2020-12-26 23:21:41 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
|
|
|
OSSL_HTTP_REQ_CTX,
|
|
|
|
OSSL_HTTP_REQ_CTX_new,
|
|
|
|
OSSL_HTTP_REQ_CTX_free,
|
2021-01-18 19:17:31 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_set_request_line,
|
2020-12-26 23:21:41 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_add1_header,
|
2021-05-05 06:09:43 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_set_expected,
|
2021-03-21 05:17:46 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_set1_req,
|
2020-12-26 23:21:41 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_nbio,
|
2021-05-05 06:09:43 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_nbio_d2i,
|
|
|
|
OSSL_HTTP_REQ_CTX_exchange,
|
2020-12-26 23:21:41 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_get0_mem_bio,
|
2021-05-05 06:09:43 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_get_resp_len,
|
|
|
|
OSSL_HTTP_REQ_CTX_set_max_response_length,
|
|
|
|
OSSL_HTTP_is_alive
|
2021-01-18 19:53:55 +08:00
|
|
|
- HTTP client low-level functions
|
2020-12-26 23:21:41 +08:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/http.h>
|
|
|
|
|
|
|
|
typedef struct ossl_http_req_ctx_st OSSL_HTTP_REQ_CTX;
|
|
|
|
|
2021-05-05 06:09:43 +08:00
|
|
|
OSSL_HTTP_REQ_CTX *OSSL_HTTP_REQ_CTX_new(BIO *wbio, BIO *rbio, int buf_size);
|
2020-12-26 23:21:41 +08:00
|
|
|
void OSSL_HTTP_REQ_CTX_free(OSSL_HTTP_REQ_CTX *rctx);
|
|
|
|
|
2021-03-21 05:04:58 +08:00
|
|
|
int OSSL_HTTP_REQ_CTX_set_request_line(OSSL_HTTP_REQ_CTX *rctx, int method_POST,
|
2021-01-18 19:17:31 +08:00
|
|
|
const char *server, const char *port,
|
|
|
|
const char *path);
|
2020-12-26 23:21:41 +08:00
|
|
|
int OSSL_HTTP_REQ_CTX_add1_header(OSSL_HTTP_REQ_CTX *rctx,
|
|
|
|
const char *name, const char *value);
|
|
|
|
|
2021-05-05 06:09:43 +08:00
|
|
|
int OSSL_HTTP_REQ_CTX_set_expected(OSSL_HTTP_REQ_CTX *rctx,
|
|
|
|
const char *content_type, int asn1,
|
|
|
|
int timeout, int keep_alive);
|
2021-03-21 05:17:46 +08:00
|
|
|
int OSSL_HTTP_REQ_CTX_set1_req(OSSL_HTTP_REQ_CTX *rctx, const char *content_type,
|
2021-05-05 06:09:43 +08:00
|
|
|
const ASN1_ITEM *it, const ASN1_VALUE *req);
|
2020-12-26 23:21:41 +08:00
|
|
|
int OSSL_HTTP_REQ_CTX_nbio(OSSL_HTTP_REQ_CTX *rctx);
|
2021-05-05 06:09:43 +08:00
|
|
|
int OSSL_HTTP_REQ_CTX_nbio_d2i(OSSL_HTTP_REQ_CTX *rctx,
|
|
|
|
ASN1_VALUE **pval, const ASN1_ITEM *it);
|
|
|
|
BIO *OSSL_HTTP_REQ_CTX_exchange(OSSL_HTTP_REQ_CTX *rctx);
|
2020-12-26 23:21:41 +08:00
|
|
|
|
2021-01-30 02:08:45 +08:00
|
|
|
BIO *OSSL_HTTP_REQ_CTX_get0_mem_bio(const OSSL_HTTP_REQ_CTX *rctx);
|
2021-05-05 06:09:43 +08:00
|
|
|
size_t OSSL_HTTP_REQ_CTX_get_resp_len(const OSSL_HTTP_REQ_CTX *rctx);
|
2020-12-26 23:21:41 +08:00
|
|
|
void OSSL_HTTP_REQ_CTX_set_max_response_length(OSSL_HTTP_REQ_CTX *rctx,
|
|
|
|
unsigned long len);
|
|
|
|
|
2021-05-05 06:09:43 +08:00
|
|
|
int OSSL_HTTP_is_alive(const OSSL_HTTP_REQ_CTX *rctx);
|
|
|
|
|
2020-12-26 23:21:41 +08:00
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2021-05-05 06:09:43 +08:00
|
|
|
B<OSSL_HTTP_REQ_CTX> is a context structure for an HTTP request and response,
|
|
|
|
used to collect all the necessary data to perform that request.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
|
|
|
This file documents low-level HTTP functions rarely used directly. High-level
|
|
|
|
HTTP client functions like L<OSSL_HTTP_get(3)> and L<OSSL_HTTP_transfer(3)>
|
|
|
|
should be preferred.
