⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 http.c

📁 opentcp_mcf5282原代码
💻 C
字号:
/***************************************************************************************
File:			http.c

Date:			24.2.2003

Version:		0.1

Author:			Jari Lahti (jari@violasystems.com)

Description:	This file implements simple HTTP 1.0 server.

Version Info:	9.10.2002 - First version (Jari Lahti)
				24.2.2003 - Put sockets back to listen
				22.2.2004 - Port for MCF5282
***************************************************************************************/

#include "opentcp.h"

UINT8 https_enabled = 0;

struct
{
	UINT8 state;
	UINT8 ownersocket;
	UINT32 fstart;			/* Can contain pointer or start address on e.g. external	*/
	UINT32 flen;			/* EEPROM etc.												*/
	UINT32 fpoint;
	UINT16 funacked;

} Https[NO_OF_HTTP_SESSIONS];

const char Https_NotFoundPage[] = "HTTP/1.0 200 OK\r\n\
Last-modified: Fri, 18 Oct 2002 12:04:32 GMT\r\n\
Server: ESERV-10/1.0\nContent-type: text/html\r\n\
Content-length: 400\r\n\
\r\n\
<HEAD>\
<TITLE>Viola Systems Embedded WEB Server</TITLE></HEAD>\
<BODY>\
<H2>HTTP 1.0 404 Error. File Not Found</H2>\
The requested URL was not found on this server.\
<HR>\
<BR>\
<I>\r\n\
Viola Systems Embedded WEB Server 2.1, 2002\
<BR>\
Web Server for Embedded Applications\
</I>\r\n\
<BR>\
<A HREF=http://www.violasystems.com>\
www.violasystems.com - Embedding The Internet</A>\
</BODY>";


const char Https_TestIndexPage[] = "HTTP/1.0 200 OK\r\n\
Last-modified: Fri, 18 Oct 2002 12:04:32 GMT\r\n\
Server: ESERV-10/1.0\nContent-type: text/html\r\n\
Content-length: 400\r\n\
\r\n\
<HEAD>\
<TITLE>Viola Systems Embedded WEB Server</TITLE></HEAD>\
<BODY>\
<H2>Test page</H2>\
Replace the page with your own content.\
<HR>\
<BR>\
<I>\r\n\
Viola Systems Embedded WEB Server 2.1, 2002\
<BR>\
Web Server for Embedded Applications\
</I>\r\n\
<BR>\
<A HREF=http://www.violasystems.com>\
www.violasystems.com - Embedding The Internet</A>\
</BODY>";


/********************************************************************************
Function:		init_http

Parameters:		void

Return val:		INT8 - 	(>=0) OK
						(-1) Error

Date:			13.10.2002

Desc:			This function should be called before the HTTP Server application
				is used to set the operating parameters of it
*********************************************************************************/

INT8 init_http (void)
{
	UINT8 i;
	INT8 soch;


	for( i=0; i<NO_OF_HTTP_SESSIONS; i++)
	{
		Https[i].state = HTTPS_STATE_FREE;
		Https[i].ownersocket = 0;
		Https[i].fstart = 0;
		Https[i].fpoint = 0;
		Https[i].flen  = 0;
		Https[i].funacked = 0;

		soch = 	tcp_getsocket(TCP_TYPE_SERVER, TCP_TOS_NORMAL, TCP_DEF_TOUT, https_eventlistener);

		if(soch < 0)
		{
			DEBUGOUT("HTTP Server uncapable of getting socket\r\n");
			RESET_SYSTEM();
			return(-1);
		}

		Https[i].ownersocket = soch;

		soch = tcp_listen(Https[i].ownersocket, HTTPS_SERVERPORT);

		if(soch < 0)
		{
			DEBUGOUT("HTTP Server uncapable of setting socket to listening mode\r\n");
			RESET_SYSTEM();
			return(-1);
		}


	}

	https_enabled  = 1;

	return(i);

}


/********************************************************************************
Function:		https_run

Parameters:		void

Return val:		void

Date:			13.10.2002

Desc:			This function is main 'thread' of HTTP server program
				and should be called periodically from main loop.
*********************************************************************************/

void https_run (void)
{
	UINT8 i;
	INT16 len;
	static UINT8 ses = 0;

	if( https_enabled == 0)
		return;

