1 /** @file
2  * @brief HTTP client API
3  *
4  * An API for applications to send HTTP requests
5  */
6 
7 /*
8  * Copyright (c) 2019 Intel Corporation
9  *
10  * SPDX-License-Identifier: Apache-2.0
11  */
12 
13 #include <zephyr/logging/log.h>
14 LOG_MODULE_REGISTER(net_http_client, CONFIG_NET_HTTP_LOG_LEVEL);
15 
16 #include <zephyr/kernel.h>
17 #include <string.h>
18 #include <strings.h>
19 #include <errno.h>
20 #include <stdbool.h>
21 #include <stdlib.h>
22 
23 #include <zephyr/net/net_ip.h>
24 #include <zephyr/net/socket.h>
25 #include <zephyr/net/http/client.h>
26 #include <zephyr/net/http/status.h>
27 
28 #include "net_private.h"
29 
30 #define HTTP_CONTENT_LEN_SIZE 11
31 #define MAX_SEND_BUF_LEN 192
32 
sendall(int sock,const void * buf,size_t len,const k_timepoint_t req_end_timepoint)33 static int sendall(int sock, const void *buf, size_t len,
34 			const k_timepoint_t req_end_timepoint)
35 {
36 	while (len) {
37 		ssize_t out_len = zsock_send(sock, buf, len, 0);
38 
39 		if ((out_len == 0) || (out_len < 0 && errno == EAGAIN)) {
40 			struct zsock_pollfd pfd;
41 			int pollres;
42 			k_ticks_t req_timeout_ticks =
43 				sys_timepoint_timeout(req_end_timepoint).ticks;
44 			int req_timeout_ms = k_ticks_to_ms_floor32(req_timeout_ticks);
45 
46 			pfd.fd = sock;
47 			pfd.events = ZSOCK_POLLOUT;
48 			pollres = zsock_poll(&pfd, 1, req_timeout_ms);
49 			if (pollres == 0) {
50 				return -ETIMEDOUT;
51 			} else if (pollres > 0) {
52 				continue;
53 			} else {
54 				return -errno;
55 			}
56 		} else if (out_len < 0) {
57 			return -errno;
58 		}
59 
60 		buf = (const char *)buf + out_len;
61 		len -= out_len;
62 	}
63 
64 	return 0;
65 }
66 
http_send_data(int sock,char * send_buf,size_t send_buf_max_len,size_t * send_buf_pos,const k_timepoint_t req_end_timepoint,...)67 static int http_send_data(int sock, char *send_buf,
68 			  size_t send_buf_max_len, size_t *send_buf_pos,
69 			  const k_timepoint_t req_end_timepoint,
70 			  ...)
71 {
72 	const char *data;
73 	va_list va;
74 	int ret, end_of_send = *send_buf_pos;
75 	int end_of_data, remaining_len;
76 	int sent = 0;
77 
78 	va_start(va, req_end_timepoint);
79 
80 	data = va_arg(va, const char *);
81 
82 	while (data) {
83 		end_of_data = 0;
84 
85 		do {
86 			int to_be_copied;
87 
88 			remaining_len = strlen(data + end_of_data);
89 			to_be_copied = send_buf_max_len - end_of_send;
90 
91 			if (remaining_len > to_be_copied) {
92 				strncpy(send_buf + end_of_send,
93 					data + end_of_data,
94 					to_be_copied);
95 
96 				end_of_send += to_be_copied;
97 				end_of_data += to_be_copied;
98 				remaining_len -= to_be_copied;
99 
100 				LOG_HEXDUMP_DBG(send_buf, end_of_send,
101 						"Data to send");
102 
103 				ret = sendall(sock, send_buf, end_of_send, req_end_timepoint);
104 				if (ret < 0) {
105 					NET_DBG("Cannot send %d bytes (%d)",
106 						end_of_send, ret);
107 					goto err;
108 				}
109 				sent += end_of_send;
110 				end_of_send = 0;
111 				continue;
112 			} else {
113 				memcpy(send_buf + end_of_send,
114 				       data + end_of_data,
115 				       remaining_len);
116 				end_of_send += remaining_len;
117 				remaining_len = 0;
118 			}
119 		} while (remaining_len > 0);
120 
121 		data = va_arg(va, const char *);
122 	}
123 
124 	va_end(va);
125 
126 	if (end_of_send > (int)send_buf_max_len) {
127 		NET_ERR("Sending overflow (%d > %zd)", end_of_send,
