| /* |
| * lws-minimal-http-client |
| * |
| * Written in 2010-2019 by Andy Green <[email protected]> |
| * |
| * This file is made available under the Creative Commons CC0 1.0 |
| * Universal Public Domain Dedication. |
| * |
| * This demonstrates the a minimal http client using lws. |
| * |
| * It visits https://warmcat.com/ and receives the html page there. You |
| * can dump the page data by changing the #if 0 below. |
| */ |
| |
| #include <libwebsockets.h> |
| #include <string.h> |
| #include <signal.h> |
| |
| static int interrupted, bad = 1, status; |
| static struct lws *client_wsi; |
| |
| static int |
| callback_http(struct lws *wsi, enum lws_callback_reasons reason, |
| void *user, void *in, size_t len) |
| { |
| uint8_t buf[1280]; |
| union lws_tls_cert_info_results *ci = |
| (union lws_tls_cert_info_results *)buf; |
| #if defined(LWS_HAVE_CTIME_R) |
| char date[32]; |
| #endif |
| |
| switch (reason) { |
| |
| /* because we are protocols[0] ... */ |
| case LWS_CALLBACK_CLIENT_CONNECTION_ERROR: |
| lwsl_err("CLIENT_CONNECTION_ERROR: %s\n", |
| in ? (char *)in : "(null)"); |
| client_wsi = NULL; |
| break; |
| |
| case LWS_CALLBACK_ESTABLISHED_CLIENT_HTTP: |
| status = (int)lws_http_client_http_response(wsi); |
| lwsl_notice("lws_http_client_http_response %d\n", status); |
| |
| if (!lws_tls_peer_cert_info(wsi, LWS_TLS_CERT_INFO_COMMON_NAME, |
| ci, sizeof(buf) - sizeof(*ci))) |
| lwsl_notice(" Peer Cert CN : %s\n", ci->ns.name); |
| |
| if (!lws_tls_peer_cert_info(wsi, LWS_TLS_CERT_INFO_ISSUER_NAME, |
| ci, sizeof(ci->ns.name))) |
| lwsl_notice(" Peer Cert issuer : %s\n", ci->ns.name); |
| |
| if (!lws_tls_peer_cert_info(wsi, LWS_TLS_CERT_INFO_VALIDITY_FROM, |
| ci, 0)) |
| #if defined(LWS_HAVE_CTIME_R) |
| lwsl_notice(" Peer Cert Valid from: %s", |
| ctime_r(&ci->time, date)); |
| #else |
| lwsl_notice(" Peer Cert Valid from: %s", |
| ctime(&ci->time)); |
| #endif |
| if (!lws_tls_peer_cert_info(wsi, LWS_TLS_CERT_INFO_VALIDITY_TO, |
| ci, 0)) |
| #if defined(LWS_HAVE_CTIME_R) |
| lwsl_notice(" Peer Cert Valid to : %s", |
| ctime_r(&ci->time, date)); |
| #else |
| lwsl_notice(" Peer Cert Valid to : %s", |
| ctime(&ci->time)); |
| #endif |
| if (!lws_tls_peer_cert_info(wsi, LWS_TLS_CERT_INFO_USAGE, |
| ci, 0)) |
| lwsl_notice(" Peer Cert usage bits: 0x%x\n", ci->usage); |
| if (!lws_tls_peer_cert_info(wsi, |
| LWS_TLS_CERT_INFO_OPAQUE_PUBLIC_KEY, |
| ci, sizeof(buf) - sizeof(*ci))) { |
| lwsl_notice(" Peer Cert public key:\n"); |
| lwsl_hexdump_notice(ci->ns.name, (unsigned int)ci->ns.len); |
| } |
| |
| if (!lws_tls_peer_cert_info(wsi, LWS_TLS_CERT_INFO_AUTHORITY_KEY_ID, |
| ci, 0)) { |
| lwsl_notice(" AUTHORITY_KEY_ID\n"); |
| lwsl_hexdump_notice(ci->ns.name, (size_t)ci->ns.len); |
| } |
| if (!lws_tls_peer_cert_info(wsi, LWS_TLS_CERT_INFO_AUTHORITY_KEY_ID_ISSUER, |
| ci, 0)) { |
| lwsl_notice(" AUTHORITY_KEY_ID ISSUER\n"); |
| lwsl_hexdump_notice(ci->ns.name, (size_t)ci->ns.len); |
| } |
| if (!lws_tls_peer_cert_info(wsi, LWS_TLS_CERT_INFO_AUTHORITY_KEY_ID_SERIAL, |
| ci, 0)) { |
| lwsl_notice(" AUTHORITY_KEY_ID SERIAL\n"); |
| lwsl_hexdump_notice(ci->ns.name, (size_t)ci->ns.len); |
| } |
| if (!lws_tls_peer_cert_info(wsi, LWS_TLS_CERT_INFO_SUBJECT_KEY_ID, |
| ci, 0)) { |
| lwsl_notice(" AUTHORITY_KEY_ID SUBJECT_KEY_ID\n"); |
| lwsl_hexdump_notice(ci->ns.name, (size_t)ci->ns.len); |
| } |
| |
| break; |
| |
| /* chunks of chunked content, with header removed */ |
| case LWS_CALLBACK_RECEIVE_CLIENT_HTTP_READ: |
| lwsl_user("RECEIVE_CLIENT_HTTP_READ: read %d\n", (int)len); |
| #if 0 /* enable to dump the html */ |
| { |
| const char *p = in; |
| |
| while (len--) |
| if (*p < 0x7f) |
| putchar(*p++); |
| else |
| putchar('.'); |
| } |
| #endif |
| return 0; /* don't passthru */ |
| |
| /* uninterpreted http content */ |
| case LWS_CALLBACK_RECEIVE_CLIENT_HTTP: |
| { |
| char buffer[1024 + LWS_PRE]; |
| char *px = buffer + LWS_PRE; |
| int lenx = sizeof(buffer) - LWS_PRE; |
| |
| if (lws_http_client_read(wsi, &px, &lenx) < 0) |
| return -1; |
| } |
| return 0; /* don't passthru */ |
| |
| case LWS_CALLBACK_COMPLETED_CLIENT_HTTP: |
| lwsl_user("LWS_CALLBACK_COMPLETED_CLIENT_HTTP\n"); |
| client_wsi = NULL; |
| bad = status != 200; |
| lws_cancel_service(lws_get_context(wsi)); /* abort poll wait */ |
| break; |
| |
| case LWS_CALLBACK_CLOSED_CLIENT_HTTP: |
| client_wsi = NULL; |
| bad = status != 200; |
| lws_cancel_service(lws_get_context(wsi)); /* abort poll wait */ |
| break; |
| |
| default: |
| break; |
| } |
| |
| return lws_callback_http_dummy(wsi, reason, user, in, len); |
| } |
| |
| static const struct lws_protocols protocols[] = { |
| { |
| "http", |
| callback_http, |
| 0, 0, 0, NULL, 0 |
| }, |
| LWS_PROTOCOL_LIST_TERM |
| }; |
| |
| static void |
| sigint_handler(int sig) |
| { |
| interrupted = 1; |
| } |
| |
| int main(int argc, const char **argv) |
| { |
| struct lws_context_creation_info info; |
| struct lws_client_connect_info i; |
| struct lws_context *context; |
| const char *p; |
| int n = 0, logs = LLL_USER | LLL_ERR | LLL_WARN | LLL_NOTICE |
| /* |
| * For LLL_ verbosity above NOTICE to be built into lws, |
| * lws must have been configured and built with |
| * -DCMAKE_BUILD_TYPE=DEBUG instead of =RELEASE |
| * |
| * | LLL_INFO | LLL_PARSER | LLL_HEADER | LLL_EXT | |
| * LLL_CLIENT | LLL_LATENCY | LLL_DEBUG |
| */ ; |
| |
| signal(SIGINT, sigint_handler); |
| |
| if ((p = lws_cmdline_option(argc, argv, "-d"))) |
| logs = atoi(p); |
| |
| lws_set_log_level(logs, NULL); |
| lwsl_user("LWS minimal http client [<-d <verbosity>] [-l] [--h1]\n"); |
| |
| memset(&info, 0, sizeof info); /* otherwise uninitialized garbage */ |
| info.options = LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT; |
| info.port = CONTEXT_PORT_NO_LISTEN; /* we do not run any server */ |
| info.protocols = protocols; |
| /* |
| * since we know this lws context is only ever going to be used with |
| * one client wsis / fds / sockets at a time, let lws know it doesn't |
| * have to use the default allocations for fd tables up to ulimit -n. |
| * It will just allocate for 1 internal and 1 (+ 1 http2 nwsi) that we |
| * will use. |
| */ |
| info.fd_limit_per_thread = 1 + 1 + 1; |
| |
| #if defined(LWS_WITH_MBEDTLS) || defined(USE_WOLFSSL) |
| /* |
| * OpenSSL uses the system trust store. mbedTLS has to be told which |
| * CA to trust explicitly. |
| */ |
| info.client_ssl_ca_filepath = "./warmcat.com.cer"; |
| #endif |
| |
| context = lws_create_context(&info); |
| if (!context) { |
| lwsl_err("lws init failed\n"); |
| return 1; |
| } |
| |
| memset(&i, 0, sizeof i); /* otherwise uninitialized garbage */ |
| i.context = context; |
| i.ssl_connection = LCCSCF_USE_SSL; |
| |
| if (lws_cmdline_option(argc, argv, "-l")) { |
| i.port = 7681; |
| i.address = "localhost"; |
| i.ssl_connection |= LCCSCF_ALLOW_SELFSIGNED; |
| } else { |
| i.port = 443; |
| i.address = "warmcat.com"; |
| } |
| |
| if ((p = lws_cmdline_option(argc, argv, "-s"))) |
| i.address = p; |
| |
| i.path = "/"; |
| i.host = i.address; |
| i.origin = i.address; |
| |
| /* force h1 even if h2 available */ |
| if (lws_cmdline_option(argc, argv, "--h1")) |
| i.alpn = "http/1.1"; |
| |
| i.method = "GET"; |
| |
| i.protocol = protocols[0].name; |
| i.pwsi = &client_wsi; |
| lws_client_connect_via_info(&i); |
| |
| while (n >= 0 && client_wsi && !interrupted) |
| n = lws_service(context, 0); |
| |
| lws_context_destroy(context); |
| lwsl_user("Completed: %s\n", bad ? "failed" : "OK"); |
| |
| return bad; |
| } |