|
|
|
|
|
2021-01-18 19:37:47 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_new() allocates a new HTTP request context structure,
|
2021-05-05 06:09:43 +08:00
|
|
|
which gets populated with the B<BIO> to write/send the request to (I<wbio>),
|
|
|
|
the B<BIO> to read/receive the response from (I<rbio>, which may be equal to
|
|
|
|
I<wbio>), and the maximum expected response header line length I<buf_size>.
|
|
|
|
A value <= 0 indicates that
|
2021-05-11 21:45:22 +08:00
|
|
|
the B<OSSL_HTTP_DEFAULT_MAX_LINE_LEN> of 4KiB should be used.
|
|
|
|
I<buf_size> is also used as the number of content bytes that are read at a time.
|
2022-06-28 18:06:52 +08:00
|
|
|
The allocated context structure includes an internal memory B<BIO>,
|
|
|
|
which collects the HTTP request header lines.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
|
|
|
OSSL_HTTP_REQ_CTX_free() frees up the HTTP request context I<rctx>.
|
2021-09-08 09:13:20 +08:00
|
|
|
The I<rbio> is not free'd, I<wbio> will be free'd if I<free_wbio> is set.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
2021-01-18 19:17:31 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_set_request_line() adds the HTTP request line to the context.
|
2021-03-21 05:04:58 +08:00
|
|
|
The HTTP method is determined by I<method_POST>,
|
|
|
|
which should be 1 to indicate C<POST> or 0 to indicate C<GET>.
|
|
|
|
I<server> and I<port> may be set to indicate a proxy server and port
|
|
|
|
that the request should go through, otherwise they should be left NULL.
|
|
|
|
I<path> is the HTTP request path; if left NULL, C</> is used.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
|
|
|
OSSL_HTTP_REQ_CTX_add1_header() adds header I<name> with value I<value> to the
|
2022-06-28 18:06:52 +08:00
|
|
|
context I<rctx>. It can be called more than once to add multiple header lines.
|
2020-12-26 23:21:41 +08:00
|
|
|
For example, to add a C<Host> header for C<example.com> you would call:
|
|
|
|
|
|
|
|
OSSL_HTTP_REQ_CTX_add1_header(ctx, "Host", "example.com");
|
|
|
|
|
2021-05-05 06:09:43 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_set_expected() optionally sets in I<rctx> some expectations
|
2021-05-04 22:33:19 +08:00
|
|
|
of the HTTP client on the response.
|
2021-05-05 06:09:43 +08:00
|
|
|
Due to the structure of an HTTP request, if the I<keep_alive> argument is
|
|
|
|
nonzero the function must be used before calling OSSL_HTTP_REQ_CTX_set1_req().
|
2022-06-28 23:23:45 +08:00
|
|
|
|
|
|
|
If the I<content_type> argument is not NULL,
|
|
|
|
the client will check that the specified content-type string
|
2021-05-05 06:09:43 +08:00
|
|
|
is included in the HTTP header of the response and return an error if not.
|
2022-06-28 23:23:45 +08:00
|
|
|
In the content-type header line the specified string should be present either
|
|
|
|
as a whole, or in case the specified string does not include a C<;> character,
|
|
|
|
it is sufficient that the specified string appears as a prefix
|
|
|
|
in the header line, followed by a C<;> character and any further text.
|
|
|
|
For instance, if the I<content_type> argument specifies C<text/html>,
|
|
|
|
this is matched by C<text/html>, C<text/html; charset=UTF-8>, etc.
|
|
|
|
|
2021-05-05 06:09:43 +08:00
|
|
|
If the I<asn1> parameter is nonzero a structure in ASN.1 encoding will be
|
2021-05-04 22:33:19 +08:00
|
|
|
expected as the response content and input streaming is disabled. This means
|
|
|
|
that an ASN.1 sequence header is required, its length field is checked, and
|
|
|
|
OSSL_HTTP_REQ_CTX_get0_mem_bio() should be used to get the buffered response.