128 			send_buf_max_len);
129 		return -EMSGSIZE;
130 	}
131 
132 	*send_buf_pos = end_of_send;
133 
134 	return sent;
135 
136 err:
137 	va_end(va);
138 
139 	return ret;
140 }
141 
http_flush_data(int sock,const char * send_buf,size_t send_buf_len,const k_timepoint_t req_end_timepoint)142 static int http_flush_data(int sock, const char *send_buf, size_t send_buf_len,
143 				const k_timepoint_t req_end_timepoint)
144 {
145 	int ret;
146 
147 	LOG_HEXDUMP_DBG(send_buf, send_buf_len, "Data to send");
148 
149 	ret = sendall(sock, send_buf, send_buf_len, req_end_timepoint);
150 	if (ret < 0) {
151 		return ret;
152 	}
153 
154 	return (int)send_buf_len;
155 }
156 
print_header_field(size_t len,const char * str)157 static void print_header_field(size_t len, const char *str)
158 {
159 	if (IS_ENABLED(CONFIG_NET_HTTP_LOG_LEVEL_DBG)) {
160 #define MAX_OUTPUT_LEN 128
161 		char output[MAX_OUTPUT_LEN];
162 
163 		/* The value of len does not count \0 so we need to increase it
164 		 * by one.
165 		 */
166 		if ((len + 1) > sizeof(output)) {
167 			len = sizeof(output) - 1;
168 		}
169 
170 		snprintk(output, len + 1, "%s", str);
171 
172 		NET_DBG("[%zd] %s", len, output);
173 	}
174 }
175 
on_url(struct http_parser * parser,const char * at,size_t length)176 static int on_url(struct http_parser *parser, const char *at, size_t length)
177 {
178 	struct http_request *req = CONTAINER_OF(parser,
179 						struct http_request,
180 						internal.parser);
181 	print_header_field(length, at);
182 
183 	if (req->internal.response.http_cb &&
184 	    req->internal.response.http_cb->on_url) {
185 		req->internal.response.http_cb->on_url(parser, at, length);
186 	}
187 
188 	return 0;
189 }
190 
on_status(struct http_parser * parser,const char * at,size_t length)191 static int on_status(struct http_parser *parser, const char *at, size_t length)
192 {
193 	struct http_request *req = CONTAINER_OF(parser,
194 						struct http_request,
195 						internal.parser);
196 	uint16_t len;
197 
198 	len = MIN(length, sizeof(req->internal.response.http_status) - 1);
199 	memcpy(req->internal.response.http_status, at, len);
200 	req->internal.response.http_status[len] = 0;
201 	req->internal.response.http_status_code =
202 		(uint16_t)parser->status_code;
203 
204 	NET_DBG("HTTP response status %d %s", parser->status_code,
205 		req->internal.response.http_status);
206 
207 	if (req->internal.response.http_cb &&
208 	    req->internal.response.http_cb->on_status) {
209 		req->internal.response.http_cb->on_status(parser, at, length);
210 	}
211 
212 	return 0;
213 }
214 
on_header_field(struct http_parser * parser,const char * at,size_t length)215 static int on_header_field(struct http_parser *parser, const char *at,
216 			   size_t length)
217 {
218 	struct http_request *req = CONTAINER_OF(parser,
219 						struct http_request,
220 						internal.parser);
221 	static const char content_len[] = "Content-Length";
222 	static const char content_range[] = "Content-Range";
223 
224 	uint16_t content_len_len = sizeof(content_len) - 1;
225 	uint16_t content_range_len = sizeof(content_range) - 1;
226 
227 	if (length >= content_len_len && strncasecmp(at, content_len, content_len_len) == 0) {
228 		req->internal.response.cl_present = true;
229 	} else if (length >= content_range_len &&
230 		   strncasecmp(at, content_range, content_range_len) == 0) {
231 		req->internal.response.cr_present = true;
232 	}
233 
234 	print_header_field(length, at);
235 
236 	if (req->internal.response.http_cb &&
237 	    req->internal.response.http_cb->on_header_field) {
238 		req->internal.response.http_cb->on_header_field(parser, at,
239 								length);
240 	}
241 
242 	return 0;
243 }
244 
245 #define MAX_NUM_DIGITS	16
246 
on_header_value(struct http_parser * parser,const char * at,size_t length)247 static int on_header_value(struct http_parser *parser, const char *at,
248 			   size_t length)
249 {
250 	struct http_request *req = CONTAINER_OF(parser,
251 						struct http_request,
252 						internal.parser);
253 	char str[MAX_NUM_DIGITS];
254 
255 	if (req->internal.response.cl_present) {
256 		if (length <= MAX_NUM_DIGITS - 1) {
257 			long int num;
258 
259 			memcpy(str, at, length);
260 			str[length] = 0;
261 
262 			num = strtol(str, NULL, 10);
263 			if (num == LONG_MIN || num == LONG_MAX) {
264 				return -EINVAL;
265 			}
266 
267 			req->internal.response.content_length = num;
268 		}
269 
270 		req->internal.response.cl_present = false;
271 	}
272 
273 	if (req->internal.response.cr_present) {
274 		req->internal.response.content_range.start = parser->content_range.start;
275 		req->internal.response.content_range.end = parser->content_range.end;
276 		req->internal.response.content_range.total = parser->content_range.total;
277 		req->internal.response.cr_present = false;
278 	}
279 
280 	if (req->internal.response.http_cb &&
281 	    req->internal.response.http_cb->on_header_value) {
282 		req->internal.response.http_cb->on_header_value(parser, at,
283 								length);
284 	}
285 
286 	print_header_field(length, at);
287 
288 	return 0;
289 }
290 
on_body(struct http_parser * parser,const char * at,size_t length)291 static int on_body(struct http_parser *parser, const char *at, size_t length)
292 {
293 	struct http_request *req = CONTAINER_OF(parser,
294 						struct http_request,
295 						internal.parser);
296 
297 	req->internal.response.body_found = 1;
298 	req->internal.response.processed += length;
299 
300 	NET_DBG("Processed %zd length %zd", req->internal.response.processed,
301 		length);
302 
303 	if (req->internal.response.http_cb &&
304 	    req->internal.response.http_cb->on_body) {
305 		req->internal.response.http_cb->on_body(parser, at, length);
306 	}
307 
308 	/* Reset the body_frag_start pointer for each fragment. */
309 	if (!req->internal.response.body_frag_start) {
310 		req->internal.response.body_frag_start = (uint8_t *)at;
311 	}
312 
313 	/* Calculate the length of the body contained in the recv_buf */
314 	req->internal.response.body_frag_len = req->internal.response.data_len -
315 		(req->internal.response.body_frag_start - req->internal.response.recv_buf);
316 
317 	return 0;
318 }
319 
on_headers_complete(struct http_parser * parser)320 static int on_headers_complete(struct http_parser *parser)
321 {
322 	struct http_request *req = CONTAINER_OF(parser,
323 						struct http_request,
324 						internal.parser);
325 
326 	if (req->internal.response.http_cb &&
327 	    req->internal.response.http_cb->on_headers_complete) {
328 		req->internal.response.http_cb->on_headers_complete(parser);
329 	}
330 
331 	if (parser->status_code == HTTP_101_SWITCHING_PROTOCOLS) {
332 		NET_DBG("Switching protocols, skipping body");
333 		return 1;
334 	}
335 
336 	if (parser->status_code >= 500 && parser->status_code < 600) {
337 		NET_DBG("Status %d, skipping body", parser->status_code);
338 		return 1;
339 	}
340 
341 	if ((req->method == HTTP_HEAD || req->method == HTTP_OPTIONS) &&
342 	    req->internal.response.content_length > 0) {
343 		NET_DBG("No body expected");
344 		return 1;
345 	}
346 
347 	NET_DBG("Headers complete");
348 
349 	return 0;
350 }
351 
on_message_begin(struct http_parser * parser)352 static int on_message_begin(struct http_parser *parser)
353 {
354 	struct http_request *req = CONTAINER_OF(parser,
355 						struct http_request,
356 						internal.parser);
357 
358 	if (req->internal.response.http_cb &&
359 	    req->internal.response.http_cb->on_message_begin) {
360 		req->internal.response.http_cb->on_message_begin(parser);
361 	}
362 
363 	NET_DBG("-- HTTP %s response (headers) --",
364 		http_method_str(req->method));
365 
366 	return 0;
367 }
368 
on_message_complete(struct http_parser * parser)369 static int on_message_complete(struct http_parser *parser)
370 {
371 	struct http_request *req = CONTAINER_OF(parser,
372 						struct http_request,
373 						internal.parser);
374 
375 	if (req->internal.response.http_cb &&
376 	    req->internal.response.http_cb->on_message_complete) {
377 		req->internal.response.http_cb->on_message_complete(parser);
378 	}
379 
380 	NET_DBG("-- HTTP %s response (complete) --",
381 		http_method_str(req->method));
382 
383 	req->internal.response.message_complete = 1;
384 
385 	return 0;
386 }
387 
on_chunk_header(struct http_parser * parser)388 static int on_chunk_header(struct http_parser *parser)
389 {
390 	struct http_request *req = CONTAINER_OF(parser,
391 						struct http_request,
392 						internal.parser);
393 
394 	if (req->internal.response.http_cb &&
395 	    req->internal.response.http_cb->on_chunk_header) {
396 		req->internal.response.http_cb->on_chunk_header(parser);
397 	}
398 
399 	return 0;
400 }
401 
on_chunk_complete(struct http_parser * parser)402 static int on_chunk_complete(struct http_parser *parser)
403 {
404 	struct http_request *req = CONTAINER_OF(parser,
405 						struct http_request,
406 						internal.parser);
407 
408 	if (req->internal.response.http_cb &&
409 	    req->internal.response.http_cb->on_chunk_complete) {
410 		req->internal.response.http_cb->on_chunk_complete(parser);
411 	}
412 
413 	return 0;
414 }
415 
http_client_init_parser(struct http_parser * parser,struct http_parser_settings * settings)416 static void http_client_init_parser(struct http_parser *parser,
417 				    struct http_parser_settings *settings)
418 {
419 	http_parser_init(parser, HTTP_RESPONSE);
420 
421 	settings->on_body = on_body;
422 	settings->on_chunk_complete = on_chunk_complete;
423 	settings->on_chunk_header = on_chunk_header;
424 	settings->on_headers_complete = on_headers_complete;
425 	settings->on_header_field = on_header_field;
426 	settings->on_header_value = on_header_value;
427 	settings->on_message_begin = on_message_begin;
428 	settings->on_message_complete = on_message_complete;
429 	settings->on_status = on_status;
430 	settings->on_url = on_url;
431 }
432 
433 /* Report a NULL HTTP response to the caller.
434  * A NULL response is when the HTTP server intentionally closes the TLS socket (using FINACK)
435  * without sending any HTTP payload.
436  */
http_report_null(struct http_request * req)437 static void http_report_null(struct http_request *req)
438 {
439 	if (req->internal.response.cb) {
440 		NET_DBG("Calling callback for Final Data"
441 			"(NULL HTTP response)");
442 
443 		/* Status code 0 representing a null response */
444 		req->internal.response.http_status_code = 0;
445 
446 		/* Zero out related response metrics */
447 		req->internal.response.processed = 0;
448 		req->internal.response.data_len = 0;
449 		req->internal.response.content_length = 0;
450 		req->internal.response.body_frag_start = NULL;
451 		memset(req->internal.response.http_status, 0, HTTP_STATUS_STR_SIZE);
452 
453 		req->internal.response.cb(&req->internal.response, HTTP_DATA_FINAL,
454 					  req->internal.user_data);
455 	}
456 }
457 
458 /* Report a completed HTTP transaction (with no error) to the caller */
http_report_complete(struct http_request * req)459 static void http_report_complete(struct http_request *req)
460 {
461 	if (req->internal.response.cb) {
462 		NET_DBG("Calling callback for %zd len data", req->internal.response.data_len);
463 		req->internal.response.cb(&req->internal.response, HTTP_DATA_FINAL,
464 					  req->internal.user_data);
465 	}
466 }
467 
468 /* Report that some data has been received, but the HTTP transaction is still ongoing. */
http_report_progress(struct http_request * req)469 static void http_report_progress(struct http_request *req)
470 {
471 	if (req->internal.response.cb) {
472 		NET_DBG("Calling callback for partitioned %zd len data",
473 			req->internal.response.data_len);
474 
475 		req->internal.response.cb(&req->internal.response, HTTP_DATA_MORE,
476 					  req->internal.user_data);
477 	}
478 }
479 
http_wait_data(int sock,struct http_request * req,const k_timepoint_t req_end_timepoint)480 static int http_wait_data(int sock, struct http_request *req, const k_timepoint_t req_end_timepoint)
481 {
482 	int total_received = 0;
483 	size_t offset = 0;
484 	int received, ret;
485 	struct zsock_pollfd fds[1];
486 	int nfds = 1;
487 
488 	fds[0].fd = sock;
489 	fds[0].events = ZSOCK_POLLIN;
490 
491 	do {
492 		k_ticks_t req_timeout_ticks =
493 			sys_timepoint_timeout(req_end_timepoint).ticks;
494 		int req_timeout_ms = k_ticks_to_ms_floor32(req_timeout_ticks);
495 
496 		ret = zsock_poll(fds, nfds, req_timeout_ms);
497 		if (ret == 0) {
498 			LOG_DBG("Timeout");
499 			ret = -ETIMEDOUT;
500 			goto error;
501 		} else if (ret < 0) {
502 			ret = -errno;
503 			goto error;
504 		}
505 
506 		if (fds[0].revents & ZSOCK_POLLERR) {
507 			int sock_err;
508 			socklen_t optlen = sizeof(sock_err);
509 
510 			(void)zsock_getsockopt(sock, SOL_SOCKET, SO_ERROR, &sock_err, &optlen);
511 			ret = -sock_err;
512 			goto error;
513 		} else if (fds[0].revents & ZSOCK_POLLNVAL) {
514 			ret = -EBADF;
515 			goto error;
516 		} else if (fds[0].revents & ZSOCK_POLLHUP) {
517 			/* Connection closed */
518 			goto closed;
519 		} else if (fds[0].revents & ZSOCK_POLLIN) {
520 			received = zsock_recv(sock, req->internal.response.recv_buf + offset,
521 					      req->internal.response.recv_buf_len - offset, 0);
522 			if (received == 0) {
523 				/* Connection closed */
524 				goto closed;
525 			} else if (received < 0) {
526 				ret = -errno;
527 				goto error;
528 			} else {
529 				req->internal.response.data_len += received;
530 
531 				(void)http_parser_execute(
532 					&req->internal.parser, &req->internal.parser_settings,
533 					req->internal.response.recv_buf + offset, received);
534 			}
535 
536 			total_received += received;
537 			offset += received;
538 
539 			if (offset >= req->internal.response.recv_buf_len) {
540 				offset = 0;
541 			}
542 
543 			if (req->internal.response.message_complete) {
544 				http_report_complete(req);
545 				break;
546 			} else if (offset == 0) {
547 				http_report_progress(req);
548 
549 				/* Re-use the result buffer and start to fill it again */
550 				req->internal.response.data_len = 0;
551 				req->internal.response.body_frag_start = NULL;
552 				req->internal.response.body_frag_len = 0;
553 			}
554 		}
555 
556 	} while (true);
557 
558 	return total_received;
559 
560 closed:
561 	LOG_DBG("Connection closed");
562 
563 	/* If connection was closed with no data sent, this is a NULL response, and is a special
564 	 * case valid response.
565 	 */
566 	if (total_received == 0) {
567 		http_report_null(req);
568 		return total_received;
569 	}
570 
571 	/* Otherwise, connection was closed mid-way through response, and this should be
572 	 * considered an error.
573 	 */
574 	ret = -ECONNRESET;
575 
576 error:
577 	LOG_DBG("Connection error (%d)", ret);
578 	return ret;
579 }
580 
http_client_req(int sock,struct http_request * req,int32_t timeout,void * user_data)581 int http_client_req(int sock, struct http_request *req,
582 		    int32_t timeout, void *user_data)
583 {
584 	/* Utilize the network usage by sending data in bigger blocks */
585 	char send_buf[MAX_SEND_BUF_LEN];
586 	const size_t send_buf_max_len = sizeof(send_buf);
587 	size_t send_buf_pos = 0;
588 	int total_sent = 0;
589 	int ret, total_recv, i;
590 	const char *method;
591 	k_timeout_t req_timeout = (timeout == SYS_FOREVER_MS) ? K_FOREVER : K_MSEC(timeout);
592 	k_timepoint_t req_end_timepoint = sys_timepoint_calc(req_timeout);
593 
594 	if (sock < 0 || req == NULL || req->response == NULL ||
595 	    req->recv_buf == NULL || req->recv_buf_len == 0) {
596 		return -EINVAL;
597 	}
598 
599 	memset(&req->internal.response, 0, sizeof(req->internal.response));
600 
601 	req->internal.response.http_cb = req->http_cb;
602 	req->internal.response.cb = req->response;
603 	req->internal.response.recv_buf = req->recv_buf;
604 	req->internal.response.recv_buf_len = req->recv_buf_len;
605 	req->internal.user_data = user_data;
606 	req->internal.sock = sock;
607 
608 	method = http_method_str(req->method);
609 
610 	ret = http_send_data(sock, send_buf, send_buf_max_len, &send_buf_pos,
611 				req_end_timepoint, method,
612 				" ", req->url, " ", req->protocol,
613 				HTTP_CRLF, NULL);
614 	if (ret < 0) {
615 		goto out;
616 	}
617 
618 	total_sent += ret;
619 
620 	if (req->port) {
621 		ret = http_send_data(sock, send_buf, send_buf_max_len,
622 					&send_buf_pos, req_end_timepoint, "Host", ": ", req->host,
623 					":", req->port, HTTP_CRLF, NULL);
624 
625 		if (ret < 0) {
626 			goto out;
627 		}
628 
629 		total_sent += ret;
630 	} else {
631 		ret = http_send_data(sock, send_buf, send_buf_max_len,
632 				     &send_buf_pos, req_end_timepoint, "Host", ": ", req->host,
633 				     HTTP_CRLF, NULL);
634 
635 		if (ret < 0) {
636 			goto out;
637 		}
638 
639 		total_sent += ret;
640 	}
641 
642 	if (req->optional_headers_cb) {
643 		ret = http_flush_data(sock, send_buf, send_buf_pos, req_end_timepoint);
644 		if (ret < 0) {
645 			goto out;
646 		}
647 
648 		send_buf_pos = 0;
649 		total_sent += ret;
650 
651 		ret = req->optional_headers_cb(sock, req, user_data);
652 		if (ret < 0) {
653 			goto out;
654 		}
655 
656 		total_sent += ret;
657 	} else {
658 		for (i = 0; req->optional_headers && req->optional_headers[i];
659 		     i++) {
660 			ret = http_send_data(sock, send_buf, send_buf_max_len,
661 					     &send_buf_pos, req_end_timepoint,
662 					     req->optional_headers[i], NULL);
663 			if (ret < 0) {
664 				goto out;
665 			}
666 
667 			total_sent += ret;
668 		}
669 	}
670 
671 	for (i = 0; req->header_fields && req->header_fields[i]; i++) {
672 		ret = http_send_data(sock, send_buf, send_buf_max_len,
673 				     &send_buf_pos, req_end_timepoint, req->header_fields[i],
674 				     NULL);
675 		if (ret < 0) {
676 			goto out;
677 		}
678 
679 		total_sent += ret;
680 	}
681 
682 	if (req->content_type_value) {
683 		ret = http_send_data(sock, send_buf, send_buf_max_len,
684 				     &send_buf_pos, req_end_timepoint, "Content-Type", ": ",
685 				     req->content_type_value, HTTP_CRLF, NULL);
686 		if (ret < 0) {
687 			goto out;
688 		}
689 
690 		total_sent += ret;
691 	}
692 
693 	if (req->payload || req->payload_cb) {
694 		if (req->payload_len) {
695 			char content_len_str[HTTP_CONTENT_LEN_SIZE];
696 
697 			ret = snprintk(content_len_str, HTTP_CONTENT_LEN_SIZE,
698 				       "%zd", req->payload_len);
699 			if (ret <= 0 || ret >= HTTP_CONTENT_LEN_SIZE) {
700 				ret = -ENOMEM;
701 				goto out;
702 			}
703 
704 			ret = http_send_data(sock, send_buf, send_buf_max_len,
705 						&send_buf_pos, req_end_timepoint,
706 						"Content-Length", ": ",
707 						content_len_str, HTTP_CRLF,
708 						HTTP_CRLF, NULL);
709 		} else {
710 			ret = http_send_data(sock, send_buf, send_buf_max_len,
711 				     &send_buf_pos, req_end_timepoint, HTTP_CRLF, NULL);
712 		}
713 
714 		if (ret < 0) {
715 			goto out;
716 		}
717 
718 		total_sent += ret;
719 
720 		ret = http_flush_data(sock, send_buf, send_buf_pos, req_end_timepoint);
721 		if (ret < 0) {
722 			goto out;
723 		}
724 
725 		send_buf_pos = 0;
726 		total_sent += ret;
727 
728 		if (req->payload_cb) {
729 			ret = req->payload_cb(sock, req, user_data);
730 			if (ret < 0) {
731 				goto out;
732 			}
733 
734 			total_sent += ret;
735 		} else {
736 			uint32_t length;
737 
738 			if (req->payload_len == 0) {
739 				length = strlen(req->payload);
740 			} else {
741 				length = req->payload_len;
742 			}
743 
744 			ret = sendall(sock, req->payload, length, req_end_timepoint);
745 			if (ret < 0) {
746 				goto out;
747 			}
748 
749 			total_sent += length;
750 		}
751 	} else {
752 		ret = http_send_data(sock, send_buf, send_buf_max_len,
753 				     &send_buf_pos, req_end_timepoint, HTTP_CRLF, NULL);
754 		if (ret < 0) {
755 			goto out;
756 		}
757 
758 		total_sent += ret;
759 	}
760 
761 	if (send_buf_pos > 0) {
762 		ret = http_flush_data(sock, send_buf, send_buf_pos, req_end_timepoint);
763 		if (ret < 0) {
764 			goto out;
765 		}
766 
767 		total_sent += ret;
768 	}
769 
770 	NET_DBG("Sent %d bytes", total_sent);
771 
772 	http_client_init_parser(&req->internal.parser,
773 				&req->internal.parser_settings);
774 
775 	/* Request is sent, now wait data to be received */
776 	total_recv = http_wait_data(sock, req, req_end_timepoint);
777 	if (total_recv < 0) {
778 		NET_DBG("Wait data failure (%d)", total_recv);
779 		ret = total_recv;
780 		goto out;
781 	}
782 
783 	NET_DBG("Received %d bytes", total_recv);
784 
785 	return total_sent;
786 
787 out:
788 	return ret;
789 }
790