NULL*/, void *user /* = NULL */, const POST *post /*= NULL*/)
|
|
{
|
|
Request req;
|
|
req.user = user;
|
|
if(post)
|
|
req.post = *post;
|
|
SplitURI(url, req.protocol, req.host, req.resource, req.port, req.useSSL);
|
|
if(IsRedirecting() && req.host.empty()) // if we're following a redirection to the same host, the server is likely to omit its hostname
|
|
req.host = _curRequest.host;
|
|
if(req.port < 0)
|
|
req.port = 80;
|
|
if(extraRequest)
|
|
req.extraGetHeaders = extraRequest;
|
|
return SendRequest(req, false);
|
|
}
|
|
|
|
|
|
bool HttpSocket::_Redirect(std::string loc, bool forceGET)
|
|
{
|
|
traceprint("Following HTTP redirect to: %s\n", loc.c_str());
|
|
if(loc.empty())
|
|
return false;
|
|
|
|
Request req;
|
|
req.user = _curRequest.user;
|
|
req.useSSL = _curRequest.useSSL;
|
|
if(!forceGET)
|
|
req.post = _curRequest.post;
|
|
SplitURI(loc, req.protocol, req.host, req.resource, req.port, req.useSSL);
|
|
if(req.protocol.empty()) // assume local resource
|
|
{
|
|
req.host = _curRequest.host;
|
|
req.resource = loc;
|
|
}
|
|
if(req.host.empty())
|
|
req.host = _curRequest.host;
|
|
if(req.port < 0)
|
|
req.port = _curRequest.port;
|
|
req.extraGetHeaders = _curRequest.extraGetHeaders;
|
|
return SendRequest(req, false);
|
|
}
|
|
|
|
bool HttpSocket::SendRequest(const std::string what, const char *extraRequest /*= NULL*/, void *user /* = NULL */)
|
|
{
|
|
Request req(what, _host, _lastport, user);
|
|
if(extraRequest)
|
|
req.extraGetHeaders = extraRequest;
|
|
return SendRequest(req, false);
|
|
}
|
|
|
|
bool HttpSocket::QueueRequest(const std::string what, const char *extraRequest /*= NULL*/, void *user /* = NULL */)
|
|
{
|
|
Request req(what, _host, _lastport, user);
|
|
if(extraRequest)
|
|
req.extraGetHeaders = extraRequest;
|
|
return SendRequest(req, true);
|
|
}
|
|
|
|
bool HttpSocket::SendRequest(Request& req, bool enqueue)
|
|
{
|
|
if(req.host.empty() || !req.port)
|
|
return false;
|
|
|
|
const bool post = !req.post.empty();
|
|
|
|
std::stringstream r;
|
|
const char *crlf = "\r\n";
|
|
r << (post ? "POST " : "GET ") << req.resource << " HTTP/1.1" << crlf;
|
|
r << "Host: " << req.host << crlf;
|
|
if(_keep_alive)
|
|
{
|
|
r << "Connection: Keep-Alive" << crlf;
|
|
r << "Keep-Alive: " << _keep_alive << crlf;
|
|
}
|
|
else
|
|
r << "Connection: close" << crlf;
|
|
|
|
if(_user_agent.length())
|
|
r << "User-Agent: " << _user_agent << crlf;
|
|
|
|
if(_accept_encoding.length())
|
|
r << "Accept-Encoding: " << _accept_encoding << crlf;
|
|
|
|
if(post)
|
|
{
|
|
r << "Content-Length: " << req.post.length() << crlf;
|
|
r << "Content-Type: application/x-www-form-urlencoded" << crlf;
|
|
}
|
|
|
|
if(req.extraGetHeaders.length())
|
|
{
|
|
r << req.extraGetHeaders;
|
|
if(req.extraGetHeaders.compare(req.extraGetHeaders.length() - 2, std::string::npos, crlf))
|
|
r << crlf;
|
|
}
|
|
|
|
r << crlf; // header terminator
|
|
|
|
// FIXME: appending this to the 'header' field is probably not a good idea
|
|
if(post)
|
|
r << req.post.str();
|
|
|
|
req.header = r.str();
|
|
|
|
return _EnqueueOrSend(req, enqueue);
|
|
}
|
|
|
|
bool HttpSocket::_EnqueueOrSend(const Request& req, bool forceQueue /* = false */)
|
|
{
|
|
traceprint("HttpSocket::_EnqueueOrSend, forceQueue = %d\n", forceQueue);
|
|
if(_inProgress || forceQueue) // do not send while receiving other data
|
|
{
|
|
traceprint("HTTP: Transfer pending; putting into queue. Now %u waiting.\n", (unsigned int)_requestQ.size());
|
|
_requestQ.push(req);
|
|
return true;
|
|
}
|
|
// ok, we can send directly
|
|
traceprint("HTTP: Open request for immediate send.\n");
|
|
if(!_OpenRequest(req))
|
|
return false;
|
|
bool sent = SendBytes(req.header.c_str(), req.header.length());
|
|
_inProgress = sent;
|
|
return sent;
|
|
}
|
|
|
|
// called whenever a request is finished completely and the socket checks for more things to send
|
|
void HttpSocket::_DequeueMore(void)
|
|
{
|
|
traceprint("HttpSocket::_DequeueMore, Q = %u\n", (unsigned)_requestQ.size());
|
|
_FinishRequest(); // In case this was not done yet.
|
|
|
|
// _inProgress is known to be false here
|
|
if(_requestQ.size()) // still have other requests queued?
|
|
if(_EnqueueOrSend(_requestQ.front(), false)) // could we send?
|
|
_requestQ.pop(); // if so, we are done with this request
|
|
|
|
// otherwise, we are done for now. socket is kept alive for future sends. Nothing to do.
|
|
}
|
|
|
|
bool HttpSocket::_OpenRequest(const Request& req)
|
|
{
|
|
if(_inProgress)
|
|
{
|
|
traceprint("HttpSocket::_OpenRequest(): _inProgress == true, should not be called.");
|
|
return false;
|
|
}
|
|
if(req.useSSL && !hasSSL())
|
|
{
|
|
traceprint("HttpSocket::_OpenRequest(): Is an SSL connection, but SSL was not inited, doing that now\n");
|
|
if(!initSSL(NULL)) // FIXME: supply cert list?
|
|
{
|
|
traceprint("FAILED to init SSL\n");
|
|
return false;
|
|
}
|
|
}
|
|
if(!open(req.host.c_str(), req.port))
|
|
return false;
|
|
_inProgress = true;
|
|
_curRequest = req;
|
|
_status = 0;
|
|
return true;
|
|
}
|
|
|
|
void HttpSocket::_FinishRequest(void)
|
|
{
|
|
traceprint("HttpSocket::_FinishRequest\n");
|
|
if(_inProgress)
|
|
{
|
|
traceprint("... in progress. redirecting = %d\n", IsRedirecting());
|
|
if(!IsRedirecting() || _alwaysHandle)
|
|
_OnRequestDone(); // notify about finished request
|
|
_inProgress = false;
|
|
_hdrs.clear();
|
|
if(_mustClose)
|
|
close();
|
|
}
|
|
}
|
|
|
|
void HttpSocket::_ProcessChunk(void)
|
|
{
|
|
if(!_chunkedTransfer)
|
|
return;
|
|
|
|
unsigned int chunksize = -1;
|
|
|
|
while(true)
|
|
{
|
|
// less data required until chunk end than received, means the new chunk starts somewhere in the middle
|
|
// of the received data block. finish this chunk first.
|
|
if(_remaining)
|
|
{
|
|
if(_remaining <= _recvSize) // it contains the rest of the chunk, including CRLF
|
|
{
|
|
_OnRecvInternal(_readptr, _remaining - 2); // implicitly skip CRLF
|
|
_readptr += _remaining;
|
|
_recvSize -= _remaining;
|
|
_remaining = 0; // done with this one.
|
|
if(!chunksize) // and if chunksize was 0, we are done with all chunks.
|
|
break;
|
|
}
|
|
else // buffer did not yet arrive completely
|
|
{
|
|
_OnRecvInternal(_readptr, _recvSize);
|
|
_remaining -= _recvSize;
|
|
_recvSize = 0; // done with the whole buffer, but not with the chunk
|
|
return; // nothing else to do here
|
|
}
|
|
}
|
|
|
|
// each chunk identifier ends with CRLF.
|
|
// if we don't find that, we hit the corner case that the chunk identifier was not fully received.
|
|
// in that case, adjust the buffer and wait for the rest of the data to be appended
|
|
char *term = strstr(_readptr, "\r\n");
|
|
if(!term)
|
|
{
|
|
if(_recvSize) // if there is still something queued, move it to the left of the buffer and append on next read
|
|
_ShiftBuffer();
|
|
return;
|
|
}
|
|
term += 2; // skip CRLF
|
|
|
|
// when we are here, the (next) chunk header was completely received.
|
|
chunksize = strtoul(_readptr, NULL, 16);
|
|
_remaining = chunksize + 2; // the http protocol specifies that each chunk has a trailing CRLF
|
|
_recvSize -= (term - _readptr);
|
|
_readptr = term;
|
|
}
|
|
|
|
if(!chunksize) // this was the last chunk, no further data expected unless requested
|
|
{
|
|
_chunkedTransfer = false;
|
|
_DequeueMore();
|
|
if(_recvSize)
|
|
traceprint("_ProcessChunk: There are %u bytes left in the buffer, huh?\n", _recvSize);
|
|
if(_mustClose)
|
|
close();
|
|
}
|
|
}
|
|
|
|
void HttpSocket::_ParseHeaderFields(const char *s, size_t size)
|
|
{
|
|
// Key: Value data\r\n
|
|
|
|
const char * const maxs = s + size;
|
|
while(s < maxs)
|
|
{
|
|
while(isspace(*s))
|
|
{
|
|
++s;
|
|
if(s >= maxs)
|
|
return;
|
|
}
|
|
const char * const colon = strchr(s, ':');
|
|
if(!colon)
|
|
return;
|
|
const char *valEnd = strchr(colon, '\n'); // last char of val data
|
|
if(!valEnd)
|
|
return;
|
|
while(valEnd[-1] == '\n' || valEnd[-1] == '\r') // skip backwards if necessary
|
|
--valEnd;
|
|
const char *val = colon + 1; // value starts after ':' ...
|
|
while(isspace(*val) && val < valEnd) // skip spaces after the colon
|
|
++val;
|
|
std::string key(s, colon - s);
|
|
strToLower(key);
|
|
std::string valstr(val, valEnd - val);
|
|
_hdrs[key] = valstr;
|
|
traceprint("HDR: %s: %s\n", key.c_str(), valstr.c_str());
|
|
s = valEnd;
|
|
}
|
|
}
|
|
|
|
const char *HttpSocket::Hdr(const char *h) const
|
|
{
|
|
std::map<std::string, std::string>::const_iterator it = _hdrs.find(h);
|
|
return it == _hdrs.end() ? NULL : it->second.c_str();
|
|
}
|
|
|
|
static int safeatoi(const char *s)
|
|
{
|
|
return s ? atoi(s) : 0;
|
|
}
|
|
|
|
bool HttpSocket::_HandleStatus()
|
|
{
|
|
_remaining = _contentLen = safeatoi(Hdr("content-length"));
|
|
|
|
const char *encoding = Hdr("transfer-encoding");
|
|
_chunkedTransfer = encoding && !STRNICMP(encoding, "chunked", 7);
|
|
|
|
const char *conn = Hdr("connection"); // if its not keep-alive, server will close it, so we can too
|
|
_mustClose = !conn || STRNICMP(conn, "keep-alive", 10);
|
|
|
|
// As per the spec, we also need to handle 1xx codes, but are free to ignore them
|
|
const bool success = IsSuccess() || (_status >= 100 && _status <= 199);
|
|
|
|
if(!(_chunkedTransfer || _contentLen) && success)
|
|
traceprint("_ParseHeader: Not chunked transfer and content-length==0, this will go fail\n");
|
|
|
|
traceprint("Got HTTP Status %d\n", _status);
|
|
|
|
if(success)
|
|
return true;
|
|
|
|
bool forceGET = false;
|
|
switch(_status)
|
|
{
|
|
case 303:
|
|
forceGET = true; // As per spec, continue with a GET request
|
|
case 301:
|
|
case 302:
|
|
case 307:
|
|
case 308:
|
|
if(_followRedir)
|
|
if(const char *loc = Hdr("location"))
|
|
_Redirect(loc, forceGET);
|
|
return false;
|
|
|
|
default:
|
|
return false;
|
|
}
|
|
}
|
|
|
|
bool HttpSocket::IsRedirecting() const
|
|
{
|
|
switch(_status)
|
|
{
|
|
case 301:
|
|
case 302:
|
|
case 303:
|
|
case 307:
|
|
case 308:
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool HttpSocket::IsSuccess() const
|
|
{
|
|
const unsigned s = _status;
|
|
return s >= 200 && s <= 205;
|
|
}
|
|
|
|
|
|
|
|
void HttpSocket::_ParseHeader(void)
|
|
{
|
|
_tmpHdr += _inbuf;
|
|
const char *hptr = _tmpHdr.c_str();
|
|
|
|
if((_recvSize >= 5 || _tmpHdr.size() >= 5) && memcmp("HTTP/", hptr, 5))
|
|
{
|
|
traceprint("_ParseHeader: not HTTP stream\n");
|
|
return;
|
|
}
|
|
|
|
const char *hdrend = strstr(hptr, "\r\n\r\n");
|
|
if(!hdrend)
|
|
{
|
|
traceprint("_ParseHeader: could not find end-of-header marker, or incomplete buf; delaying.\n");
|
|
return;
|
|
}
|
|
|
|
//traceprint(hptr);
|
|
|
|
hptr = strchr(hptr + 5, ' '); // skip "HTTP/", already known
|
|
if(!hptr)
|
|
return; // WTF?
|
|
++hptr; // number behind first space is the status code
|
|
_status = atoi(hptr);
|
|
|
|
// Default values
|
|
_chunkedTransfer = false;
|
|
_contentLen = 0; // yet unknown
|
|
|
|
hptr = strstr(hptr, "\r\n");
|
|
_ParseHeaderFields(hptr + 2, hdrend - hptr);
|
|
|
|
// FIXME: return value indicates success.
|
|
// Bail out on non-success, or at least make it so that _OnRecv() is not called.
|
|
// (Unless an override bool is given that even non-successful answers get their data delivered!)
|
|
_HandleStatus();
|
|
|
|
// get ready
|
|
_readptr = strstr(_inbuf, "\r\n\r\n") + 4; // skip double newline. must have been found in hptr earlier.
|
|
_recvSize -= (_readptr - _inbuf); // skip the header part
|
|
_tmpHdr.clear();
|
|
}
|
|
|
|
// generic http header parsing
|
|
void HttpSocket::_OnData(void)
|
|
{
|
|
if(!(_chunkedTransfer || (_remaining && _recvSize)))
|
|
_ParseHeader();
|
|
|
|
if(_chunkedTransfer)
|
|
{
|
|
_ProcessChunk(); // first, try to finish one or more chunks
|
|
}
|
|
else if(_remaining && _recvSize) // something remaining? if so, we got a header earlier, but not all data
|
|
{
|
|
_remaining -= _recvSize;
|
|
_OnRecvInternal(_readptr, _recvSize);
|
|
|
|
if(int(_remaining) < 0)
|
|
{
|
|
traceprint("_OnRecv: _remaining wrap-around, huh??\n");
|
|
_remaining = 0;
|
|
}
|
|
if(!_remaining) // received last block?
|
|
{
|
|
if(_mustClose)
|
|
close();
|
|
else
|
|
_DequeueMore();
|
|
}
|
|
|
|
// nothing else to do here.
|
|
}
|
|
|
|
// otherwise, the server sent just the header, with the data following in the next packet
|
|
}
|
|
|
|
void HttpSocket::_OnClose()
|
|
{
|
|
if(!ExpectMoreData())
|
|
_FinishRequest();
|
|
}
|
|
|
|
void HttpSocket::_OnRecvInternal(void *buf, unsigned int size)
|
|
{
|
|
if(IsSuccess() || _alwaysHandle)
|
|
_OnRecv(buf, size);
|
|
}
|
|
|
|
#endif
|
|
|
|
// ===========================
|
|
// ===== SOCKET SET ==========
|
|
// ===========================
|
|
#ifdef MINIHTTP_SUPPORT_SOCKET_SET
|
|
|
|
SocketSet::~SocketSet()
|
|
{
|
|
deleteAll();
|
|
}
|
|
|
|
void SocketSet::deleteAll(void)
|
|
{
|
|
for(Store::iterator it = _store.begin(); it != _store.end(); ++it)
|
|
delete it->first;
|
|
_store.clear();
|
|
}
|
|
|
|
bool SocketSet::update(void)
|
|
{
|
|
bool interesting = false;
|
|
Store::iterator it = _store.begin();
|
|
for( ; it != _store.end(); )
|
|
{
|
|
TcpSocket *sock = it->first;
|
|
SocketSetData& sdata = it->second;
|
|
interesting = sock->update() || interesting;
|
|
if(sdata.deleteWhenDone && !sock->isOpen() && !sock->HasPendingTask())
|
|
{
|
|
traceprint("Delete socket\n");
|
|
delete sock;
|
|
_store.erase(it++);
|
|
}
|
|
else
|
|
++it;
|
|
}
|
|
return interesting;
|
|
}
|
|
|
|
void SocketSet::remove(TcpSocket *s)
|
|
{
|
|
_store.erase(s);
|
|
}
|
|
|
|
void SocketSet::add(TcpSocket *s, bool deleteWhenDone /* = true */)
|
|
{
|
|
s->SetNonBlocking(true);
|
|
SocketSetData sdata;
|
|
sdata.deleteWhenDone = deleteWhenDone;
|
|
_store[s] = sdata;
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
// ---------------------------------------------------
|
|
// Simple one-shot API
|
|
|
|
class DLSocket : public HttpSocket
|
|
{
|
|
public:
|
|
DLSocket() : buf(NULL), bufsz(0), bufcap(0), finished(false), fail(false)
|
|
{
|
|
}
|
|
|
|
virtual ~DLSocket() {}
|
|
|
|
char *buf;
|
|
size_t bufsz;
|
|
size_t bufcap;
|
|
bool finished;
|
|
bool fail;
|
|
|
|
protected:
|
|
|
|
void _OnRequestDone()
|
|
{
|
|
finished = true;
|
|
if(buf)
|
|
buf[bufsz] = 0; // zero-terminate
|
|
}
|
|
|
|
void _OnRecv(void *incoming, unsigned size)
|
|
{
|
|
if(!size || !IsSuccess())
|
|
return;
|
|
if(bufcap + size + 1 >= bufsz) // always make sure there's 1 more byte free for the zero-terminator
|
|
{
|
|
bufcap += (bufcap / 2) + size + 1;
|
|
buf = (char*)realloc(buf, bufcap);
|
|
if(!buf)
|
|
{
|
|
fail = true;
|
|
close();
|
|
}
|
|
}
|
|
memcpy(buf + bufsz, incoming, size);
|
|
bufsz += size;
|
|
}
|
|
};
|
|
|
|
char *Download(const char *url, size_t *sz, const POST *post /* = NULL */)
|
|
{
|
|
if(!_networkInitDone)
|
|
if(!InitNetwork())
|
|
return NULL;
|
|
|
|
DLSocket dl;
|
|
dl.SetBufsizeIn(64 * 1024);
|
|
dl.SetNonBlocking(false);
|
|
dl.SetFollowRedirect(true);
|
|
dl.SetAlwaysHandle(false);
|
|
dl.SetUserAgent("minihttp");
|
|
dl.Download(url, NULL, NULL, post);
|
|
|
|
while(dl.isOpen() || dl.HasPendingTask())
|
|
dl.update();
|
|
|
|
if(!dl.finished || dl.fail)
|
|
{
|
|
free(dl.buf);
|
|
return NULL;
|
|
}
|
|
|
|
if(sz)
|
|
*sz = dl.bufsz;
|
|
|
|
// FIXME: if the body is empty (aka the HTTP reply contained entirely of headers only), buf was not allocated and is still NULL.
|
|
// Might want to return 1 malloc'd zero byte in that case?
|
|
return dl.buf;
|
|
}
|
|
|
|
|
|
|
|
} // namespace minihttp
|