|
2022-06-28 18:06:52 +08:00
|
|
|
Otherwise (by default) any input format is allowed without length checks.
|
2021-05-04 22:33:19 +08:00
|
|
|
In this case the BIO given as I<rbio> argument to OSSL_HTTP_REQ_CTX_new() should
|
|
|
|
be used directly to read the response contents, which may support streaming.
|
2021-05-05 06:09:43 +08:00
|
|
|
If the I<timeout> parameter is > 0 this indicates the maximum number of seconds
|
|
|
|
the subsequent HTTP transfer (sending the request and receiving a response)
|
|
|
|
is allowed to take.
|
2021-07-09 01:45:35 +08:00
|
|
|
I<timeout> == 0 enables waiting indefinitely, i.e., no timeout can occur.
|
2021-05-05 06:09:43 +08:00
|
|
|
This is the default.
|
2021-07-09 01:45:35 +08:00
|
|
|
I<timeout> < 0 takes over any value set via the I<overall_timeout> argument of
|
|
|
|
L<OSSL_HTTP_open(3)> with the default being 0, which means no timeout.
|
2021-05-05 06:09:43 +08:00
|
|
|
If the I<keep_alive> parameter is 0, which is the default, the connection is not
|
|
|
|
kept open after receiving a response. This is the default behavior for HTTP 1.0.
|
|
|
|
If the value is 1 or 2 then a persistent connection is requested.
|
|
|
|
If the value is 2 then a persistent connection is required,
|
|
|
|
i.e., an error occurs in case the server does not grant it.
|
|
|
|
|
2021-06-09 15:35:32 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_set1_req() finalizes the HTTP request context.
|
|
|
|
It is needed if the I<method_POST> parameter in the
|
|
|
|
OSSL_HTTP_REQ_CTX_set_request_line() call was 1
|
|
|
|
and an ASN.1-encoded request should be sent.
|
|
|
|
It must also be used when requesting "keep-alive",
|
|
|
|
even if a GET request is going to be sent, in which case I<req> must be NULL.
|
|
|
|
Unless I<req> is NULL, the function adds the DER encoding of I<req> using
|
|
|
|
the ASN.1 template I<it> to do the encoding (which does not support streaming).
|
2021-03-21 05:04:58 +08:00
|
|
|
The HTTP header C<Content-Length> is filled out with the length of the request.
|
2021-06-09 15:35:32 +08:00
|
|
|
I<content_type> must be NULL if I<req> is NULL.
|
2021-03-21 05:04:58 +08:00
|
|
|
If I<content_type> isn't NULL,
|
2021-05-05 06:09:43 +08:00
|
|
|
the HTTP header C<Content-Type> is also added with the given string value.
|
2022-06-28 18:06:52 +08:00
|
|
|
The header lines are added to the internal memory B<BIO> for the request header.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
2021-05-05 06:09:43 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_nbio() attempts to send the request prepared in I<rctx>
|
|
|
|
and to gather the response via HTTP, using the I<wbio> and I<rbio>
|
2021-01-26 03:44:39 +08:00
|
|
|
that were given when calling OSSL_HTTP_REQ_CTX_new().
|
2021-05-05 06:09:43 +08:00
|
|
|
The function may need to be called again if its result is -1, which indicates
|
2020-12-26 23:21:41 +08:00
|
|
|
L<BIO_should_retry(3)>. In such a case it is advisable to sleep a little in
|
2021-05-05 06:09:43 +08:00
|
|
|
between, using L<BIO_wait(3)> on the read BIO to prevent a busy loop.
|
|
|
|
|
2022-01-03 07:00:27 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_nbio_d2i() is like OSSL_HTTP_REQ_CTX_nbio() but on success
|
2021-05-05 06:09:43 +08:00
|
|
|
in addition parses the response, which must be a DER-encoded ASN.1 structure,
|
|
|
|
using the ASN.1 template I<it> and places the result in I<*pval>.
|
|
|
|
|
|
|
|
OSSL_HTTP_REQ_CTX_exchange() calls OSSL_HTTP_REQ_CTX_nbio() as often as needed
|
|
|
|
in order to exchange a request and response or until a timeout is reached.
|
2021-10-22 18:04:11 +08:00
|
|
|
On success it returns a pointer to the BIO that can be used to read the result.
|
|
|
|
If an ASN.1-encoded response was expected, this is the BIO
|
|
|
|
returned by OSSL_HTTP_REQ_CTX_get0_mem_bio() when called after the exchange.
|
|
|
|
This memory BIO does not support streaming.
|
2022-06-28 18:06:52 +08:00
|
|
|
Otherwise the returned BIO is the I<rbio> given to OSSL_HTTP_REQ_CTX_new(),
|
2021-10-22 18:04:11 +08:00
|
|
|
which may support streaming.
|
2022-06-28 18:06:52 +08:00
|
|
|
When this BIO is returned, it has been read past the end of the response header,
|
|
|
|
such that the actual response body can be read from it.
|
|
|
|
The returned BIO pointer MUST NOT be freed by the caller.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
2021-01-26 03:44:39 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_get0_mem_bio() returns the internal memory B<BIO>.
|
2022-06-28 18:06:52 +08:00
|
|
|
Before the HTTP request is sent, this could be used to adapt its header lines.
|
2021-01-26 03:44:39 +08:00
|
|
|
I<Use with caution!>
|
2021-05-05 06:09:43 +08:00
|
|
|
After receiving a response via HTTP, the BIO represents the current state of
|
2022-06-28 18:06:52 +08:00
|
|
|
reading the response header. If the response was expected to be ASN.1 encoded,
|
2021-05-05 06:09:43 +08:00
|
|
|
its contents can be read via this BIO, which does not support streaming.
|
2021-10-22 18:04:11 +08:00
|
|
|
The returned BIO pointer must not be freed by the caller.
|
2021-05-05 06:09:43 +08:00
|
|
|
|
|
|
|
OSSL_HTTP_REQ_CTX_get_resp_len() returns the size of the response contents
|
|
|
|
in I<rctx> if provided by the server as <Content-Length> header field, else 0.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
2021-01-26 02:49:58 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_set_max_response_length() sets the maximum allowed
|
|
|
|
response content length for I<rctx> to I<len>. If not set or I<len> is 0
|
2021-05-11 21:45:22 +08:00
|
|
|
then the B<OSSL_HTTP_DEFAULT_MAX_RESP_LEN> is used, which currently is 100 KiB.
|
2021-01-26 02:49:58 +08:00
|
|
|
If the C<Content-Length> header is present and exceeds this value or
|
|
|
|
the content is an ASN.1 encoded structure with a length exceeding this value
|
|
|
|
or both length indications are present but disagree then an error occurs.
|
|
|
|
|
2021-05-05 06:09:43 +08:00
|
|
|
OSSL_HTTP_is_alive() can be used to query if the HTTP connection
|
|
|
|
given by I<rctx> is still alive, i.e., has not been closed.
|
|
|
|
It returns 0 if I<rctx> is NULL.
|
|
|
|
|
|
|
|
If the client application requested or required a persistent connection
|
|
|
|
and this was granted by the server, it can keep I<rctx> as long as it wants
|
|
|
|
to send further requests and OSSL_HTTP_is_alive() returns nonzero,
|
|
|
|
else it should call I<OSSL_HTTP_REQ_CTX_free(rctx)> or L<OSSL_HTTP_close(3)>.
|
|
|
|
In case the client application keeps I<rctx> but the connection then dies
|
|
|
|
for any reason at the server side, it will notice this obtaining an
|
|
|
|
I/O error when trying to send the next request via I<rctx>.
|
|
|
|
|
2020-12-26 23:21:41 +08:00
|
|
|
=head1 WARNINGS
|
|
|
|
|
|
|
|
The server's response may be unexpected if the hostname that was used to
|
|
|
|
create the I<wbio>, any C<Host> header, and the host specified in the
|
|
|
|
request URL do not match.
|
|
|
|
|
|
|
|
Many of these functions must be called in a certain order.
|
|
|
|
|
|
|
|
First, the HTTP request context must be allocated:
|
|
|
|
OSSL_HTTP_REQ_CTX_new().
|
|
|
|
|
|
|
|
Then, the HTTP request must be prepared with request data:
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item 1.
|
|
|
|
|
2021-06-09 15:35:32 +08:00
|
|
|
Calling OSSL_HTTP_REQ_CTX_set_request_line().
|
2020-12-26 23:21:41 +08:00
|
|
|
|
|
|
|
=item 2.
|
|
|
|
|
2022-06-28 18:06:52 +08:00
|
|
|
Adding extra header lines with OSSL_HTTP_REQ_CTX_add1_header().
|
2021-01-18 19:39:51 +08:00
|
|
|
This is optional and may be done multiple times with different names.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
|
|
|
=item 3.
|
|
|
|
|
2021-06-09 15:35:32 +08:00
|
|
|
Finalize the request using OSSL_HTTP_REQ_CTX_set1_req().
|
|
|
|
This may be omitted if the GET method is used and "keep-alive" is not requested.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
When the request context is fully prepared, the HTTP exchange may be performed
|
2021-05-05 06:09:43 +08:00
|
|
|
with OSSL_HTTP_REQ_CTX_nbio() or OSSL_HTTP_REQ_CTX_exchange().
|
2020-12-26 23:21:41 +08:00
|
|
|
|
2022-05-24 01:43:56 +08:00
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
When built with tracing enabled, OSSL_HTTP_REQ_CTX_nbio() and all functions
|
|
|
|
using it, such as OSSL_HTTP_REQ_CTX_exchange() and L<OSSL_HTTP_transfer(3)>,
|
|
|
|
may be traced using B<OSSL_TRACE_CATEGORY_HTTP>.
|
|
|
|
See also L<OSSL_trace_enabled(3)> and L<openssl(1)/ENVIRONMENT>.
|
|
|
|
|
2020-12-26 23:21:41 +08:00
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
OSSL_HTTP_REQ_CTX_new() returns a pointer to a B<OSSL_HTTP_REQ_CTX>, or NULL
|
|
|
|
on error.
|
|
|
|
|
|
|
|
OSSL_HTTP_REQ_CTX_free() and OSSL_HTTP_REQ_CTX_set_max_response_length()
|
|
|
|
do not return values.
|
|
|
|
|
2021-01-18 19:17:31 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_set_request_line(), OSSL_HTTP_REQ_CTX_add1_header(),
|
2021-05-05 06:09:43 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_set1_req(), and OSSL_HTTP_REQ_CTX_set_expected()
|
2021-03-21 05:17:46 +08:00
|
|
|
return 1 for success and 0 for failure.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
2021-05-05 06:09:43 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_nbio() and OSSL_HTTP_REQ_CTX_nbio_d2i()
|
|
|
|
return 1 for success, 0 on error or redirection, -1 if retry is needed.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
2021-05-05 06:09:43 +08:00
|
|
|
OSSL_HTTP_REQ_CTX_exchange() and OSSL_HTTP_REQ_CTX_get0_mem_bio()
|
2022-06-28 18:06:52 +08:00
|
|
|
return a pointer to a B<BIO> on success as described above or NULL on failure.
|
2021-10-22 18:04:11 +08:00
|
|
|
The returned BIO must not be freed by the caller.
|
2021-05-05 06:09:43 +08:00
|
|
|
|
|
|
|
OSSL_HTTP_REQ_CTX_get_resp_len() returns the size of the response contents
|
|
|
|
or 0 if not available or an error occurred.
|
|
|
|
|
|
|
|
OSSL_HTTP_is_alive() returns 1 if its argument is non-NULL
|
|
|
|
and the client requested a persistent connection
|
|
|
|
and the server did not disagree on keeping the connection open, else 0.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2021-01-26 03:44:39 +08:00
|
|
|
L<BIO_should_retry(3)>,
|
|
|
|
L<BIO_wait(3)>,
|
2021-05-05 06:09:43 +08:00
|
|
|
L<ASN1_item_d2i_bio(3)>,
|
|
|
|
L<ASN1_item_i2d_mem_bio(3)>,
|
|
|
|
L<OSSL_HTTP_open(3)>,
|
2021-01-26 03:44:39 +08:00
|
|
|
L<OSSL_HTTP_get(3)>,
|
2021-05-05 06:09:43 +08:00
|
|
|
L<OSSL_HTTP_transfer(3)>,
|
2022-05-24 01:43:56 +08:00
|
|
|
L<OSSL_HTTP_close(3)>,
|
|
|
|
L<OSSL_trace_enabled(3)>
|
2021-05-05 06:09:43 +08:00
|
|
|
|
|
|
|
=head1 HISTORY
|
|
|
|
|
|
|
|
The functions described here were added in OpenSSL 3.0.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2022-05-03 18:52:38 +08:00
|
|
|
Copyright 2015-2022 The OpenSSL Project Authors. All Rights Reserved.
|
2020-12-26 23:21:41 +08:00
|
|
|
|
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|