	/* Walk thru all sessions untill we found something to send or so	*/

	for(i=0; i<NO_OF_HTTP_SESSIONS; i++)
	{
		if(ses >= NO_OF_HTTP_SESSIONS)
			ses = 0;

		/* Keep sockets listening	*/

		if(tcp_getstate(Https[ses].ownersocket) < TCP_STATE_LISTENING)
		{
			tcp_listen(Https[ses].ownersocket, HTTPS_SERVERPORT);
			ses++;
			continue;
		}

		if(Https[ses].state != HTTPS_STATE_ACTIVE)
		{
			ses++;
			continue;
		}

		if(Https[ses].funacked != 0)
		{
			ses++;
			continue;
		}

		if(Https[ses].fstart == 0)
		{
			ses++;
			continue;
		}

		/* End of data?	*/

		if( Https[ses].fpoint >= Https[ses].flen)
		{
			tcp_close(Https[ses].ownersocket);
			tcp_abort(Https[ses].ownersocket);
			https_deletesession(ses);

			ses++;

			return;

		}

		/* More data to send	*/

		len = https_loadbuffer(ses, &OTCP_TXBUF[TCP_APP_OFFSET], NETWORK_TX_BUFFER_SIZE - TCP_APP_OFFSET);

		if(len<0)
			return;

		len = tcp_send(Https[ses].ownersocket, &OTCP_TXBUF[TCP_APP_OFFSET], NETWORK_TX_BUFFER_SIZE - TCP_APP_OFFSET, len);

		if(len<0)
		{
			tcp_close(Https[ses].ownersocket);
			https_deletesession(ses);

			ses++;

			return;

		}

		Https[ses].funacked = len;


		/* Serve another session on next run	*/

		ses++;

		return;


	}




}

/********************************************************************************
Function:		https_eventlistener

Parameters:		INT8 cbhandle - handle to TCP socket where event is coming from
				UINT8 event - type of event
				UINT32 par1 - parameter the meaning of depends on event
				UINT32 par2 - parameter the meaning of depends on event

Return val:		INT32 - depends on event but usually (-1) is error of some
						kind and positive reply means OK

Date:			13.10.2002

Desc:			This function is given to TCP socket as function pointer to be
				used by TCP engine to make callbacks to inform about events
				on TCP e.g. arriving data.
*********************************************************************************/


INT32 https_eventlistener (INT8 cbhandle, UINT8 event, UINT32 par1, UINT32 par2)
{
	/* This function is called by TCP stack to inform about events	*/

	INT16 	i;
	INT16 	session;

	if( https_enabled == 0)
		return(-1);

	if(cbhandle < 0)
		return(-1);

	/* Search for rigth session	*/

	session = https_searchsession(cbhandle);

	switch( event )
	{

		case TCP_EVENT_CONREQ:

			/* Do we have a session for requesting socket?	*/

			if(session < 0)
				return(-1);


			/* Try to get new session	*/

			session = https_bindsession(cbhandle);

			if(session < 0)			/* No resources	*/
				return(-1);


			return(1);

		case TCP_EVENT_ABORT:

			if(session < 0)
				return(1);

			https_deletesession((UINT8)session);

			return(1);

		case TCP_EVENT_CONNECTED:

			if(session < 0)
				return(-1);

			https_activatesession((UINT8)session);

			return(1);

		case TCP_EVENT_CLOSE:

			if(session < 0)
				return(-1);

			https_deletesession((UINT8)session);

			return(1);


		case TCP_EVENT_ACK:

			if(session < 0)
				return(-1);

			Https[session].fpoint += Https[session].funacked;
			Https[session].funacked = 0;

			return(1);

		case TCP_EVENT_DATA:

			/* Check for GET request	*/

			if(session < 0)
				return(-1);

			if(Https[session].fstart == 0)
			{
				if(par1 <= 3)
					return(1);

				/* Check for GET	*/

				if(RECEIVE_NETWORK_B() != 'G')
					return(1);
				if(RECEIVE_NETWORK_B() != 'E')
					return(1);
				if(RECEIVE_NETWORK_B() != 'T')
					return(1);

				par1 -= 3;

				/* Search for '/'	*/

				for(i=0; i<par1; i++)
				{
					if(RECEIVE_NETWORK_B() == '/')
					{
						i++;
						break;
					}
				}

				par1 -= i;

