/* * http client for RT-Thread */ #include "http.h" #include #include #include const char _http_get[] = "GET "; const char _http_host[] = "Host: "; const char _http_getend[] = " HTTP/1.0\r\n"; const char _http_user_agent[] = "User-Agent: RT-Thread HTTP Agent\r\n"; const char _http_endheader[] = "\r\n"; const char _shoutcast_get[] = "GET %s HTTP/1.0\r\nHost: %s:%d\r\nUser-Agent: RT-Thread HTTP Agent\r\nIcy-MetaData: 1\r\nConnection: close\r\n\r\n"; extern long int strtol(const char *nptr, char **endptr, int base); // // This function will parse the Content-Length header line and return the file size // int http_parse_content_length(char *mime_buf) { char *line; line = strstr(mime_buf, "CONTENT-LENGTH:"); line += strlen("CONTENT-LENGTH:"); // Advance past any whitepace characters while((*line == ' ') || (*line == '\t')) line++; return (int)strtol(line, RT_NULL, 10); } // // This function will parse the initial response header line and return 0 for a "200 OK", // or return the error code in the event of an error (such as 404 - not found) // int http_is_error_header(char *mime_buf) { char *line; int i; int code; line = strstr(mime_buf, "HTTP/1."); line += strlen("HTTP/1."); // Advance past minor protocol version number line++; // Advance past any whitespace characters while((*line == ' ') || (*line == '\t')) line++; // Terminate string after status code for(i = 0; ((line[i] != ' ') && (line[i] != '\t')); i++); line[i] = '\0'; code = (int)strtol(line, RT_NULL, 10); if( code == 200 ) return 0; else return code; } int shoutcast_is_error_header(char *mime_buf) { char *line; int i; int code; line = strstr(mime_buf, "ICY"); line += strlen("ICY"); // Advance past minor protocol version number line++; // Advance past any whitespace characters while((*line == ' ') || (*line == '\t')) line++; // Terminate string after status code for(i = 0; ((line[i] != ' ') && (line[i] != '\t')); i++); line[i] = '\0'; code = (int)strtol(line, RT_NULL, 10); if( code == 200 ) return 0; else return code; } // // When a request has been sent, we can expect mime headers to be // before the data. We need to read exactly to the end of the headers // and no more data. This readline reads a single char at a time. // int http_read_line( int socket, char * buffer, int size ) { char * ptr = buffer; int count = 0; int rc; // Keep reading until we fill the buffer. while ( count < size ) { rc = recv( socket, ptr, 1, 0 ); if ( rc <= 0 ) return rc; if ((*ptr == '\n')) { ptr ++; count++; break; } // increment after check for cr. Don't want to count the cr. count++; ptr++; } // Terminate string *ptr = '\0'; // return how many bytes read. return count; } // // Before we can connect we need to parse the server address and optional // port from the url provided. the format of "url" as passed to this function // is "//192.168.0.1:8080/blah.elf" where "192.168.0.1" can be either an IP // or a domain name and ":8080" is the optional port to connect to, default // port is 80. // // This function will return a filename string for use in GET // requests, and fill the structure pointed to by *server with the // correct values. // const char *http_resolve_address( struct sockaddr_in *server, const char * url, char *host_addr) { char *ptr; char port[6] = "80"; /* default port of 80(HTTP) */ int i = 0, is_domain; struct hostent *hptr; /* strip http: */ ptr = strchr(url, ':'); if (ptr != NULL) { url = ptr + 1; } /* URL must start with double forward slashes. */ if((url[0] != '/') || (url[1] != '/' )) return(NULL); url += 2; is_domain = 0; for(i = 0; ((url[i] != '\0') && (url[i] != '/')) && (i < 30); i++) { if((((host_addr[i] = url[i]) < '0') || (url[i] > '9')) && (url[i] != '.')) { if(url[i] == ':') { unsigned char w; /* allow specification of port in URL like http://www.server.net:8080/ */ for(w = 0; ((w + i + 1) < 127) && (w < 5) && (url[w + i + 1] != '/') && (url[w + i + 1] != '\0'); w++) port[w] = url[w + i + 1]; port[w] = '\0'; rt_kprintf("HTTP: using port %s for connection\n", port); break; } else is_domain = 1; } } /* get host addr ok. */ host_addr[i] = '\0'; if (is_domain) { /* resolve the host name. */ hptr = gethostbyname(host_addr); if(hptr == 0) { rt_kprintf("HTTP: failed to resolve domain '%s'\n", host_addr); return RT_NULL; } memcpy(&server->sin_addr, *hptr->h_addr_list, sizeof(server->sin_addr)); } else { inet_aton(host_addr, (struct in_addr*)&(server->sin_addr)); } /* set the port */ server->sin_port = htons((int) strtol(port, NULL, 10)); server->sin_family = AF_INET; while (*url != '/') url ++; return url; } // // This is the main HTTP client connect work. Makes the connection // and handles the protocol and reads the return headers. Needs // to leave the stream at the start of the real data. // static int http_connect(struct http_session* session, struct sockaddr_in * server, char *host_addr, const char * url) { int socket_handle; int peer_handle; int rc; char mimeBuffer[100]; if((socket_handle = socket( PF_INET, SOCK_STREAM, IPPROTO_TCP )) < 0) { rt_kprintf( "HTTP: SOCKET FAILED\n" ); return -1; } peer_handle = connect( socket_handle, (struct sockaddr *) server, sizeof(*server)); if ( peer_handle < 0 ) { rt_kprintf( "HTTP: CONNECT FAILED %i\n", peer_handle ); return -1; } // Needs more error checking here..... #if 0 rc = send( peer_handle, _http_get, sizeof( _http_get ) - 1, 0 ); rc = send( peer_handle, (void*) url, strlen( url ), 0 ); rc = send( peer_handle, _http_getend, sizeof( _http_getend ) - 1, 0 ); rc = send( peer_handle, _http_host, sizeof( _http_host ) - 1, 0 ); rc = send( peer_handle, host_addr, strlen( host_addr ), 0 ); rc = send( peer_handle, _http_endheader, sizeof( _http_endheader ) - 1, 0 ); // "\r\n" rc = send( peer_handle, _http_user_agent, sizeof( _http_user_agent ) - 1, 0 ); rc = send( peer_handle, _http_endheader, sizeof( _http_endheader ) - 1, 0 ); #else { rt_uint8_t *ptr, *buf; buf = rt_malloc (512); ptr = buf; rt_memcpy(ptr, _http_get, sizeof(_http_get) - 1); ptr += sizeof(_http_get) - 1; rt_memcpy(ptr, url, strlen(url)); ptr += strlen(url); rt_memcpy(ptr, _http_getend, sizeof(_http_getend) - 1); ptr += sizeof(_http_getend) - 1; rt_memcpy(ptr, _http_host, sizeof(_http_host) - 1); ptr += sizeof(_http_host) - 1; rt_memcpy(ptr, host_addr, strlen(host_addr)); ptr += strlen(host_addr); rt_memcpy(ptr, _http_endheader, sizeof(_http_endheader) - 1); ptr += sizeof(_http_endheader) - 1; rt_memcpy(ptr, _http_user_agent, sizeof(_http_user_agent) - 1); ptr += sizeof(_http_user_agent) - 1; rt_memcpy(ptr, _http_endheader, sizeof(_http_endheader) - 1); ptr += sizeof(_http_endheader) - 1; rc = send(peer_handle, buf, (rt_uint32_t)ptr - (rt_uint32_t)buf, 0); } #endif // We now need to read the header information while ( 1 ) { int i; // read a line from the header information. rc = http_read_line( peer_handle, mimeBuffer, 100 ); rt_kprintf(">> %s\n", mimeBuffer); if ( rc < 0 ) return rc; // End of headers is a blank line. exit. if (rc == 0) break; if ((rc == 2) && (mimeBuffer[0] == '\r')) break; // Convert mimeBuffer to upper case, so we can do string comps for(i = 0; i < strlen(mimeBuffer); i++) mimeBuffer[i] = toupper(mimeBuffer[i]); if(strstr(mimeBuffer, "HTTP/1.")) // First line of header, contains status code. Check for an error code { rc = http_is_error_header(mimeBuffer); if(rc) { rt_kprintf("HTTP: status code = %d!\n", rc); return -rc; } } if(strstr(mimeBuffer, "CONTENT-LENGTH:")) { session->size = http_parse_content_length(mimeBuffer); rt_kprintf("size = %d\n", session->size); } } // We've sent the request, and read the headers. SockHandle is // now at the start of the main data read for a file io read. return peer_handle; } struct http_session* http_session_open(char* url) { int peer_handle = 0; struct sockaddr_in server; const char *get_name; char host_addr[32]; struct http_session* session; session = (struct http_session*) rt_malloc(sizeof(struct http_session)); if(session == RT_NULL) return RT_NULL; session->size = 0; session->position = 0; /* Check valid IP address and URL */ get_name = http_resolve_address(&server, url, &host_addr[0]); if(get_name == NULL) { rt_free(session); return RT_NULL; } // Now we connect and initiate the transfer by sending a // request header to the server, and receiving the response header if((peer_handle = http_connect(session, &server, host_addr, get_name)) < 0) { rt_kprintf("HTTP: failed to connect to '%s'!\n", host_addr); rt_free(session); return RT_NULL; } // http connect returns valid socket. Save in handle list. session->socket = peer_handle; /* open successfully */ return session; } rt_size_t http_session_read(struct http_session* session, rt_uint8_t *buffer, rt_size_t length) { int bytesRead = 0; int totalRead = 0; int left = length; // Read until: there is an error, we've read "size" bytes or the remote // side has closed the connection. do { bytesRead = recv(session->socket, buffer + totalRead, left, 0); if(bytesRead <= 0) break; left -= bytesRead; totalRead += bytesRead; } while(left); return totalRead; } rt_off_t http_session_seek(struct http_session* session, rt_off_t offset, int mode) { switch(mode) { case SEEK_SET: session->position = offset; break; case SEEK_CUR: session->position += offset; break; case SEEK_END: session->position = session->size + offset; break; } return session->position; } int http_session_close(struct http_session* session) { lwip_close(session->socket); rt_free(session); return 0; } // // This is the main HTTP client connect work. Makes the connection // and handles the protocol and reads the return headers. Needs // to leave the stream at the start of the real data. // static int shoutcast_connect(struct shoutcast_session* session, struct sockaddr_in* server, char *host_addr, const char * url) { int socket_handle; int peer_handle; int rc; char mimeBuffer[100]; if((socket_handle = socket( PF_INET, SOCK_STREAM, IPPROTO_TCP )) < 0) { rt_kprintf( "ICY: SOCKET FAILED\n" ); return -1; } peer_handle = connect( socket_handle, (struct sockaddr *) server, sizeof(*server)); if ( peer_handle < 0 ) { rt_kprintf( "ICY: CONNECT FAILED %i\n", peer_handle ); return -1; } { rt_uint8_t *buf; rt_uint32_t length; buf = rt_malloc (512); length = rt_snprintf(buf, 512, _shoutcast_get, url, host_addr, server->sin_port); rc = send(peer_handle, buf, length, 0); rt_kprintf("SHOUTCAST request:\n%s", buf); /* release buffer */ rt_free(buf); } /* read the header information */ while ( 1 ) { // read a line from the header information. rc = http_read_line(peer_handle, mimeBuffer, 100); rt_kprintf(">>%s", mimeBuffer); if ( rc < 0 ) return rc; // End of headers is a blank line. exit. if (rc == 0) break; if ((rc == 2) && (mimeBuffer[0] == '\r')) break; if(strstr(mimeBuffer, "ICY")) // First line of header, contains status code. Check for an error code { rc = shoutcast_is_error_header(mimeBuffer); if(rc) { rt_kprintf("ICY: status code = %d!\n", rc); return -rc; } } if (strstr(mimeBuffer, "HTTP/1.")) { rc = http_is_error_header(mimeBuffer); if(rc) { rt_kprintf("HTTP: status code = %d!\n", rc); return -rc; } } if (strstr(mimeBuffer, "icy-name:")) { /* get name */ char* name; name = mimeBuffer + strlen("icy-name:"); session->station_name = rt_strdup(name); rt_kprintf("station name: %s\n", session->station_name); } if (strstr(mimeBuffer, "icy-br:")) { /* get bitrate */ session->bitrate = strtol(mimeBuffer + strlen("icy-br:"), RT_NULL, 10); rt_kprintf("bitrate: %d\n", session->bitrate); } if (strstr(mimeBuffer, "icy-metaint:")) { /* get metaint */ session->metaint = strtol(mimeBuffer + strlen("icy-metaint:"), RT_NULL, 10); rt_kprintf("metaint: %d\n", session->metaint); } if (strstr(mimeBuffer, "content-type:")) { /* check content-type */ if (strstr(mimeBuffer, "content-type:audio/mpeg") == RT_NULL) { rt_kprintf("ICY content is not audio/mpeg.\n"); return -1; } } if (strstr(mimeBuffer, "Content-Type:")) { /* check content-type */ if (strstr(mimeBuffer, "Content-Type: audio/mpeg") == RT_NULL) { rt_kprintf("ICY content is not audio/mpeg.\n"); return -1; } } } // We've sent the request, and read the headers. SockHandle is // now at the start of the main data read for a file io read. return peer_handle; } struct shoutcast_session* shoutcast_session_open(char* url) { int peer_handle = 0; struct sockaddr_in server; const char *get_name; char host_addr[32]; struct shoutcast_session* session; session = (struct shoutcast_session*) rt_malloc(sizeof(struct shoutcast_session)); if(session == RT_NULL) return RT_NULL; session->metaint = 0; session->current_meta_chunk = 0; session->bitrate = 0; session->station_name = RT_NULL; /* Check valid IP address and URL */ get_name = http_resolve_address(&server, url, &host_addr[0]); if(get_name == NULL) { rt_free(session); return RT_NULL; } // Now we connect and initiate the transfer by sending a // request header to the server, and receiving the response header if((peer_handle = shoutcast_connect(session, &server, host_addr, get_name)) < 0) { rt_kprintf("SHOUTCAST: failed to connect to '%s'!\n", host_addr); if (session->station_name != RT_NULL) rt_free(session->station_name); rt_free(session); return RT_NULL; } // http connect returns valid socket. Save in handle list. session->socket = peer_handle; /* open successfully */ return session; } rt_size_t shoutcast_session_read(struct shoutcast_session* session, rt_uint8_t *buffer, rt_size_t length) { int bytesRead = 0; int totalRead = 0; int left = length; // Read until: there is an error, we've read "size" bytes or the remote // side has closed the connection. do { bytesRead = recv(session->socket, buffer + totalRead, left, 0); if(bytesRead <= 0) break; left -= bytesRead; totalRead += bytesRead; } while(left); /* handle meta */ if (session->current_meta_chunk + totalRead >= session->metaint) { int meta_length, next_chunk_length; // rt_kprintf("c: %d, total: %d\n", session->current_meta_chunk, totalRead); /* get the length of meta data */ meta_length = buffer[session->metaint - session->current_meta_chunk] * 16; next_chunk_length = totalRead - (session->metaint - session->current_meta_chunk) - (meta_length + 1); // rt_kprintf("l: %d, n: %d\n", meta_length, next_chunk_length); /* skip meta data */ memmove(&buffer[session->metaint - session->current_meta_chunk], &buffer[session->metaint - session->current_meta_chunk + meta_length + 1], next_chunk_length); /* set new current meta chunk */ session->current_meta_chunk = next_chunk_length; totalRead = totalRead - (meta_length + 1); // rt_kprintf("total: %d\n", totalRead); } else { session->current_meta_chunk += totalRead; } return totalRead; } rt_off_t shoutcast_session_seek(struct shoutcast_session* session, rt_off_t offset, int mode) { /* not support seek yet */ return 0; } int shoutcast_session_close(struct shoutcast_session* session) { lwip_close(session->socket); if (session->station_name != RT_NULL) rt_free(session->station_name); rt_free(session); return 0; } #include void http_test(char* url) { struct http_session* session; char buffer[80]; rt_size_t length; session = http_session_open(url); if (session == RT_NULL) { rt_kprintf("open http session failed\n"); return; } do { rt_memset(buffer, 0, sizeof(buffer)); length = http_session_read(session, buffer, sizeof(buffer)); rt_kprintf(buffer);rt_kprintf("\n"); } while (length > 0); http_session_close(session); } FINSH_FUNCTION_EXPORT(http_test, http client test); void shoutcast_test(char* url) { struct shoutcast_session* session; session = shoutcast_session_open(url); if (session == RT_NULL) { rt_kprintf("open shoutcast session failed\n"); return; } shoutcast_session_close(session); } FINSH_FUNCTION_EXPORT(shoutcast_test, shoutcast client test);