				/* Calculate Hash	*/

				i = https_calculatehash(par1);

				if(i < 0)
				{
					/* Invalid GET	*/
					return(1);
				}

				/* Get FileRef	*/

				i = https_findfile((UINT8)i, (UINT8)session);


				return(1);


			}


			return(1);


		case TCP_EVENT_REGENERATE:

			if(session < 0)
				return(-1);

			if(Https[session].state != HTTPS_STATE_ACTIVE)
				return(-1);

			i = https_loadbuffer(session, &OTCP_TXBUF[TCP_APP_OFFSET], (UINT16)par1);

			if(i<0)
				return(-1);

			tcp_send(Https[session].ownersocket, &OTCP_TXBUF[TCP_APP_OFFSET], NETWORK_TX_BUFFER_SIZE - TCP_APP_OFFSET, i);

			return(i);


		default:
			return(-1);
	}

}


void https_deletesession (UINT8 ses)
{
	Https[ses].state = HTTPS_STATE_FREE;
	Https[ses].fstart = 0;
	Https[ses].fpoint = 0;
	Https[ses].flen  = 0;
	Https[ses].funacked = 0;

}

INT16 https_searchsession (UINT8 soch)
{
	UINT8 i;

	for(i=0; i<NO_OF_HTTP_SESSIONS; i++)
	{
		if(Https[i].ownersocket == soch)
			return(i);

	}

	return(-1);

}

INT16 https_bindsession (UINT8 soch)
{
	UINT8 i;

	for(i=0; i<NO_OF_HTTP_SESSIONS; i++)
	{
		if(Https[i].ownersocket == soch)
		{
			if(Https[i].state == HTTPS_STATE_FREE)
			{
				Https[i].state = HTTPS_STATE_RESERVED;
				return(i);
			}
		}

	}


	return(-1);

}

void https_activatesession (UINT8 ses)
{
	Https[ses].state = HTTPS_STATE_ACTIVE;

}

INT16 https_calculatehash (UINT32 len)
{
	UINT8 hash=0;
	UINT8 ch;
	UINT8 i;


	/* Read Max 60 characters */

	if(len > 60)
		len = 60;

	for( i=0; i<len; i++)
	{
		ch = RECEIVE_NETWORK_B();

		if( ch ==' ')	/* End reached? 		*/
			break;

		hash *= 37;
		hash += ch;

	}

	if(i==len)
		return(-1);

	/* construct address for Hash table */

	if(hash == 0)		/* User asked defaul file	*/
	{
		/* Set hash to index.html value */

		hash = 0x0B;

	}

	/* Now we have hash value calculated		*/

	return( hash );

}

INT16 https_findfile (UINT8 hash, UINT8 ses)
{
	/* Access the File table on FLASH with given hash key	*/
	/* and modify session File parametera					*/

	if(hash == 0x0B)	/* Hash of index.html	*/
	{

		Https[ses].fstart = (UINT32)Https_TestIndexPage;
		Https[ses].funacked  = 0;
		Https[ses].flen = otcp_strlen((UINT8*)&Https_TestIndexPage[0], 1000);
		Https[ses].fpoint = 0;
		return(1);

	}


	/* Not found	*/
	Https[ses].fstart = 0xFFFFFFFF;
	Https[ses].funacked  = 0;
	Https[ses].flen = otcp_strlen((UINT8*)&Https_NotFoundPage[0], 1000);
	Https[ses].fpoint = 0;

	return(-1);


}

INT16 https_loadbuffer (UINT8 ses, UINT8* buf, UINT16 buflen)
{
	UINT16 i;

	if( Https[ses].fstart == 0xFFFFFFFF )
	{
		/* Error site asked	*/


		for(i=0; i < (Https[ses].flen - Https[ses].fpoint); i++)
		{
			if(i >= buflen)
				break;

			*buf++ = Https_NotFoundPage[Https[ses].fpoint + i];

		}

		return(i);

	}


	/* Other page asked	*/

	for(i=0; i < (Https[ses].flen - Https[ses].fpoint); i++)
	{
		if(i >= buflen)
			break;

		*buf++ = *(UINT8*)(Https[ses].fstart + Https[ses].fpoint + i);

	}

	return(i);


}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -