libcoap 4.3.5-develop-19cef11
coap_net.c
Go to the documentation of this file.
1/* coap_net.c -- CoAP context inteface
2 *
3 * Copyright (C) 2010--2024 Olaf Bergmann <bergmann@tzi.org> and others
4 *
5 * SPDX-License-Identifier: BSD-2-Clause
6 *
7 * This file is part of the CoAP library libcoap. Please see
8 * README for terms of use.
9 */
10
18
19#include <ctype.h>
20#include <stdio.h>
21#ifdef HAVE_LIMITS_H
22#include <limits.h>
23#endif
24#ifdef HAVE_UNISTD_H
25#include <unistd.h>
26#else
27#ifdef HAVE_SYS_UNISTD_H
28#include <sys/unistd.h>
29#endif
30#endif
31#ifdef HAVE_SYS_TYPES_H
32#include <sys/types.h>
33#endif
34#ifdef HAVE_SYS_SOCKET_H
35#include <sys/socket.h>
36#endif
37#ifdef HAVE_SYS_IOCTL_H
38#include <sys/ioctl.h>
39#endif
40#ifdef HAVE_NETINET_IN_H
41#include <netinet/in.h>
42#endif
43#ifdef HAVE_ARPA_INET_H
44#include <arpa/inet.h>
45#endif
46#ifdef HAVE_NET_IF_H
47#include <net/if.h>
48#endif
49#ifdef COAP_EPOLL_SUPPORT
50#include <sys/epoll.h>
51#include <sys/timerfd.h>
52#endif /* COAP_EPOLL_SUPPORT */
53#ifdef HAVE_WS2TCPIP_H
54#include <ws2tcpip.h>
55#endif
56
57#ifdef HAVE_NETDB_H
58#include <netdb.h>
59#endif
60
61#ifdef WITH_LWIP
62#include <lwip/pbuf.h>
63#include <lwip/udp.h>
64#include <lwip/timeouts.h>
65#include <lwip/tcpip.h>
66#endif
67
68#ifndef INET6_ADDRSTRLEN
69#define INET6_ADDRSTRLEN 40
70#endif
71
72#ifndef min
73#define min(a,b) ((a) < (b) ? (a) : (b))
74#endif
75
80#define FRAC_BITS 6
81
86#define MAX_BITS 8
87
88#if FRAC_BITS > 8
89#error FRAC_BITS must be less or equal 8
90#endif
91
93#define Q(frac,fval) ((uint16_t)(((1 << (frac)) * fval.integer_part) + \
94 ((1 << (frac)) * fval.fractional_part + 500)/1000))
95
97#define ACK_RANDOM_FACTOR \
98 Q(FRAC_BITS, session->ack_random_factor)
99
101#define ACK_TIMEOUT Q(FRAC_BITS, session->ack_timeout)
102
103#ifndef WITH_LWIP
104
108}
109
113}
114#else /* !WITH_LWIP */
115
116#include <lwip/memp.h>
117
120 return (coap_queue_t *)memp_malloc(MEMP_COAP_NODE);
121}
122
125 memp_free(MEMP_COAP_NODE, node);
126}
127#endif /* WITH_LWIP */
128
129unsigned int
131 unsigned int result = 0;
132 coap_tick_diff_t delta = now - ctx->sendqueue_basetime;
133
134 if (ctx->sendqueue) {
135 /* delta < 0 means that the new time stamp is before the old. */
136 if (delta <= 0) {
137 ctx->sendqueue->t -= delta;
138 } else {
139 /* This case is more complex: The time must be advanced forward,
140 * thus possibly leading to timed out elements at the queue's
141 * start. For every element that has timed out, its relative
142 * time is set to zero and the result counter is increased. */
143
144 coap_queue_t *q = ctx->sendqueue;
145 coap_tick_t t = 0;
146 while (q && (t + q->t < (coap_tick_t)delta)) {
147 t += q->t;
148 q->t = 0;
149 result++;
150 q = q->next;
151 }
152
153 /* finally adjust the first element that has not expired */
154 if (q) {
155 q->t = (coap_tick_t)delta - t;
156 }
157 }
158 }
159
160 /* adjust basetime */
161 ctx->sendqueue_basetime += delta;
162
163 return result;
164}
165
166int
168 coap_queue_t *p, *q;
169 if (!queue || !node)
170 return 0;
171
172 /* set queue head if empty */
173 if (!*queue) {
174 *queue = node;
175 return 1;
176 }
177
178 /* replace queue head if PDU's time is less than head's time */
179 q = *queue;
180 if (node->t < q->t) {
181 node->next = q;
182 *queue = node;
183 q->t -= node->t; /* make q->t relative to node->t */
184 return 1;
185 }
186
187 /* search for right place to insert */
188 do {
189 node->t -= q->t; /* make node-> relative to q->t */
190 p = q;
191 q = q->next;
192 } while (q && q->t <= node->t);
193
194 /* insert new item */
195 if (q) {
196 q->t -= node->t; /* make q->t relative to node->t */
197 }
198 node->next = q;
199 p->next = node;
200 return 1;
201}
202
203COAP_API int
205 int ret;
206#if COAP_THREAD_SAFE
207 coap_context_t *context;
208#endif /* COAP_THREAD_SAFE */
209
210 if (!node)
211 return 0;
212 if (!node->session)
213 return coap_delete_node_lkd(node);
214
215#if COAP_THREAD_SAFE
216 /* Keep copy as node will be going away */
217 context = node->session->context;
218 (void)context;
219#endif /* COAP_THREAD_SAFE */
220 coap_lock_lock(context, return 0);
221 ret = coap_delete_node_lkd(node);
222 coap_lock_unlock(context);
223 return ret;
224}
225
226int
228 if (!node)
229 return 0;
230
231 coap_delete_pdu(node->pdu);
232 if (node->session) {
233 /*
234 * Need to remove out of context->sendqueue as added in by coap_wait_ack()
235 */
236 if (node->session->context->sendqueue) {
237 LL_DELETE(node->session->context->sendqueue, node);
238 }
240 }
241 coap_free_node(node);
242
243 return 1;
244}
245
246void
248 if (!queue)
249 return;
250
251 coap_delete_all(queue->next);
253}
254
257 coap_queue_t *node;
258 node = coap_malloc_node();
259
260 if (!node) {
261 coap_log_warn("coap_new_node: malloc failed\n");
262 return NULL;
263 }
264
265 memset(node, 0, sizeof(*node));
266 return node;
267}
268
271 if (!context || !context->sendqueue)
272 return NULL;
273
274 return context->sendqueue;
275}
276
279 coap_queue_t *next;
280
281 if (!context || !context->sendqueue)
282 return NULL;
283
284 next = context->sendqueue;
285 context->sendqueue = context->sendqueue->next;
286 if (context->sendqueue) {
287 context->sendqueue->t += next->t;
288 }
289 next->next = NULL;
290 return next;
291}
292
293#if COAP_CLIENT_SUPPORT
294const coap_bin_const_t *
296
297 if (session->psk_key) {
298 return session->psk_key;
299 }
300 if (session->cpsk_setup_data.psk_info.key.length)
301 return &session->cpsk_setup_data.psk_info.key;
302
303 /* Not defined in coap_new_client_session_psk2() */
304 return NULL;
305}
306
307const coap_bin_const_t *
309
310 if (session->psk_identity) {
311 return session->psk_identity;
312 }
314 return &session->cpsk_setup_data.psk_info.identity;
315
316 /* Not defined in coap_new_client_session_psk2() */
317 return NULL;
318}
319#endif /* COAP_CLIENT_SUPPORT */
320
321#if COAP_SERVER_SUPPORT
322const coap_bin_const_t *
324
325 if (session->psk_key)
326 return session->psk_key;
327
329 return &session->context->spsk_setup_data.psk_info.key;
330
331 /* Not defined in coap_context_set_psk2() */
332 return NULL;
333}
334
335const coap_bin_const_t *
337
338 if (session->psk_hint)
339 return session->psk_hint;
340
342 return &session->context->spsk_setup_data.psk_info.hint;
343
344 /* Not defined in coap_context_set_psk2() */
345 return NULL;
346}
347
348COAP_API int
350 const char *hint,
351 const uint8_t *key,
352 size_t key_len) {
353 int ret;
354
355 coap_lock_lock(ctx, return 0);
356 ret = coap_context_set_psk_lkd(ctx, hint, key, key_len);
357 coap_lock_unlock(ctx);
358 return ret;
359}
360
361int
363 const char *hint,
364 const uint8_t *key,
365 size_t key_len) {
366 coap_dtls_spsk_t setup_data;
367
369 memset(&setup_data, 0, sizeof(setup_data));
370 if (hint) {
371 setup_data.psk_info.hint.s = (const uint8_t *)hint;
372 setup_data.psk_info.hint.length = strlen(hint);
373 }
374
375 if (key && key_len > 0) {
376 setup_data.psk_info.key.s = key;
377 setup_data.psk_info.key.length = key_len;
378 }
379
380 return coap_context_set_psk2_lkd(ctx, &setup_data);
381}
382
383COAP_API int
385 int ret;
386
387 coap_lock_lock(ctx, return 0);
388 ret = coap_context_set_psk2_lkd(ctx, setup_data);
389 coap_lock_unlock(ctx);
390 return ret;
391}
392
393int
395 if (!setup_data)
396 return 0;
397
399 ctx->spsk_setup_data = *setup_data;
400
402 return coap_dtls_context_set_spsk(ctx, setup_data);
403 }
404 return 0;
405}
406
407COAP_API int
409 const coap_dtls_pki_t *setup_data) {
410 int ret;
411
412 coap_lock_lock(ctx, return 0);
413 ret = coap_context_set_pki_lkd(ctx, setup_data);
414 coap_lock_unlock(ctx);
415 return ret;
416}
417
418int
420 const coap_dtls_pki_t *setup_data) {
422 if (!setup_data)
423 return 0;
424 if (setup_data->version != COAP_DTLS_PKI_SETUP_VERSION) {
425 coap_log_err("coap_context_set_pki: Wrong version of setup_data\n");
426 return 0;
427 }
429 return coap_dtls_context_set_pki(ctx, setup_data, COAP_DTLS_ROLE_SERVER);
430 }
431 return 0;
432}
433#endif /* ! COAP_SERVER_SUPPORT */
434
435COAP_API int
437 const char *ca_file,
438 const char *ca_dir) {
439 int ret;
440
441 coap_lock_lock(ctx, return 0);
442 ret = coap_context_set_pki_root_cas_lkd(ctx, ca_file, ca_dir);
443 coap_lock_unlock(ctx);
444 return ret;
445}
446
447int
449 const char *ca_file,
450 const char *ca_dir) {
452 return coap_dtls_context_set_pki_root_cas(ctx, ca_file, ca_dir);
453 }
454 return 0;
455}
456
457void
458coap_context_set_keepalive(coap_context_t *context, unsigned int seconds) {
459 context->ping_timeout = seconds;
460}
461
462int
464#if COAP_CLIENT_SUPPORT
465 return coap_dtls_set_cid_tuple_change(context, every);
466#else /* ! COAP_CLIENT_SUPPORT */
467 (void)context;
468 (void)every;
469 return 0;
470#endif /* ! COAP_CLIENT_SUPPORT */
471}
472
473void
475 size_t max_token_size) {
476 assert(max_token_size >= COAP_TOKEN_DEFAULT_MAX &&
477 max_token_size <= COAP_TOKEN_EXT_MAX);
478 context->max_token_size = (uint32_t)max_token_size;
479}
480
481void
483 unsigned int max_idle_sessions) {
484 context->max_idle_sessions = max_idle_sessions;
485}
486
487unsigned int
489 return context->max_idle_sessions;
490}
491
492void
494 unsigned int max_handshake_sessions) {
495 context->max_handshake_sessions = max_handshake_sessions;
496}
497
498unsigned int
500 return context->max_handshake_sessions;
501}
502
503static unsigned int s_csm_timeout = 30;
504
505void
507 unsigned int csm_timeout) {
508 s_csm_timeout = csm_timeout;
509 coap_context_set_csm_timeout_ms(context, csm_timeout * 1000);
510}
511
512unsigned int
514 (void)context;
515 return s_csm_timeout;
516}
517
518void
520 unsigned int csm_timeout_ms) {
521 if (csm_timeout_ms < 10)
522 csm_timeout_ms = 10;
523 if (csm_timeout_ms > 10000)
524 csm_timeout_ms = 10000;
525 context->csm_timeout_ms = csm_timeout_ms;
526}
527
528unsigned int
530 return context->csm_timeout_ms;
531}
532
533void
535 uint32_t csm_max_message_size) {
536 assert(csm_max_message_size >= 64);
537 context->csm_max_message_size = csm_max_message_size;
538}
539
540uint32_t
542 return context->csm_max_message_size;
543}
544
545void
547 unsigned int session_timeout) {
548 context->session_timeout = session_timeout;
549}
550
551unsigned int
553 return context->session_timeout;
554}
555
556int
558#ifdef COAP_EPOLL_SUPPORT
559 return context->epfd;
560#else /* ! COAP_EPOLL_SUPPORT */
561 (void)context;
562 return -1;
563#endif /* ! COAP_EPOLL_SUPPORT */
564}
565
566int
568#ifdef COAP_EPOLL_SUPPORT
569 return 1;
570#else /* ! COAP_EPOLL_SUPPORT */
571 return 0;
572#endif /* ! COAP_EPOLL_SUPPORT */
573}
574
575int
577#ifdef COAP_THREAD_SAFE
578 return 1;
579#else /* ! COAP_THREAD_SAFE */
580 return 0;
581#endif /* ! COAP_THREAD_SAFE */
582}
583
584int
586#ifdef COAP_IPV4_SUPPORT
587 return 1;
588#else /* ! COAP_IPV4_SUPPORT */
589 return 0;
590#endif /* ! COAP_IPV4_SUPPORT */
591}
592
593int
595#ifdef COAP_IPV6_SUPPORT
596 return 1;
597#else /* ! COAP_IPV6_SUPPORT */
598 return 0;
599#endif /* ! COAP_IPV6_SUPPORT */
600}
601
602int
604#ifdef COAP_CLIENT_SUPPORT
605 return 1;
606#else /* ! COAP_CLIENT_SUPPORT */
607 return 0;
608#endif /* ! COAP_CLIENT_SUPPORT */
609}
610
611int
613#ifdef COAP_SERVER_SUPPORT
614 return 1;
615#else /* ! COAP_SERVER_SUPPORT */
616 return 0;
617#endif /* ! COAP_SERVER_SUPPORT */
618}
619
620int
622#ifdef COAP_AF_UNIX_SUPPORT
623 return 1;
624#else /* ! COAP_AF_UNIX_SUPPORT */
625 return 0;
626#endif /* ! COAP_AF_UNIX_SUPPORT */
627}
628
629void
630coap_context_set_app_data(coap_context_t *context, void *app_data) {
631 assert(context);
632 context->app = app_data;
633}
634
635void *
637 assert(context);
638 return context->app;
639}
640
642coap_new_context(const coap_address_t *listen_addr) {
644
645#if ! COAP_SERVER_SUPPORT
646 (void)listen_addr;
647#endif /* COAP_SERVER_SUPPORT */
648
649 if (!coap_started) {
650 coap_startup();
651 coap_log_warn("coap_startup() should be called before any other "
652 "coap_*() functions are called\n");
653 }
654
656 if (!c) {
657 coap_log_emerg("coap_init: malloc: failed\n");
658 return NULL;
659 }
660 memset(c, 0, sizeof(coap_context_t));
661
662 coap_lock_lock(c, coap_free_type(COAP_CONTEXT, c); return NULL);
663#ifdef COAP_EPOLL_SUPPORT
664 c->epfd = epoll_create1(0);
665 if (c->epfd == -1) {
666 coap_log_err("coap_new_context: Unable to epoll_create: %s (%d)\n",
668 errno);
669 goto onerror;
670 }
671 if (c->epfd != -1) {
672 c->eptimerfd = timerfd_create(CLOCK_REALTIME, TFD_NONBLOCK);
673 if (c->eptimerfd == -1) {
674 coap_log_err("coap_new_context: Unable to timerfd_create: %s (%d)\n",
676 errno);
677 goto onerror;
678 } else {
679 int ret;
680 struct epoll_event event;
681
682 /* Needed if running 32bit as ptr is only 32bit */
683 memset(&event, 0, sizeof(event));
684 event.events = EPOLLIN;
685 /* We special case this event by setting to NULL */
686 event.data.ptr = NULL;
687
688 ret = epoll_ctl(c->epfd, EPOLL_CTL_ADD, c->eptimerfd, &event);
689 if (ret == -1) {
690 coap_log_err("%s: epoll_ctl ADD failed: %s (%d)\n",
691 "coap_new_context",
692 coap_socket_strerror(), errno);
693 goto onerror;
694 }
695 }
696 }
697#endif /* COAP_EPOLL_SUPPORT */
698
701 if (!c->dtls_context) {
702 coap_log_emerg("coap_init: no DTLS context available\n");
704 return NULL;
705 }
706 }
707
708 /* set default CSM values */
709 c->csm_timeout_ms = 1000;
710 c->csm_max_message_size = COAP_DEFAULT_MAX_PDU_RX_SIZE;
711
712#if COAP_SERVER_SUPPORT
713 if (listen_addr) {
714 coap_endpoint_t *endpoint = coap_new_endpoint_lkd(c, listen_addr, COAP_PROTO_UDP);
715 if (endpoint == NULL) {
716 goto onerror;
717 }
718 }
719#endif /* COAP_SERVER_SUPPORT */
720
721 c->max_token_size = COAP_TOKEN_DEFAULT_MAX; /* RFC8974 */
722
724 return c;
725
726#if defined(COAP_EPOLL_SUPPORT) || COAP_SERVER_SUPPORT
727onerror:
729 return NULL;
730#endif /* COAP_EPOLL_SUPPORT || COAP_SERVER_SUPPORT */
731}
732
733void
734coap_set_app_data(coap_context_t *ctx, void *app_data) {
735 assert(ctx);
736 ctx->app = app_data;
737}
738
739void *
741 assert(ctx);
742 return ctx->app;
743}
744
745COAP_API void
747 if (!context)
748 return;
749 coap_lock_lock(context, return);
750 coap_free_context_lkd(context);
751 coap_lock_unlock(context);
752}
753
754void
756 if (!context)
757 return;
758
759 coap_lock_check_locked(context);
760#if COAP_SERVER_SUPPORT
761 /* Removing a resource may cause a NON unsolicited observe to be sent */
763#endif /* COAP_SERVER_SUPPORT */
764
765 coap_delete_all(context->sendqueue);
766
767#ifdef WITH_LWIP
768 context->sendqueue = NULL;
769 if (context->timer_configured) {
770 LOCK_TCPIP_CORE();
771 sys_untimeout(coap_io_process_timeout, (void *)context);
772 UNLOCK_TCPIP_CORE();
773 context->timer_configured = 0;
774 }
775#endif /* WITH_LWIP */
776
777#if COAP_ASYNC_SUPPORT
778 coap_delete_all_async(context);
779#endif /* COAP_ASYNC_SUPPORT */
780
781#if COAP_OSCORE_SUPPORT
782 coap_delete_all_oscore(context);
783#endif /* COAP_OSCORE_SUPPORT */
784
785#if COAP_SERVER_SUPPORT
786 coap_cache_entry_t *cp, *ctmp;
787
788 HASH_ITER(hh, context->cache, cp, ctmp) {
789 coap_delete_cache_entry(context, cp);
790 }
791 if (context->cache_ignore_count) {
793 }
794
795 coap_endpoint_t *ep, *tmp;
796
797 LL_FOREACH_SAFE(context->endpoint, ep, tmp) {
799 }
800#endif /* COAP_SERVER_SUPPORT */
801
802#if COAP_CLIENT_SUPPORT
803 coap_session_t *sp, *rtmp;
804
805 SESSIONS_ITER_SAFE(context->sessions, sp, rtmp) {
807 }
808#endif /* COAP_CLIENT_SUPPORT */
809
810 if (context->dtls_context)
812#ifdef COAP_EPOLL_SUPPORT
813 if (context->eptimerfd != -1) {
814 int ret;
815 struct epoll_event event;
816
817 /* Kernels prior to 2.6.9 expect non NULL event parameter */
818 ret = epoll_ctl(context->epfd, EPOLL_CTL_DEL, context->eptimerfd, &event);
819 if (ret == -1) {
820 coap_log_err("%s: epoll_ctl DEL failed: %s (%d)\n",
821 "coap_free_context",
822 coap_socket_strerror(), errno);
823 }
824 close(context->eptimerfd);
825 context->eptimerfd = -1;
826 }
827 if (context->epfd != -1) {
828 close(context->epfd);
829 context->epfd = -1;
830 }
831#endif /* COAP_EPOLL_SUPPORT */
832#if COAP_SERVER_SUPPORT
833#if COAP_WITH_OBSERVE_PERSIST
834 coap_persist_cleanup(context);
835#endif /* COAP_WITH_OBSERVE_PERSIST */
836#endif /* COAP_SERVER_SUPPORT */
837#if COAP_PROXY_SUPPORT
838 coap_proxy_cleanup(context);
839#endif /* COAP_PROXY_SUPPORT */
840
843}
844
845int
847 coap_pdu_t *pdu,
848 coap_opt_filter_t *unknown) {
849 coap_context_t *ctx = session->context;
850 coap_opt_iterator_t opt_iter;
851 int ok = 1;
852 coap_option_num_t last_number = -1;
853
855
856 while (coap_option_next(&opt_iter)) {
857 if (opt_iter.number & 0x01) {
858 /* first check the known built-in critical options */
859 switch (opt_iter.number) {
860#if COAP_Q_BLOCK_SUPPORT
863 if (!(ctx->block_mode & COAP_BLOCK_TRY_Q_BLOCK)) {
864 coap_log_debug("disabled support for critical option %u\n",
865 opt_iter.number);
866 ok = 0;
867 coap_option_filter_set(unknown, opt_iter.number);
868 }
869 break;
870#endif /* COAP_Q_BLOCK_SUPPORT */
882 break;
884 /* Valid critical if doing OSCORE */
885#if COAP_OSCORE_SUPPORT
886 if (ctx->p_osc_ctx)
887 break;
888#endif /* COAP_OSCORE_SUPPORT */
889 /* Fall Through */
890 default:
891 if (coap_option_filter_get(&ctx->known_options, opt_iter.number) <= 0) {
892#if COAP_SERVER_SUPPORT
893 if ((opt_iter.number & 0x02) == 0) {
894 coap_opt_iterator_t t_iter;
895
896 /* Safe to forward - check if proxy pdu */
897 if (session->proxy_session)
898 break;
899 if (COAP_PDU_IS_REQUEST(pdu) && ctx->proxy_uri_resource &&
902 pdu->crit_opt = 1;
903 break;
904 }
905 }
906#endif /* COAP_SERVER_SUPPORT */
907 coap_log_debug("unknown critical option %d\n", opt_iter.number);
908 ok = 0;
909
910 /* When opt_iter.number cannot be set in unknown, all of the appropriate
911 * slots have been used up and no more options can be tracked.
912 * Safe to break out of this loop as ok is already set. */
913 if (coap_option_filter_set(unknown, opt_iter.number) == 0) {
914 break;
915 }
916 }
917 }
918 }
919 if (last_number == opt_iter.number) {
920 /* Check for duplicated option RFC 5272 5.4.5 */
921 if (!coap_option_check_repeatable(opt_iter.number)) {
922 ok = 0;
923 if (coap_option_filter_set(unknown, opt_iter.number) == 0) {
924 break;
925 }
926 }
927 } else if (opt_iter.number == COAP_OPTION_BLOCK2 &&
928 COAP_PDU_IS_REQUEST(pdu)) {
929 /* Check the M Bit is not set on a GET request RFC 7959 2.2 */
930 coap_block_b_t block;
931
932 if (coap_get_block_b(session, pdu, opt_iter.number, &block)) {
933 if (block.m) {
934 size_t used_size = pdu->used_size;
935 unsigned char buf[4];
936
937 coap_log_debug("Option Block2 has invalid set M bit - cleared\n");
938 block.m = 0;
939 coap_update_option(pdu, opt_iter.number,
940 coap_encode_var_safe(buf, sizeof(buf),
941 ((block.num << 4) |
942 (block.m << 3) |
943 block.aszx)),
944 buf);
945 if (used_size != pdu->used_size) {
946 /* Unfortunately need to restart the scan */
948 last_number = -1;
949 continue;
950 }
951 }
952 }
953 }
954 last_number = opt_iter.number;
955 }
956
957 return ok;
958}
959
961coap_send_rst(coap_session_t *session, const coap_pdu_t *request) {
962 coap_mid_t mid;
963
964 coap_lock_lock(session->context, return COAP_INVALID_MID);
965 mid = coap_send_rst_lkd(session, request);
966 coap_lock_unlock(session->context);
967 return mid;
968}
969
971coap_send_rst_lkd(coap_session_t *session, const coap_pdu_t *request) {
972 return coap_send_message_type_lkd(session, request, COAP_MESSAGE_RST);
973}
974
976coap_send_ack(coap_session_t *session, const coap_pdu_t *request) {
977 coap_mid_t mid;
978
979 coap_lock_lock(session->context, return COAP_INVALID_MID);
980 mid = coap_send_ack_lkd(session, request);
981 coap_lock_unlock(session->context);
982 return mid;
983}
984
986coap_send_ack_lkd(coap_session_t *session, const coap_pdu_t *request) {
987 coap_pdu_t *response;
989
991 if (request && request->type == COAP_MESSAGE_CON &&
992 COAP_PROTO_NOT_RELIABLE(session->proto)) {
993 response = coap_pdu_init(COAP_MESSAGE_ACK, 0, request->mid, 0);
994 if (response)
995 result = coap_send_internal(session, response);
996 }
997 return result;
998}
999
1000ssize_t
1002 ssize_t bytes_written = -1;
1003 assert(pdu->hdr_size > 0);
1004
1005 /* Caller handles partial writes */
1006 bytes_written = session->sock.lfunc[COAP_LAYER_SESSION].l_write(session,
1007 pdu->token - pdu->hdr_size,
1008 pdu->used_size + pdu->hdr_size);
1010 return bytes_written;
1011}
1012
1013static ssize_t
1015 ssize_t bytes_written;
1016
1017 if (session->state == COAP_SESSION_STATE_NONE) {
1018#if ! COAP_CLIENT_SUPPORT
1019 return -1;
1020#else /* COAP_CLIENT_SUPPORT */
1021 if (session->type != COAP_SESSION_TYPE_CLIENT)
1022 return -1;
1023#endif /* COAP_CLIENT_SUPPORT */
1024 }
1025
1026 if (pdu->type == COAP_MESSAGE_CON &&
1027 (session->sock.flags & COAP_SOCKET_NOT_EMPTY) &&
1028 (session->sock.flags & COAP_SOCKET_MULTICAST)) {
1029 /* Violates RFC72522 8.1 */
1030 coap_log_err("Multicast requests cannot be Confirmable (RFC7252 8.1)\n");
1031 return -1;
1032 }
1033
1034 if (session->state != COAP_SESSION_STATE_ESTABLISHED ||
1035 (pdu->type == COAP_MESSAGE_CON &&
1036 session->con_active >= COAP_NSTART(session))) {
1037 return coap_session_delay_pdu(session, pdu, node);
1038 }
1039
1040 if ((session->sock.flags & COAP_SOCKET_NOT_EMPTY) &&
1041 (session->sock.flags & COAP_SOCKET_WANT_WRITE))
1042 return coap_session_delay_pdu(session, pdu, node);
1043
1044 bytes_written = coap_session_send_pdu(session, pdu);
1045 if (bytes_written >= 0 && pdu->type == COAP_MESSAGE_CON &&
1047 session->con_active++;
1048
1049 return bytes_written;
1050}
1051
1054 const coap_pdu_t *request,
1055 coap_pdu_code_t code,
1056 coap_opt_filter_t *opts) {
1057 coap_mid_t mid;
1058
1059 coap_lock_lock(session->context, return COAP_INVALID_MID);
1060 mid = coap_send_error_lkd(session, request, code, opts);
1061 coap_lock_unlock(session->context);
1062 return mid;
1063}
1064
1067 const coap_pdu_t *request,
1068 coap_pdu_code_t code,
1069 coap_opt_filter_t *opts) {
1070 coap_pdu_t *response;
1072
1073 assert(request);
1074 assert(session);
1075
1076 response = coap_new_error_response(request, code, opts);
1077 if (response)
1078 result = coap_send_internal(session, response);
1079
1080 return result;
1081}
1082
1085 coap_pdu_type_t type) {
1086 coap_mid_t mid;
1087
1088 coap_lock_lock(session->context, return COAP_INVALID_MID);
1089 mid = coap_send_message_type_lkd(session, request, type);
1090 coap_lock_unlock(session->context);
1091 return mid;
1092}
1093
1096 coap_pdu_type_t type) {
1097 coap_pdu_t *response;
1099
1101 if (request && COAP_PROTO_NOT_RELIABLE(session->proto)) {
1102 response = coap_pdu_init(type, 0, request->mid, 0);
1103 if (response)
1104 result = coap_send_internal(session, response);
1105 }
1106 return result;
1107}
1108
1122unsigned int
1123coap_calc_timeout(coap_session_t *session, unsigned char r) {
1124 unsigned int result;
1125
1126 /* The integer 1.0 as a Qx.FRAC_BITS */
1127#define FP1 Q(FRAC_BITS, ((coap_fixed_point_t){1,0}))
1128
1129 /* rounds val up and right shifts by frac positions */
1130#define SHR_FP(val,frac) (((val) + (1 << ((frac) - 1))) >> (frac))
1131
1132 /* Inner term: multiply ACK_RANDOM_FACTOR by Q0.MAX_BITS[r] and
1133 * make the result a rounded Qx.FRAC_BITS */
1134 result = SHR_FP((ACK_RANDOM_FACTOR - FP1) * r, MAX_BITS);
1135
1136 /* Add 1 to the inner term and multiply with ACK_TIMEOUT, then
1137 * make the result a rounded Qx.FRAC_BITS */
1138 result = SHR_FP(((result + FP1) * ACK_TIMEOUT), FRAC_BITS);
1139
1140 /* Multiply with COAP_TICKS_PER_SECOND to yield system ticks
1141 * (yields a Qx.FRAC_BITS) and shift to get an integer */
1142 return SHR_FP((COAP_TICKS_PER_SECOND * result), FRAC_BITS);
1143
1144#undef FP1
1145#undef SHR_FP
1146}
1147
1150 coap_queue_t *node) {
1151 coap_tick_t now;
1152
1153 node->session = coap_session_reference_lkd(session);
1154
1155 /* Set timer for pdu retransmission. If this is the first element in
1156 * the retransmission queue, the base time is set to the current
1157 * time and the retransmission time is node->timeout. If there is
1158 * already an entry in the sendqueue, we must check if this node is
1159 * to be retransmitted earlier. Therefore, node->timeout is first
1160 * normalized to the base time and then inserted into the queue with
1161 * an adjusted relative time.
1162 */
1163 coap_ticks(&now);
1164 if (context->sendqueue == NULL) {
1165 node->t = node->timeout << node->retransmit_cnt;
1166 context->sendqueue_basetime = now;
1167 } else {
1168 /* make node->t relative to context->sendqueue_basetime */
1169 node->t = (now - context->sendqueue_basetime) +
1170 (node->timeout << node->retransmit_cnt);
1171 }
1172
1173 coap_insert_node(&context->sendqueue, node);
1174
1175 coap_log_debug("** %s: mid=0x%04x: added to retransmit queue (%ums)\n",
1176 coap_session_str(node->session), node->id,
1177 (unsigned)((node->timeout << node->retransmit_cnt) * 1000 /
1179
1180 coap_update_io_timer(context, node->t);
1181
1182 return node->id;
1183}
1184
1185#if COAP_CLIENT_SUPPORT
1186/*
1187 * Sent out a test PDU for Extended Token
1188 */
1189static coap_mid_t
1190coap_send_test_extended_token(coap_session_t *session) {
1191 coap_pdu_t *pdu;
1193 size_t i;
1194 coap_binary_t *token;
1195
1196 coap_log_debug("Testing for Extended Token support\n");
1197 /* https://rfc-editor.org/rfc/rfc8974#section-2.2.2 */
1199 coap_new_message_id_lkd(session),
1201 if (!pdu)
1202 return COAP_INVALID_MID;
1203
1204 token = coap_new_binary(session->max_token_size);
1205 if (token == NULL) {
1206 coap_delete_pdu(pdu);
1207 return COAP_INVALID_MID;
1208 }
1209 for (i = 0; i < session->max_token_size; i++) {
1210 token->s[i] = (uint8_t)(i + 1);
1211 }
1212 coap_add_token(pdu, session->max_token_size, token->s);
1213 coap_delete_binary(token);
1214
1216
1217 session->max_token_checked = COAP_EXT_T_CHECKING; /* Checking out this one */
1218 if ((mid = coap_send_internal(session, pdu)) == COAP_INVALID_MID)
1219 return COAP_INVALID_MID;
1220 session->remote_test_mid = mid;
1221 return mid;
1222}
1223#endif /* COAP_CLIENT_SUPPORT */
1224
1225int
1227#if COAP_CLIENT_SUPPORT
1228 if (session->type == COAP_SESSION_TYPE_CLIENT && session->doing_first) {
1229 int timeout_ms = 5000;
1230 coap_session_state_t current_state = session->state;
1231
1232 if (session->delay_recursive) {
1233 assert(0);
1234 return 1;
1235 } else {
1236 session->delay_recursive = 1;
1237 }
1238 /*
1239 * Need to wait for first request to get out and response back before
1240 * continuing.. Response handler has to clear doing_first if not an error.
1241 */
1243 while (session->doing_first != 0) {
1244 int result = coap_io_process_lkd(session->context, 1000);
1245
1246 if (result < 0) {
1247 session->doing_first = 0;
1248 session->delay_recursive = 0;
1249 coap_session_release_lkd(session);
1250 return 0;
1251 }
1252
1253 /* coap_io_process_lkd() may have updated session state */
1254 if (session->state == COAP_SESSION_STATE_CSM &&
1255 current_state != COAP_SESSION_STATE_CSM) {
1256 /* Update timeout and restart the clock for CSM timeout */
1257 current_state = COAP_SESSION_STATE_CSM;
1258 timeout_ms = session->context->csm_timeout_ms;
1259 result = 0;
1260 }
1261
1262 if (result < timeout_ms) {
1263 timeout_ms -= result;
1264 } else {
1265 if (session->doing_first == 1) {
1266 /* Timeout failure of some sort with first request */
1267 session->doing_first = 0;
1268 if (session->state == COAP_SESSION_STATE_CSM) {
1269 coap_log_debug("** %s: timeout waiting for CSM response\n",
1270 coap_session_str(session));
1271 session->csm_not_seen = 1;
1272 coap_session_connected(session);
1273 } else {
1274 coap_log_debug("** %s: timeout waiting for first response\n",
1275 coap_session_str(session));
1276 }
1277 }
1278 }
1279 }
1280 session->delay_recursive = 0;
1281 coap_session_release_lkd(session);
1282 }
1283#else /* ! COAP_CLIENT_SUPPORT */
1284 (void)session;
1285#endif /* ! COAP_CLIENT_SUPPORT */
1286 return 1;
1287}
1288
1289/*
1290 * return 0 Invalid
1291 * 1 Valid
1292 */
1293int
1295
1296 /* Check validity of sending code */
1297 switch (COAP_RESPONSE_CLASS(pdu->code)) {
1298 case 0: /* Empty or request */
1299 case 2: /* Success */
1300 case 3: /* Reserved for future use */
1301 case 4: /* Client error */
1302 case 5: /* Server error */
1303 break;
1304 case 7: /* Reliable signalling */
1305 if (COAP_PROTO_RELIABLE(session->proto))
1306 break;
1307 /* Not valid if UDP */
1308 /* Fall through */
1309 case 1: /* Invalid */
1310 case 6: /* Invalid */
1311 default:
1312 return 0;
1313 }
1314 return 1;
1315}
1316
1317#if COAP_CLIENT_SUPPORT
1318/*
1319 * If type is CON and protocol is not reliable, there is no need to set up
1320 * lg_crcv if it can be built up based on sent PDU if there is a
1321 * (Q-)Block2 in the response. However, still need it for Observe, Oscore and
1322 * (Q-)Block1.
1323 */
1324static int
1325coap_check_send_need_lg_crcv(coap_session_t *session, coap_pdu_t *pdu) {
1326 coap_opt_iterator_t opt_iter;
1327
1328 if (
1329#if COAP_OSCORE_SUPPORT
1330 session->oscore_encryption ||
1331#endif /* COAP_OSCORE_SUPPORT */
1332 ((pdu->type == COAP_MESSAGE_NON || COAP_PROTO_RELIABLE(session->proto)) &&
1334 coap_check_option(pdu, COAP_OPTION_OBSERVE, &opt_iter) ||
1335#if COAP_Q_BLOCK_SUPPORT
1336 coap_check_option(pdu, COAP_OPTION_Q_BLOCK1, &opt_iter) ||
1337#endif /* COAP_Q_BLOCK_SUPPORT */
1338 coap_check_option(pdu, COAP_OPTION_BLOCK1, &opt_iter)) {
1339 return 1;
1340 }
1341 return 0;
1342}
1343#endif /* COAP_CLIENT_SUPPORT */
1344
1347 coap_mid_t mid;
1348
1349 coap_lock_lock(session->context, return COAP_INVALID_MID);
1350 mid = coap_send_lkd(session, pdu);
1351 coap_lock_unlock(session->context);
1352 return mid;
1353}
1354
1358#if COAP_CLIENT_SUPPORT
1359 coap_lg_crcv_t *lg_crcv = NULL;
1360 coap_opt_iterator_t opt_iter;
1361 coap_block_b_t block;
1362 int observe_action = -1;
1363 int have_block1 = 0;
1364 coap_opt_t *opt;
1365#endif /* COAP_CLIENT_SUPPORT */
1366
1367 assert(pdu);
1368
1370
1371 /* Check validity of sending code */
1372 if (!coap_check_code_class(session, pdu)) {
1373 coap_log_err("coap_send: Invalid PDU code (%d.%02d)\n",
1375 pdu->code & 0x1f);
1376 goto error;
1377 }
1378 pdu->session = session;
1379#if COAP_CLIENT_SUPPORT
1380 if (session->type == COAP_SESSION_TYPE_CLIENT &&
1381 !coap_netif_available(session)) {
1382 coap_log_debug("coap_send: Socket closed\n");
1383 goto error;
1384 }
1385 /*
1386 * If this is not the first client request and are waiting for a response
1387 * to the first client request, then drop sending out this next request
1388 * until all is properly established.
1389 */
1390 if (!coap_client_delay_first(session)) {
1391 goto error;
1392 }
1393
1394 /* Indicate support for Extended Tokens if appropriate */
1395 if (session->max_token_checked == COAP_EXT_T_NOT_CHECKED &&
1397 session->type == COAP_SESSION_TYPE_CLIENT &&
1398 COAP_PDU_IS_REQUEST(pdu)) {
1399 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
1400 /*
1401 * When the pass / fail response for Extended Token is received, this PDU
1402 * will get transmitted.
1403 */
1404 if (coap_send_test_extended_token(session) == COAP_INVALID_MID) {
1405 goto error;
1406 }
1407 }
1408 /*
1409 * For reliable protocols, this will get cleared after CSM exchanged
1410 * in coap_session_connected()
1411 */
1412 session->doing_first = 1;
1413 if (!coap_client_delay_first(session)) {
1414 goto error;
1415 }
1416 }
1417
1418 /*
1419 * Check validity of token length
1420 */
1421 if (COAP_PDU_IS_REQUEST(pdu) &&
1422 pdu->actual_token.length > session->max_token_size) {
1423 coap_log_warn("coap_send: PDU dropped as token too long (%zu > %" PRIu32 ")\n",
1424 pdu->actual_token.length, session->max_token_size);
1425 goto error;
1426 }
1427
1428 /* A lot of the reliable code assumes type is CON */
1429 if (COAP_PROTO_RELIABLE(session->proto) && pdu->type != COAP_MESSAGE_CON)
1430 pdu->type = COAP_MESSAGE_CON;
1431
1432#if COAP_OSCORE_SUPPORT
1433 if (session->oscore_encryption) {
1434 if (session->recipient_ctx->initial_state == 1) {
1435 /*
1436 * Not sure if remote supports OSCORE, or is going to send us a
1437 * "4.01 + ECHO" etc. so need to hold off future coap_send()s until all
1438 * is OK. Continue sending current pdu to test things.
1439 */
1440 session->doing_first = 1;
1441 }
1442 /* Need to convert Proxy-Uri to Proxy-Scheme option if needed */
1444 goto error;
1445 }
1446 }
1447#endif /* COAP_OSCORE_SUPPORT */
1448
1449 if (!(session->block_mode & COAP_BLOCK_USE_LIBCOAP)) {
1450 return coap_send_internal(session, pdu);
1451 }
1452
1453 if (COAP_PDU_IS_REQUEST(pdu)) {
1454 uint8_t buf[4];
1455
1456 opt = coap_check_option(pdu, COAP_OPTION_OBSERVE, &opt_iter);
1457
1458 if (opt) {
1459 observe_action = coap_decode_var_bytes(coap_opt_value(opt),
1460 coap_opt_length(opt));
1461 }
1462
1463 if (coap_get_block_b(session, pdu, COAP_OPTION_BLOCK1, &block) &&
1464 (block.m == 1 || block.bert == 1)) {
1465 have_block1 = 1;
1466 }
1467#if COAP_Q_BLOCK_SUPPORT
1468 if (coap_get_block_b(session, pdu, COAP_OPTION_Q_BLOCK1, &block) &&
1469 (block.m == 1 || block.bert == 1)) {
1470 if (have_block1) {
1471 coap_log_warn("Block1 and Q-Block1 cannot be in the same request\n");
1473 }
1474 have_block1 = 1;
1475 }
1476#endif /* COAP_Q_BLOCK_SUPPORT */
1477 if (observe_action != COAP_OBSERVE_CANCEL) {
1478 /* Warn about re-use of tokens */
1479 if (session->last_token &&
1480 coap_binary_equal(&pdu->actual_token, session->last_token)) {
1481 coap_log_debug("Token reused - see https://rfc-editor.org/rfc/rfc9175.html#section-4.2\n");
1482 }
1485 pdu->actual_token.length);
1486 } else {
1487 /* observe_action == COAP_OBSERVE_CANCEL */
1488 coap_binary_t tmp;
1489 int ret;
1490
1491 coap_log_debug("coap_send: Using coap_cancel_observe() to do OBSERVE cancellation\n");
1492 /* Unfortunately need to change the ptr type to be r/w */
1493 memcpy(&tmp.s, &pdu->actual_token.s, sizeof(tmp.s));
1494 tmp.length = pdu->actual_token.length;
1495 ret = coap_cancel_observe_lkd(session, &tmp, pdu->type);
1496 if (ret == 1) {
1497 /* Observe Cancel successfully sent */
1498 coap_delete_pdu(pdu);
1499 return ret;
1500 }
1501 /* Some mismatch somewhere - continue to send original packet */
1502 }
1503 if (!coap_check_option(pdu, COAP_OPTION_RTAG, &opt_iter) &&
1504 (session->block_mode & COAP_BLOCK_NO_PREEMPTIVE_RTAG) == 0 &&
1508 coap_encode_var_safe(buf, sizeof(buf),
1509 ++session->tx_rtag),
1510 buf);
1511 } else {
1512 memset(&block, 0, sizeof(block));
1513 }
1514
1515#if COAP_Q_BLOCK_SUPPORT
1516 /* Indicate support for Q-Block if appropriate */
1517 if (session->block_mode & COAP_BLOCK_TRY_Q_BLOCK &&
1518 session->type == COAP_SESSION_TYPE_CLIENT &&
1519 COAP_PDU_IS_REQUEST(pdu)) {
1520 if (coap_block_test_q_block(session, pdu) == COAP_INVALID_MID) {
1521 goto error;
1522 }
1523 session->doing_first = 1;
1524 if (!coap_client_delay_first(session)) {
1525 /* Q-Block test Session has failed for some reason */
1526 set_block_mode_drop_q(session->block_mode);
1527 goto error;
1528 }
1529 }
1530#endif /* COAP_Q_BLOCK_SUPPORT */
1531
1532#if COAP_Q_BLOCK_SUPPORT
1533 if (!(session->block_mode & COAP_BLOCK_HAS_Q_BLOCK))
1534#endif /* COAP_Q_BLOCK_SUPPORT */
1535 {
1536 /* Need to check if we need to reset Q-Block to Block */
1537 uint8_t buf[4];
1538
1539 if (coap_get_block_b(session, pdu, COAP_OPTION_Q_BLOCK2, &block)) {
1542 coap_encode_var_safe(buf, sizeof(buf),
1543 (block.num << 4) | (0 << 3) | block.szx),
1544 buf);
1545 coap_log_debug("Replaced option Q-Block2 with Block2\n");
1546 /* Need to update associated lg_xmit */
1547 coap_lg_xmit_t *lg_xmit;
1548
1549 LL_FOREACH(session->lg_xmit, lg_xmit) {
1550 if (COAP_PDU_IS_REQUEST(&lg_xmit->pdu) &&
1551 lg_xmit->b.b1.app_token &&
1552 coap_binary_equal(&pdu->actual_token, lg_xmit->b.b1.app_token)) {
1553 /* Update the skeletal PDU with the block1 option */
1556 coap_encode_var_safe(buf, sizeof(buf),
1557 (block.num << 4) | (0 << 3) | block.szx),
1558 buf);
1559 break;
1560 }
1561 }
1562 }
1563 if (coap_get_block_b(session, pdu, COAP_OPTION_Q_BLOCK1, &block)) {
1566 coap_encode_var_safe(buf, sizeof(buf),
1567 (block.num << 4) | (block.m << 3) | block.szx),
1568 buf);
1569 coap_log_debug("Replaced option Q-Block1 with Block1\n");
1570 /* Need to update associated lg_xmit */
1571 coap_lg_xmit_t *lg_xmit;
1572
1573 LL_FOREACH(session->lg_xmit, lg_xmit) {
1574 if (COAP_PDU_IS_REQUEST(&lg_xmit->pdu) &&
1575 lg_xmit->b.b1.app_token &&
1576 coap_binary_equal(&pdu->actual_token, lg_xmit->b.b1.app_token)) {
1577 /* Update the skeletal PDU with the block1 option */
1580 coap_encode_var_safe(buf, sizeof(buf),
1581 (block.num << 4) |
1582 (block.m << 3) |
1583 block.szx),
1584 buf);
1585 /* Update as this is a Request */
1586 lg_xmit->option = COAP_OPTION_BLOCK1;
1587 break;
1588 }
1589 }
1590 }
1591 }
1592
1593#if COAP_Q_BLOCK_SUPPORT
1594 if (COAP_PDU_IS_REQUEST(pdu) &&
1595 coap_get_block_b(session, pdu, COAP_OPTION_Q_BLOCK2, &block)) {
1596 if (block.num == 0 && block.m == 0) {
1597 uint8_t buf[4];
1598
1599 /* M needs to be set as asking for all the blocks */
1601 coap_encode_var_safe(buf, sizeof(buf),
1602 (0 << 4) | (1 << 3) | block.szx),
1603 buf);
1604 }
1605 }
1606#endif /* COAP_Q_BLOCK_SUPPORT */
1607
1608 /*
1609 * If type is CON and protocol is not reliable, there is no need to set up
1610 * lg_crcv here as it can be built up based on sent PDU if there is a
1611 * (Q-)Block2 in the response. However, still need it for Observe, Oscore and
1612 * (Q-)Block1.
1613 */
1614 if (coap_check_send_need_lg_crcv(session, pdu)) {
1615 coap_lg_xmit_t *lg_xmit = NULL;
1616
1617 if (!session->lg_xmit && have_block1) {
1618 coap_log_debug("PDU presented by app\n");
1620 }
1621 /* See if this token is already in use for large body responses */
1622 LL_FOREACH(session->lg_crcv, lg_crcv) {
1623 if (coap_binary_equal(&pdu->actual_token, lg_crcv->app_token)) {
1624 /* Need to terminate and clean up previous response setup */
1625 LL_DELETE(session->lg_crcv, lg_crcv);
1626 coap_block_delete_lg_crcv(session, lg_crcv);
1627 break;
1628 }
1629 }
1630
1631 if (have_block1 && session->lg_xmit) {
1632 LL_FOREACH(session->lg_xmit, lg_xmit) {
1633 if (COAP_PDU_IS_REQUEST(&lg_xmit->pdu) &&
1634 lg_xmit->b.b1.app_token &&
1635 coap_binary_equal(&pdu->actual_token, lg_xmit->b.b1.app_token)) {
1636 break;
1637 }
1638 }
1639 }
1640 lg_crcv = coap_block_new_lg_crcv(session, pdu, lg_xmit);
1641 if (lg_crcv == NULL) {
1642 goto error;
1643 }
1644 if (lg_xmit) {
1645 /* Need to update the token as set up in the session->lg_xmit */
1646 lg_xmit->b.b1.state_token = lg_crcv->state_token;
1647 }
1648 }
1649 if (session->sock.flags & COAP_SOCKET_MULTICAST)
1650 coap_address_copy(&session->addr_info.remote, &session->sock.mcast_addr);
1651
1652#if COAP_Q_BLOCK_SUPPORT
1653 /* See if large xmit using Q-Block1 (but not testing Q-Block1) */
1654 if (coap_get_block_b(session, pdu, COAP_OPTION_Q_BLOCK1, &block)) {
1655 mid = coap_send_q_block1(session, block, pdu, COAP_SEND_INC_PDU);
1656 } else
1657#endif /* COAP_Q_BLOCK_SUPPORT */
1658 mid = coap_send_internal(session, pdu);
1659#else /* !COAP_CLIENT_SUPPORT */
1660 mid = coap_send_internal(session, pdu);
1661#endif /* !COAP_CLIENT_SUPPORT */
1662#if COAP_CLIENT_SUPPORT
1663 if (lg_crcv) {
1664 if (mid != COAP_INVALID_MID) {
1665 LL_PREPEND(session->lg_crcv, lg_crcv);
1666 } else {
1667 coap_block_delete_lg_crcv(session, lg_crcv);
1668 }
1669 }
1670#endif /* COAP_CLIENT_SUPPORT */
1671 return mid;
1672
1673error:
1674 coap_delete_pdu(pdu);
1675 return COAP_INVALID_MID;
1676}
1677
1680 uint8_t r;
1681 ssize_t bytes_written;
1682 coap_opt_iterator_t opt_iter;
1683
1684 pdu->session = session;
1685 if (pdu->code == COAP_RESPONSE_CODE(508)) {
1686 /*
1687 * Need to prepend our IP identifier to the data as per
1688 * https://rfc-editor.org/rfc/rfc8768.html#section-4
1689 */
1690 char addr_str[INET6_ADDRSTRLEN + 8 + 1];
1691 coap_opt_t *opt;
1692 size_t hop_limit;
1693
1694 addr_str[sizeof(addr_str)-1] = '\000';
1695 if (coap_print_addr(&session->addr_info.local, (uint8_t *)addr_str,
1696 sizeof(addr_str) - 1)) {
1697 char *cp;
1698 size_t len;
1699
1700 if (addr_str[0] == '[') {
1701 cp = strchr(addr_str, ']');
1702 if (cp)
1703 *cp = '\000';
1704 if (memcmp(&addr_str[1], "::ffff:", 7) == 0) {
1705 /* IPv4 embedded into IPv6 */
1706 cp = &addr_str[8];
1707 } else {
1708 cp = &addr_str[1];
1709 }
1710 } else {
1711 cp = strchr(addr_str, ':');
1712 if (cp)
1713 *cp = '\000';
1714 cp = addr_str;
1715 }
1716 len = strlen(cp);
1717
1718 /* See if Hop Limit option is being used in return path */
1719 opt = coap_check_option(pdu, COAP_OPTION_HOP_LIMIT, &opt_iter);
1720 if (opt) {
1721 uint8_t buf[4];
1722
1723 hop_limit =
1725 if (hop_limit == 1) {
1726 coap_log_warn("Proxy loop detected '%s'\n",
1727 (char *)pdu->data);
1728 coap_delete_pdu(pdu);
1730 } else if (hop_limit < 1 || hop_limit > 255) {
1731 /* Something is bad - need to drop this pdu (TODO or delete option) */
1732 coap_log_warn("Proxy return has bad hop limit count '%zu'\n",
1733 hop_limit);
1734 coap_delete_pdu(pdu);
1736 }
1737 hop_limit--;
1739 coap_encode_var_safe8(buf, sizeof(buf), hop_limit),
1740 buf);
1741 }
1742
1743 /* Need to check that we are not seeing this proxy in the return loop */
1744 if (pdu->data && opt == NULL) {
1745 char *a_match;
1746 size_t data_len;
1747
1748 if (pdu->used_size + 1 > pdu->max_size) {
1749 /* No space */
1751 }
1752 if (!coap_pdu_resize(pdu, pdu->used_size + 1)) {
1753 /* Internal error */
1755 }
1756 data_len = pdu->used_size - (pdu->data - pdu->token);
1757 pdu->data[data_len] = '\000';
1758 a_match = strstr((char *)pdu->data, cp);
1759 if (a_match && (a_match == (char *)pdu->data || a_match[-1] == ' ') &&
1760 ((size_t)(a_match - (char *)pdu->data + len) == data_len ||
1761 a_match[len] == ' ')) {
1762 coap_log_warn("Proxy loop detected '%s'\n",
1763 (char *)pdu->data);
1764 coap_delete_pdu(pdu);
1766 }
1767 }
1768 if (pdu->used_size + len + 1 <= pdu->max_size) {
1769 size_t old_size = pdu->used_size;
1770 if (coap_pdu_resize(pdu, pdu->used_size + len + 1)) {
1771 if (pdu->data == NULL) {
1772 /*
1773 * Set Hop Limit to max for return path. If this libcoap is in
1774 * a proxy loop path, it will always decrement hop limit in code
1775 * above and hence timeout / drop the response as appropriate
1776 */
1777 hop_limit = 255;
1779 (uint8_t *)&hop_limit);
1780 coap_add_data(pdu, len, (uint8_t *)cp);
1781 } else {
1782 /* prepend with space separator, leaving hop limit "as is" */
1783 memmove(pdu->data + len + 1, pdu->data,
1784 old_size - (pdu->data - pdu->token));
1785 memcpy(pdu->data, cp, len);
1786 pdu->data[len] = ' ';
1787 pdu->used_size += len + 1;
1788 }
1789 }
1790 }
1791 }
1792 }
1793
1794 if (session->echo) {
1795 if (!coap_insert_option(pdu, COAP_OPTION_ECHO, session->echo->length,
1796 session->echo->s))
1797 goto error;
1798 coap_delete_bin_const(session->echo);
1799 session->echo = NULL;
1800 }
1801#if COAP_OSCORE_SUPPORT
1802 if (session->oscore_encryption) {
1803 /* Need to convert Proxy-Uri to Proxy-Scheme option if needed */
1805 goto error;
1806 }
1807#endif /* COAP_OSCORE_SUPPORT */
1808
1809 if (!coap_pdu_encode_header(pdu, session->proto)) {
1810 goto error;
1811 }
1812
1813#if !COAP_DISABLE_TCP
1814 if (COAP_PROTO_RELIABLE(session->proto) &&
1816 if (!session->csm_block_supported) {
1817 /*
1818 * Need to check that this instance is not sending any block options as
1819 * the remote end via CSM has not informed us that there is support
1820 * https://rfc-editor.org/rfc/rfc8323#section-5.3.2
1821 * This includes potential BERT blocks.
1822 */
1823 if (coap_check_option(pdu, COAP_OPTION_BLOCK1, &opt_iter) != NULL) {
1824 coap_log_debug("Remote end did not indicate CSM support for Block1 enabled\n");
1825 }
1826 if (coap_check_option(pdu, COAP_OPTION_BLOCK2, &opt_iter) != NULL) {
1827 coap_log_debug("Remote end did not indicate CSM support for Block2 enabled\n");
1828 }
1829 } else if (!session->csm_bert_rem_support) {
1830 coap_opt_t *opt;
1831
1832 opt = coap_check_option(pdu, COAP_OPTION_BLOCK1, &opt_iter);
1833 if (opt && COAP_OPT_BLOCK_SZX(opt) == 7) {
1834 coap_log_debug("Remote end did not indicate CSM support for BERT Block1\n");
1835 }
1836 opt = coap_check_option(pdu, COAP_OPTION_BLOCK2, &opt_iter);
1837 if (opt && COAP_OPT_BLOCK_SZX(opt) == 7) {
1838 coap_log_debug("Remote end did not indicate CSM support for BERT Block2\n");
1839 }
1840 }
1841 }
1842#endif /* !COAP_DISABLE_TCP */
1843
1844#if COAP_OSCORE_SUPPORT
1845 if (session->oscore_encryption &&
1846 pdu->type != COAP_MESSAGE_RST &&
1847 !(pdu->type == COAP_MESSAGE_ACK && pdu->code == COAP_EMPTY_CODE)) {
1848 /* Refactor PDU as appropriate RFC8613 */
1849 coap_pdu_t *osc_pdu = coap_oscore_new_pdu_encrypted_lkd(session, pdu, NULL,
1850 0);
1851
1852 if (osc_pdu == NULL) {
1853 coap_log_warn("OSCORE: PDU could not be encrypted\n");
1854 goto error;
1855 }
1856 bytes_written = coap_send_pdu(session, osc_pdu, NULL);
1857 coap_delete_pdu(pdu);
1858 pdu = osc_pdu;
1859 } else
1860#endif /* COAP_OSCORE_SUPPORT */
1861 bytes_written = coap_send_pdu(session, pdu, NULL);
1862
1863 if (bytes_written == COAP_PDU_DELAYED) {
1864 /* do not free pdu as it is stored with session for later use */
1865 return pdu->mid;
1866 }
1867 if (bytes_written < 0) {
1868 goto error;
1869 }
1870
1871#if !COAP_DISABLE_TCP
1872 if (COAP_PROTO_RELIABLE(session->proto) &&
1873 (size_t)bytes_written < pdu->used_size + pdu->hdr_size) {
1874 if (coap_session_delay_pdu(session, pdu, NULL) == COAP_PDU_DELAYED) {
1875 session->partial_write = (size_t)bytes_written;
1876 /* do not free pdu as it is stored with session for later use */
1877 return pdu->mid;
1878 } else {
1879 goto error;
1880 }
1881 }
1882#endif /* !COAP_DISABLE_TCP */
1883
1884 if (pdu->type != COAP_MESSAGE_CON
1885 || COAP_PROTO_RELIABLE(session->proto)) {
1886 coap_mid_t id = pdu->mid;
1887 coap_delete_pdu(pdu);
1888 return id;
1889 }
1890
1891 coap_queue_t *node = coap_new_node();
1892 if (!node) {
1893 coap_log_debug("coap_wait_ack: insufficient memory\n");
1894 goto error;
1895 }
1896
1897 node->id = pdu->mid;
1898 node->pdu = pdu;
1899 coap_prng_lkd(&r, sizeof(r));
1900 /* add timeout in range [ACK_TIMEOUT...ACK_TIMEOUT * ACK_RANDOM_FACTOR] */
1901 node->timeout = coap_calc_timeout(session, r);
1902 return coap_wait_ack(session->context, session, node);
1903error:
1904 coap_delete_pdu(pdu);
1905 return COAP_INVALID_MID;
1906}
1907
1908static int send_recv_terminate = 0;
1909
1910void
1913}
1914
1915COAP_API int
1917 coap_pdu_t **response_pdu, uint32_t timeout_ms) {
1918 int ret;
1919
1920 coap_lock_lock(session->context, return 0);
1921 ret = coap_send_recv_lkd(session, request_pdu, response_pdu, timeout_ms);
1922 coap_lock_unlock(session->context);
1923 return ret;
1924}
1925
1926/*
1927 * Return 0 or +ve Time in function in ms after successful transfer
1928 * -1 Invalid timeout parameter
1929 * -2 Failed to transmit PDU
1930 * -3 Nack or Event handler invoked, cancelling request
1931 * -4 coap_io_process returned error (fail to re-lock or select())
1932 * -5 Response not received in the given time
1933 * -6 Terminated by user
1934 * -7 Client mode code not enabled
1935 */
1936int
1938 coap_pdu_t **response_pdu, uint32_t timeout_ms) {
1939#if COAP_CLIENT_SUPPORT
1941 uint32_t rem_timeout = timeout_ms;
1942 uint32_t block_mode = session->block_mode;
1943 int ret = 0;
1944 coap_tick_t now;
1945 coap_tick_t start;
1946 coap_tick_t ticks_so_far;
1947 uint32_t time_so_far_ms;
1948
1949 coap_ticks(&start);
1950 assert(request_pdu);
1951
1953
1954 session->resp_pdu = NULL;
1955 session->req_token = coap_new_bin_const(request_pdu->actual_token.s,
1956 request_pdu->actual_token.length);
1957
1958 if (timeout_ms == COAP_IO_NO_WAIT || timeout_ms == COAP_IO_WAIT) {
1959 ret = -1;
1960 goto fail;
1961 }
1962 if (session->state == COAP_SESSION_STATE_NONE) {
1963 ret = -3;
1964 goto fail;
1965 }
1966
1968 session->doing_send_recv = 1;
1969 /* So the user needs to delete the PDU */
1970 request_pdu->ref++;
1971 mid = coap_send_lkd(session, request_pdu);
1972 if (mid == COAP_INVALID_MID) {
1973 if (!session->doing_send_recv)
1974 ret = -3;
1975 else
1976 ret = -2;
1977 goto fail;
1978 }
1979
1980 /* Wait for the response to come in */
1981 while (rem_timeout > 0 && session->doing_send_recv && !session->resp_pdu) {
1982 if (send_recv_terminate) {
1983 ret = -6;
1984 goto fail;
1985 }
1986 ret = coap_io_process_lkd(session->context, rem_timeout);
1987 if (ret < 0) {
1988 ret = -4;
1989 goto fail;
1990 }
1991 /* timeout_ms is for timeout between specific request and response */
1992 coap_ticks(&now);
1993 ticks_so_far = now - session->last_rx_tx;
1994 time_so_far_ms = (uint32_t)((ticks_so_far * 1000) / COAP_TICKS_PER_SECOND);
1995 if (time_so_far_ms >= timeout_ms) {
1996 rem_timeout = 0;
1997 } else {
1998 rem_timeout = timeout_ms - time_so_far_ms;
1999 }
2000 if (session->state != COAP_SESSION_STATE_ESTABLISHED) {
2001 /* To pick up on (D)TLS setup issues */
2002 coap_ticks(&now);
2003 ticks_so_far = now - start;
2004 time_so_far_ms = (uint32_t)((ticks_so_far * 1000) / COAP_TICKS_PER_SECOND);
2005 if (time_so_far_ms >= timeout_ms) {
2006 rem_timeout = 0;
2007 } else {
2008 rem_timeout = timeout_ms - time_so_far_ms;
2009 }
2010 }
2011 }
2012
2013 if (rem_timeout) {
2014 coap_ticks(&now);
2015 ticks_so_far = now - start;
2016 time_so_far_ms = (uint32_t)((ticks_so_far * 1000) / COAP_TICKS_PER_SECOND);
2017 ret = time_so_far_ms;
2018 /* Give PDU to user */
2019 *response_pdu = session->resp_pdu;
2020 session->resp_pdu = NULL;
2021 if (*response_pdu == NULL) {
2022 ret = -3;
2023 }
2024 } else {
2025 /* If there is a resp_pdu, it will get cleared below */
2026 ret = -5;
2027 }
2028
2029fail:
2030 session->block_mode = block_mode;
2031 session->doing_send_recv = 0;
2032 if (session->resp_pdu && session->resp_pdu->ref)
2033 session->resp_pdu->ref--;
2034 coap_delete_pdu(session->resp_pdu);
2035 session->resp_pdu = NULL;
2037 session->req_token = NULL;
2038 return ret;
2039
2040#else /* !COAP_CLIENT_SUPPORT */
2041
2042 (void)session;
2043 (void)timeout_ms;
2044 (void)request_pdu;
2045 coap_log_warn("coap_send_recv: Client mode not supported\n");
2046 *response_pdu = NULL;
2047 return -7;
2048
2049#endif /* ! COAP_CLIENT_SUPPORT */
2050}
2051
2054 if (!context || !node)
2055 return COAP_INVALID_MID;
2056
2057 /* re-initialize timeout when maximum number of retransmissions are not reached yet */
2058 if (node->retransmit_cnt < node->session->max_retransmit) {
2059 ssize_t bytes_written;
2060 coap_tick_t now;
2061 coap_tick_t next_delay;
2062
2063 node->retransmit_cnt++;
2065
2066 next_delay = (coap_tick_t)node->timeout << node->retransmit_cnt;
2067 if (context->ping_timeout &&
2068 context->ping_timeout * COAP_TICKS_PER_SECOND < next_delay) {
2069 uint8_t byte;
2070
2071 coap_prng_lkd(&byte, sizeof(byte));
2072 /* Don't exceed the ping timeout value */
2073 next_delay = context->ping_timeout * COAP_TICKS_PER_SECOND - 255 + byte;
2074 }
2075
2076 coap_ticks(&now);
2077 if (context->sendqueue == NULL) {
2078 node->t = next_delay;
2079 context->sendqueue_basetime = now;
2080 } else {
2081 /* make node->t relative to context->sendqueue_basetime */
2082 node->t = (now - context->sendqueue_basetime) + next_delay;
2083 }
2084 coap_insert_node(&context->sendqueue, node);
2085
2086 if (node->is_mcast) {
2087 coap_log_debug("** %s: mid=0x%04x: mcast delayed transmission\n",
2088 coap_session_str(node->session), node->id);
2089 } else {
2090 coap_log_debug("** %s: mid=0x%04x: retransmission #%d (next %ums)\n",
2091 coap_session_str(node->session), node->id,
2092 node->retransmit_cnt,
2093 (unsigned)(next_delay * 1000 / COAP_TICKS_PER_SECOND));
2094 }
2095
2096 if (node->session->con_active)
2097 node->session->con_active--;
2098 bytes_written = coap_send_pdu(node->session, node->pdu, node);
2099
2100 if (node->is_mcast) {
2103 return COAP_INVALID_MID;
2104 }
2105 if (bytes_written == COAP_PDU_DELAYED) {
2106 /* PDU was not retransmitted immediately because a new handshake is
2107 in progress. node was moved to the send queue of the session. */
2108 return node->id;
2109 }
2110
2111 if (bytes_written < 0)
2112 return (int)bytes_written;
2113
2114 return node->id;
2115 }
2116
2117 /* no more retransmissions, remove node from system */
2118 coap_log_warn("** %s: mid=0x%04x: give up after %d attempts\n",
2119 coap_session_str(node->session), node->id, node->retransmit_cnt);
2120
2121#if COAP_SERVER_SUPPORT
2122 /* Check if subscriptions exist that should be canceled after
2123 COAP_OBS_MAX_FAIL */
2124 if (COAP_RESPONSE_CLASS(node->pdu->code) >= 2) {
2125 coap_handle_failed_notify(context, node->session, &node->pdu->actual_token);
2126 }
2127#endif /* COAP_SERVER_SUPPORT */
2128 if (node->session->con_active) {
2129 node->session->con_active--;
2131 /*
2132 * As there may be another CON in a different queue entry on the same
2133 * session that needs to be immediately released,
2134 * coap_session_connected() is called.
2135 * However, there is the possibility coap_wait_ack() may be called for
2136 * this node (queue) and re-added to context->sendqueue.
2137 * coap_delete_node_lkd(node) called shortly will handle this and
2138 * remove it.
2139 */
2141 }
2142 }
2143
2144 /* And finally delete the node */
2145 if (node->pdu->type == COAP_MESSAGE_CON) {
2147 }
2148#if COAP_CLIENT_SUPPORT
2149 node->session->doing_send_recv = 0;
2150#endif /* COAP_CLIENT_SUPPORT */
2152 return COAP_INVALID_MID;
2153}
2154
2155static int
2157 uint8_t *data;
2158 size_t data_len;
2159 int result = -1;
2160
2161 coap_packet_get_memmapped(packet, &data, &data_len);
2162 if (session->proto == COAP_PROTO_DTLS) {
2163#if COAP_SERVER_SUPPORT
2164 if (session->type == COAP_SESSION_TYPE_HELLO)
2165 result = coap_dtls_hello(session, data, data_len);
2166 else
2167#endif /* COAP_SERVER_SUPPORT */
2168 if (session->tls)
2169 result = coap_dtls_receive(session, data, data_len);
2170 } else if (session->proto == COAP_PROTO_UDP) {
2171 result = coap_handle_dgram(ctx, session, data, data_len);
2172 }
2173 return result;
2174}
2175
2176#if COAP_CLIENT_SUPPORT
2177void
2179#if COAP_DISABLE_TCP
2180 (void)now;
2181
2183#else /* !COAP_DISABLE_TCP */
2184 if (coap_netif_strm_connect2(session)) {
2185 session->last_rx_tx = now;
2187 session->sock.lfunc[COAP_LAYER_SESSION].l_establish(session);
2188 } else {
2191 }
2192#endif /* !COAP_DISABLE_TCP */
2193}
2194#endif /* COAP_CLIENT_SUPPORT */
2195
2196static void
2198 (void)ctx;
2199 assert(session->sock.flags & COAP_SOCKET_CONNECTED);
2200
2201 while (session->delayqueue) {
2202 ssize_t bytes_written;
2203 coap_queue_t *q = session->delayqueue;
2204 coap_log_debug("** %s: mid=0x%04x: transmitted after delay\n",
2205 coap_session_str(session), (int)q->pdu->mid);
2206 assert(session->partial_write < q->pdu->used_size + q->pdu->hdr_size);
2207 bytes_written = session->sock.lfunc[COAP_LAYER_SESSION].l_write(session,
2208 q->pdu->token - q->pdu->hdr_size + session->partial_write,
2209 q->pdu->used_size + q->pdu->hdr_size - session->partial_write);
2210 if (bytes_written > 0)
2211 session->last_rx_tx = now;
2212 if (bytes_written <= 0 ||
2213 (size_t)bytes_written < q->pdu->used_size + q->pdu->hdr_size - session->partial_write) {
2214 if (bytes_written > 0)
2215 session->partial_write += (size_t)bytes_written;
2216 break;
2217 }
2218 session->delayqueue = q->next;
2219 session->partial_write = 0;
2221 }
2222}
2223
2224void
2226#if COAP_CONSTRAINED_STACK
2227 /* payload and packet can be protected by global_lock if needed */
2228 static unsigned char payload[COAP_RXBUFFER_SIZE];
2229 static coap_packet_t s_packet;
2230#else /* ! COAP_CONSTRAINED_STACK */
2231 unsigned char payload[COAP_RXBUFFER_SIZE];
2232 coap_packet_t s_packet;
2233#endif /* ! COAP_CONSTRAINED_STACK */
2234 coap_packet_t *packet = &s_packet;
2235
2237
2238 packet->length = sizeof(payload);
2239 packet->payload = payload;
2240
2241 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
2242 ssize_t bytes_read;
2243 memcpy(&packet->addr_info, &session->addr_info, sizeof(packet->addr_info));
2244 bytes_read = coap_netif_dgrm_read(session, packet);
2245
2246 if (bytes_read < 0) {
2247 if (bytes_read == -2)
2248 /* Reset the session back to startup defaults */
2250 } else if (bytes_read > 0) {
2251 session->last_rx_tx = now;
2252 /* coap_netif_dgrm_read() updates session->addr_info from packet->addr_info */
2253 coap_handle_dgram_for_proto(ctx, session, packet);
2254 }
2255#if !COAP_DISABLE_TCP
2256 } else if (session->proto == COAP_PROTO_WS ||
2257 session->proto == COAP_PROTO_WSS) {
2258 ssize_t bytes_read = 0;
2259
2260 /* WebSocket layer passes us the whole packet */
2261 bytes_read = session->sock.lfunc[COAP_LAYER_SESSION].l_read(session,
2262 packet->payload,
2263 packet->length);
2264 if (bytes_read < 0) {
2266 } else if (bytes_read > 2) {
2267 coap_pdu_t *pdu;
2268
2269 session->last_rx_tx = now;
2270 /* Need max space incase PDU is updated with updated token etc. */
2271 pdu = coap_pdu_init(0, 0, 0, coap_session_max_pdu_rcv_size(session));
2272 if (!pdu) {
2273 return;
2274 }
2275
2276 if (!coap_pdu_parse(session->proto, packet->payload, bytes_read, pdu)) {
2278 coap_log_warn("discard malformed PDU\n");
2279 coap_delete_pdu(pdu);
2280 return;
2281 }
2282
2283 coap_dispatch(ctx, session, pdu);
2284 coap_delete_pdu(pdu);
2285 return;
2286 }
2287 } else {
2288 ssize_t bytes_read = 0;
2289 const uint8_t *p;
2290 int retry;
2291
2292 do {
2293 bytes_read = session->sock.lfunc[COAP_LAYER_SESSION].l_read(session,
2294 packet->payload,
2295 packet->length);
2296 if (bytes_read > 0) {
2297 session->last_rx_tx = now;
2298 }
2299 p = packet->payload;
2300 retry = bytes_read == (ssize_t)packet->length;
2301 while (bytes_read > 0) {
2302 if (session->partial_pdu) {
2303 size_t len = session->partial_pdu->used_size
2304 + session->partial_pdu->hdr_size
2305 - session->partial_read;
2306 size_t n = min(len, (size_t)bytes_read);
2307 memcpy(session->partial_pdu->token - session->partial_pdu->hdr_size
2308 + session->partial_read, p, n);
2309 p += n;
2310 bytes_read -= n;
2311 if (n == len) {
2312 if (coap_pdu_parse_header(session->partial_pdu, session->proto)
2313 && coap_pdu_parse_opt(session->partial_pdu)) {
2314 coap_dispatch(ctx, session, session->partial_pdu);
2315 }
2316 coap_delete_pdu(session->partial_pdu);
2317 session->partial_pdu = NULL;
2318 session->partial_read = 0;
2319 } else {
2320 session->partial_read += n;
2321 }
2322 } else if (session->partial_read > 0) {
2323 size_t hdr_size = coap_pdu_parse_header_size(session->proto,
2324 session->read_header);
2325 size_t tkl = session->read_header[0] & 0x0f;
2326 size_t tok_ext_bytes = tkl == COAP_TOKEN_EXT_1B_TKL ? 1 :
2327 tkl == COAP_TOKEN_EXT_2B_TKL ? 2 : 0;
2328 size_t len = hdr_size + tok_ext_bytes - session->partial_read;
2329 size_t n = min(len, (size_t)bytes_read);
2330 memcpy(session->read_header + session->partial_read, p, n);
2331 p += n;
2332 bytes_read -= n;
2333 if (n == len) {
2334 size_t size = coap_pdu_parse_size(session->proto, session->read_header,
2335 hdr_size + tok_ext_bytes);
2336 if (size > COAP_DEFAULT_MAX_PDU_RX_SIZE) {
2337 coap_log_warn("** %s: incoming PDU length too large (%zu > %lu)\n",
2338 coap_session_str(session),
2339 size, COAP_DEFAULT_MAX_PDU_RX_SIZE);
2340 bytes_read = -1;
2341 break;
2342 }
2343 /* Need max space incase PDU is updated with updated token etc. */
2344 session->partial_pdu = coap_pdu_init(0, 0, 0,
2346 if (session->partial_pdu == NULL) {
2347 bytes_read = -1;
2348 break;
2349 }
2350 if (session->partial_pdu->alloc_size < size && !coap_pdu_resize(session->partial_pdu, size)) {
2351 bytes_read = -1;
2352 break;
2353 }
2354 session->partial_pdu->hdr_size = (uint8_t)hdr_size;
2355 session->partial_pdu->used_size = size;
2356 memcpy(session->partial_pdu->token - hdr_size, session->read_header, hdr_size + tok_ext_bytes);
2357 session->partial_read = hdr_size + tok_ext_bytes;
2358 if (size == 0) {
2359 if (coap_pdu_parse_header(session->partial_pdu, session->proto)) {
2360 coap_dispatch(ctx, session, session->partial_pdu);
2361 }
2362 coap_delete_pdu(session->partial_pdu);
2363 session->partial_pdu = NULL;
2364 session->partial_read = 0;
2365 }
2366 } else {
2367 session->partial_read += bytes_read;
2368 }
2369 } else {
2370 session->read_header[0] = *p++;
2371 bytes_read -= 1;
2372 if (!coap_pdu_parse_header_size(session->proto,
2373 session->read_header)) {
2374 bytes_read = -1;
2375 break;
2376 }
2377 session->partial_read = 1;
2378 }
2379 }
2380 } while (bytes_read == 0 && retry);
2381 if (bytes_read < 0)
2383#endif /* !COAP_DISABLE_TCP */
2384 }
2385}
2386
2387#if COAP_SERVER_SUPPORT
2388static int
2389coap_read_endpoint(coap_context_t *ctx, coap_endpoint_t *endpoint, coap_tick_t now) {
2390 ssize_t bytes_read = -1;
2391 int result = -1; /* the value to be returned */
2392#if COAP_CONSTRAINED_STACK
2393 /* payload and e_packet can be protected by global_lock if needed */
2394 static unsigned char payload[COAP_RXBUFFER_SIZE];
2395 static coap_packet_t e_packet;
2396#else /* ! COAP_CONSTRAINED_STACK */
2397 unsigned char payload[COAP_RXBUFFER_SIZE];
2398 coap_packet_t e_packet;
2399#endif /* ! COAP_CONSTRAINED_STACK */
2400 coap_packet_t *packet = &e_packet;
2401
2402 assert(COAP_PROTO_NOT_RELIABLE(endpoint->proto));
2403 assert(endpoint->sock.flags & COAP_SOCKET_BOUND);
2404
2405 /* Need to do this as there may be holes in addr_info */
2406 memset(&packet->addr_info, 0, sizeof(packet->addr_info));
2407 packet->length = sizeof(payload);
2408 packet->payload = payload;
2410 coap_address_copy(&packet->addr_info.local, &endpoint->bind_addr);
2411
2412 bytes_read = coap_netif_dgrm_read_ep(endpoint, packet);
2413 if (bytes_read < 0) {
2414 if (errno != EAGAIN) {
2415 coap_log_warn("* %s: read failed\n", coap_endpoint_str(endpoint));
2416 }
2417 } else if (bytes_read > 0) {
2418 coap_session_t *session = coap_endpoint_get_session(endpoint, packet, now);
2419 if (session) {
2420 coap_log_debug("* %s: netif: recv %4zd bytes\n",
2421 coap_session_str(session), bytes_read);
2422 result = coap_handle_dgram_for_proto(ctx, session, packet);
2423 if (endpoint->proto == COAP_PROTO_DTLS && session->type == COAP_SESSION_TYPE_HELLO && result == 1)
2424 coap_session_new_dtls_session(session, now);
2425 }
2426 }
2427 return result;
2428}
2429
2430static int
2431coap_write_endpoint(coap_context_t *ctx, coap_endpoint_t *endpoint, coap_tick_t now) {
2432 (void)ctx;
2433 (void)endpoint;
2434 (void)now;
2435 return 0;
2436}
2437
2438#if !COAP_DISABLE_TCP
2439static int
2440coap_accept_endpoint(coap_context_t *ctx, coap_endpoint_t *endpoint,
2441 coap_tick_t now, void *extra) {
2442 coap_session_t *session = coap_new_server_session(ctx, endpoint, extra);
2443 if (session)
2444 session->last_rx_tx = now;
2445 return session != NULL;
2446}
2447#endif /* !COAP_DISABLE_TCP */
2448#endif /* COAP_SERVER_SUPPORT */
2449
2450COAP_API void
2452 coap_lock_lock(ctx, return);
2453 coap_io_do_io_lkd(ctx, now);
2454 coap_lock_unlock(ctx);
2455}
2456
2457void
2459#ifdef COAP_EPOLL_SUPPORT
2460 (void)ctx;
2461 (void)now;
2462 coap_log_emerg("coap_io_do_io() requires libcoap not compiled for using epoll\n");
2463#else /* ! COAP_EPOLL_SUPPORT */
2464 coap_session_t *s, *rtmp;
2465
2467#if COAP_SERVER_SUPPORT
2468 coap_endpoint_t *ep, *tmp;
2469 LL_FOREACH_SAFE(ctx->endpoint, ep, tmp) {
2470 if ((ep->sock.flags & COAP_SOCKET_CAN_READ) != 0)
2471 coap_read_endpoint(ctx, ep, now);
2472 if ((ep->sock.flags & COAP_SOCKET_CAN_WRITE) != 0)
2473 coap_write_endpoint(ctx, ep, now);
2474#if !COAP_DISABLE_TCP
2475 if ((ep->sock.flags & COAP_SOCKET_CAN_ACCEPT) != 0)
2476 coap_accept_endpoint(ctx, ep, now, NULL);
2477#endif /* !COAP_DISABLE_TCP */
2478 SESSIONS_ITER_SAFE(ep->sessions, s, rtmp) {
2479 /* Make sure the session object is not deleted in one of the callbacks */
2481 if ((s->sock.flags & COAP_SOCKET_CAN_READ) != 0) {
2482 coap_read_session(ctx, s, now);
2483 }
2484 if ((s->sock.flags & COAP_SOCKET_CAN_WRITE) != 0) {
2485 coap_write_session(ctx, s, now);
2486 }
2488 }
2489 }
2490#endif /* COAP_SERVER_SUPPORT */
2491
2492#if COAP_CLIENT_SUPPORT
2493 SESSIONS_ITER_SAFE(ctx->sessions, s, rtmp) {
2494 /* Make sure the session object is not deleted in one of the callbacks */
2496 if ((s->sock.flags & COAP_SOCKET_CAN_CONNECT) != 0) {
2497 coap_connect_session(s, now);
2498 }
2499 if ((s->sock.flags & COAP_SOCKET_CAN_READ) != 0 && s->ref > 1) {
2500 coap_read_session(ctx, s, now);
2501 }
2502 if ((s->sock.flags & COAP_SOCKET_CAN_WRITE) != 0 && s->ref > 1) {
2503 coap_write_session(ctx, s, now);
2504 }
2506 }
2507#endif /* COAP_CLIENT_SUPPORT */
2508#endif /* ! COAP_EPOLL_SUPPORT */
2509}
2510
2511COAP_API void
2512coap_io_do_epoll(coap_context_t *ctx, struct epoll_event *events, size_t nevents) {
2513 coap_lock_lock(ctx, return);
2514 coap_io_do_epoll_lkd(ctx, events, nevents);
2515 coap_lock_unlock(ctx);
2516}
2517
2518/*
2519 * While this code in part replicates coap_io_do_io_lkd(), doing the functions
2520 * directly saves having to iterate through the endpoints / sessions.
2521 */
2522void
2523coap_io_do_epoll_lkd(coap_context_t *ctx, struct epoll_event *events, size_t nevents) {
2524#ifndef COAP_EPOLL_SUPPORT
2525 (void)ctx;
2526 (void)events;
2527 (void)nevents;
2528 coap_log_emerg("coap_io_do_epoll() requires libcoap compiled for using epoll\n");
2529#else /* COAP_EPOLL_SUPPORT */
2530 coap_tick_t now;
2531 size_t j;
2532
2534 coap_ticks(&now);
2535 for (j = 0; j < nevents; j++) {
2536 coap_socket_t *sock = (coap_socket_t *)events[j].data.ptr;
2537
2538 /* Ignore 'timer trigger' ptr which is NULL */
2539 if (sock) {
2540#if COAP_SERVER_SUPPORT
2541 if (sock->endpoint) {
2542 coap_endpoint_t *endpoint = sock->endpoint;
2543 if ((sock->flags & COAP_SOCKET_WANT_READ) &&
2544 (events[j].events & EPOLLIN)) {
2545 sock->flags |= COAP_SOCKET_CAN_READ;
2546 coap_read_endpoint(endpoint->context, endpoint, now);
2547 }
2548
2549 if ((sock->flags & COAP_SOCKET_WANT_WRITE) &&
2550 (events[j].events & EPOLLOUT)) {
2551 /*
2552 * Need to update this to EPOLLIN as EPOLLOUT will normally always
2553 * be true causing epoll_wait to return early
2554 */
2555 coap_epoll_ctl_mod(sock, EPOLLIN, __func__);
2557 coap_write_endpoint(endpoint->context, endpoint, now);
2558 }
2559
2560#if !COAP_DISABLE_TCP
2561 if ((sock->flags & COAP_SOCKET_WANT_ACCEPT) &&
2562 (events[j].events & EPOLLIN)) {
2564 coap_accept_endpoint(endpoint->context, endpoint, now, NULL);
2565 }
2566#endif /* !COAP_DISABLE_TCP */
2567
2568 } else
2569#endif /* COAP_SERVER_SUPPORT */
2570 if (sock->session) {
2571 coap_session_t *session = sock->session;
2572
2573 /* Make sure the session object is not deleted
2574 in one of the callbacks */
2576#if COAP_CLIENT_SUPPORT
2577 if ((sock->flags & COAP_SOCKET_WANT_CONNECT) &&
2578 (events[j].events & (EPOLLOUT|EPOLLERR|EPOLLHUP|EPOLLRDHUP))) {
2580 coap_connect_session(session, now);
2581 if (coap_netif_available(session) &&
2582 !(sock->flags & COAP_SOCKET_WANT_WRITE)) {
2583 coap_epoll_ctl_mod(sock, EPOLLIN, __func__);
2584 }
2585 }
2586#endif /* COAP_CLIENT_SUPPORT */
2587
2588 if ((sock->flags & COAP_SOCKET_WANT_READ) &&
2589 (events[j].events & (EPOLLIN|EPOLLERR|EPOLLHUP|EPOLLRDHUP))) {
2590 sock->flags |= COAP_SOCKET_CAN_READ;
2591 coap_read_session(session->context, session, now);
2592 }
2593
2594 if ((sock->flags & COAP_SOCKET_WANT_WRITE) &&
2595 (events[j].events & (EPOLLOUT|EPOLLERR|EPOLLHUP|EPOLLRDHUP))) {
2596 /*
2597 * Need to update this to EPOLLIN as EPOLLOUT will normally always
2598 * be true causing epoll_wait to return early
2599 */
2600 coap_epoll_ctl_mod(sock, EPOLLIN, __func__);
2602 coap_write_session(session->context, session, now);
2603 }
2604 /* Now dereference session so it can go away if needed */
2605 coap_session_release_lkd(session);
2606 }
2607 } else if (ctx->eptimerfd != -1) {
2608 /*
2609 * 'timer trigger' must have fired. eptimerfd needs to be read to clear
2610 * it so that it does not set EPOLLIN in the next epoll_wait().
2611 */
2612 uint64_t count;
2613
2614 /* Check the result from read() to suppress the warning on
2615 * systems that declare read() with warn_unused_result. */
2616 if (read(ctx->eptimerfd, &count, sizeof(count)) == -1) {
2617 /* do nothing */;
2618 }
2619 }
2620 }
2621 /* And update eptimerfd as to when to next trigger */
2622 coap_ticks(&now);
2623 coap_io_prepare_epoll_lkd(ctx, now);
2624#endif /* COAP_EPOLL_SUPPORT */
2625}
2626
2627int
2629 uint8_t *msg, size_t msg_len) {
2630
2631 coap_pdu_t *pdu = NULL;
2632
2633 assert(COAP_PROTO_NOT_RELIABLE(session->proto));
2634 if (msg_len < 4) {
2635 /* Minimum size of CoAP header - ignore runt */
2636 return -1;
2637 }
2638 if ((msg[0] >> 6) != COAP_DEFAULT_VERSION) {
2639 /*
2640 * As per https://datatracker.ietf.org/doc/html/rfc7252#section-3,
2641 * this MUST be silently ignored.
2642 */
2643 coap_log_debug("coap_handle_dgram: UDP version not supported\n");
2644 return -1;
2645 }
2646
2647 /* Need max space incase PDU is updated with updated token etc. */
2648 pdu = coap_pdu_init(0, 0, 0, coap_session_max_pdu_rcv_size(session));
2649 if (!pdu)
2650 goto error;
2651
2652 if (!coap_pdu_parse(session->proto, msg, msg_len, pdu)) {
2654 coap_log_warn("discard malformed PDU\n");
2655 goto error;
2656 }
2657
2658 coap_dispatch(ctx, session, pdu);
2659 coap_delete_pdu(pdu);
2660 return 0;
2661
2662error:
2663 /*
2664 * https://rfc-editor.org/rfc/rfc7252#section-4.2 MUST send RST
2665 * https://rfc-editor.org/rfc/rfc7252#section-4.3 MAY send RST
2666 */
2667 coap_send_rst_lkd(session, pdu);
2668 coap_delete_pdu(pdu);
2669 return -1;
2670}
2671
2672int
2674 coap_queue_t **node) {
2675 coap_queue_t *p, *q;
2676
2677 if (!queue || !*queue)
2678 return 0;
2679
2680 /* replace queue head if PDU's time is less than head's time */
2681
2682 if (session == (*queue)->session && id == (*queue)->id) { /* found message id */
2683 *node = *queue;
2684 *queue = (*queue)->next;
2685 if (*queue) { /* adjust relative time of new queue head */
2686 (*queue)->t += (*node)->t;
2687 }
2688 (*node)->next = NULL;
2689 coap_log_debug("** %s: mid=0x%04x: removed (1)\n",
2690 coap_session_str(session), id);
2691 return 1;
2692 }
2693
2694 /* search message id queue to remove (only first occurence will be removed) */
2695 q = *queue;
2696 do {
2697 p = q;
2698 q = q->next;
2699 } while (q && (session != q->session || id != q->id));
2700
2701 if (q) { /* found message id */
2702 p->next = q->next;
2703 if (p->next) { /* must update relative time of p->next */
2704 p->next->t += q->t;
2705 }
2706 q->next = NULL;
2707 *node = q;
2708 coap_log_debug("** %s: mid=0x%04x: removed (2)\n",
2709 coap_session_str(session), id);
2710 return 1;
2711 }
2712
2713 return 0;
2714
2715}
2716
2717void
2719 coap_nack_reason_t reason) {
2720 coap_queue_t *p, *q;
2721
2722 while (context->sendqueue && context->sendqueue->session == session) {
2723 q = context->sendqueue;
2724 context->sendqueue = q->next;
2725 coap_log_debug("** %s: mid=0x%04x: removed (3)\n",
2726 coap_session_str(session), q->id);
2727 if (q->pdu->type == COAP_MESSAGE_CON) {
2728 coap_handle_nack(session, q->pdu, reason, q->id);
2729 }
2731 }
2732
2733 if (!context->sendqueue)
2734 return;
2735
2736 p = context->sendqueue;
2737 q = p->next;
2738
2739 while (q) {
2740 if (q->session == session) {
2741 p->next = q->next;
2742 coap_log_debug("** %s: mid=0x%04x: removed (4)\n",
2743 coap_session_str(session), q->id);
2744 if (q->pdu->type == COAP_MESSAGE_CON) {
2745 coap_handle_nack(session, q->pdu, reason, q->id);
2746 }
2748 q = p->next;
2749 } else {
2750 p = q;
2751 q = q->next;
2752 }
2753 }
2754}
2755
2756void
2758 coap_bin_const_t *token) {
2759 /* cancel all messages in sendqueue that belong to session
2760 * and use the specified token */
2761 coap_queue_t **p, *q;
2762
2763 if (!context->sendqueue)
2764 return;
2765
2766 p = &context->sendqueue;
2767 q = *p;
2768
2769 while (q) {
2770 if (q->session == session &&
2771 coap_binary_equal(&q->pdu->actual_token, token)) {
2772 *p = q->next;
2773 coap_log_debug("** %s: mid=0x%04x: removed (6)\n",
2774 coap_session_str(session), q->id);
2775 if (q->pdu->type == COAP_MESSAGE_CON && session->con_active) {
2776 session->con_active--;
2777 if (session->state == COAP_SESSION_STATE_ESTABLISHED)
2778 /* Flush out any entries on session->delayqueue */
2779 coap_session_connected(session);
2780 }
2782 } else {
2783 p = &(q->next);
2784 }
2785 q = *p;
2786 }
2787}
2788
2789coap_pdu_t *
2791 coap_opt_filter_t *opts) {
2792 coap_opt_iterator_t opt_iter;
2793 coap_pdu_t *response;
2794 size_t size = request->e_token_length;
2795 unsigned char type;
2796 coap_opt_t *option;
2797 coap_option_num_t opt_num = 0; /* used for calculating delta-storage */
2798
2799#if COAP_ERROR_PHRASE_LENGTH > 0
2800 const char *phrase;
2801 if (code != COAP_RESPONSE_CODE(508)) {
2802 phrase = coap_response_phrase(code);
2803
2804 /* Need some more space for the error phrase and payload start marker */
2805 if (phrase)
2806 size += strlen(phrase) + 1;
2807 } else {
2808 /*
2809 * Need space for IP for 5.08 response which is filled in in
2810 * coap_send_internal()
2811 * https://rfc-editor.org/rfc/rfc8768.html#section-4
2812 */
2813 phrase = NULL;
2814 size += INET6_ADDRSTRLEN;
2815 }
2816#endif
2817
2818 assert(request);
2819
2820 /* cannot send ACK if original request was not confirmable */
2821 type = request->type == COAP_MESSAGE_CON ?
2823
2824 /* Estimate how much space we need for options to copy from
2825 * request. We always need the Token, for 4.02 the unknown critical
2826 * options must be included as well. */
2827
2828 /* we do not want these */
2831 /* Unsafe to send this back */
2833
2834 coap_option_iterator_init(request, &opt_iter, opts);
2835
2836 /* Add size of each unknown critical option. As known critical
2837 options as well as elective options are not copied, the delta
2838 value might grow.
2839 */
2840 while ((option = coap_option_next(&opt_iter))) {
2841 uint16_t delta = opt_iter.number - opt_num;
2842 /* calculate space required to encode (opt_iter.number - opt_num) */
2843 if (delta < 13) {
2844 size++;
2845 } else if (delta < 269) {
2846 size += 2;
2847 } else {
2848 size += 3;
2849 }
2850
2851 /* add coap_opt_length(option) and the number of additional bytes
2852 * required to encode the option length */
2853
2854 size += coap_opt_length(option);
2855 switch (*option & 0x0f) {
2856 case 0x0e:
2857 size++;
2858 /* fall through */
2859 case 0x0d:
2860 size++;
2861 break;
2862 default:
2863 ;
2864 }
2865
2866 opt_num = opt_iter.number;
2867 }
2868
2869 /* Now create the response and fill with options and payload data. */
2870 response = coap_pdu_init(type, code, request->mid, size);
2871 if (response) {
2872 /* copy token */
2873 if (!coap_add_token(response, request->actual_token.length,
2874 request->actual_token.s)) {
2875 coap_log_debug("cannot add token to error response\n");
2876 coap_delete_pdu(response);
2877 return NULL;
2878 }
2879
2880 /* copy all options */
2881 coap_option_iterator_init(request, &opt_iter, opts);
2882 while ((option = coap_option_next(&opt_iter))) {
2883 coap_add_option_internal(response, opt_iter.number,
2884 coap_opt_length(option),
2885 coap_opt_value(option));
2886 }
2887
2888#if COAP_ERROR_PHRASE_LENGTH > 0
2889 /* note that diagnostic messages do not need a Content-Format option. */
2890 if (phrase)
2891 coap_add_data(response, (size_t)strlen(phrase), (const uint8_t *)phrase);
2892#endif
2893 }
2894
2895 return response;
2896}
2897
2898#if COAP_SERVER_SUPPORT
2899#define SZX_TO_BYTES(SZX) ((size_t)(1 << ((SZX) + 4)))
2900
2901static void
2902free_wellknown_response(coap_session_t *session COAP_UNUSED, void *app_ptr) {
2903 coap_delete_string(app_ptr);
2904}
2905
2906/*
2907 * Caution: As this handler is in libcoap space, it is called with
2908 * context locked.
2909 */
2910static void
2911hnd_get_wellknown_lkd(coap_resource_t *resource,
2912 coap_session_t *session,
2913 const coap_pdu_t *request,
2914 const coap_string_t *query,
2915 coap_pdu_t *response) {
2916 size_t len = 0;
2917 coap_string_t *data_string = NULL;
2918 coap_print_status_t result = 0;
2919 size_t wkc_len = 0;
2920 uint8_t buf[4];
2921
2922 /*
2923 * Quick hack to determine the size of the resource descriptions for
2924 * .well-known/core.
2925 */
2926 result = coap_print_wellknown_lkd(session->context, buf, &wkc_len, UINT_MAX, query);
2927 if (result & COAP_PRINT_STATUS_ERROR) {
2928 coap_log_warn("cannot determine length of /.well-known/core\n");
2929 goto error;
2930 }
2931
2932 if (wkc_len > 0) {
2933 data_string = coap_new_string(wkc_len);
2934 if (!data_string)
2935 goto error;
2936
2937 len = wkc_len;
2938 result = coap_print_wellknown_lkd(session->context, data_string->s, &len, 0, query);
2939 if ((result & COAP_PRINT_STATUS_ERROR) != 0) {
2940 coap_log_debug("coap_print_wellknown failed\n");
2941 goto error;
2942 }
2943 assert(len <= (size_t)wkc_len);
2944 data_string->length = len;
2945
2946 if (!(session->block_mode & COAP_BLOCK_USE_LIBCOAP)) {
2948 coap_encode_var_safe(buf, sizeof(buf),
2950 goto error;
2951 }
2952 if (response->used_size + len + 1 > response->max_size) {
2953 /*
2954 * Data does not fit into a packet and no libcoap block support
2955 * +1 for end of options marker
2956 */
2957 coap_log_debug(".well-known/core: truncating data length to %zu from %zu\n",
2958 len, response->max_size - response->used_size - 1);
2959 len = response->max_size - response->used_size - 1;
2960 }
2961 if (!coap_add_data(response, len, data_string->s)) {
2962 goto error;
2963 }
2964 free_wellknown_response(session, data_string);
2965 } else if (!coap_add_data_large_response_lkd(resource, session, request,
2966 response, query,
2968 -1, 0, data_string->length,
2969 data_string->s,
2970 free_wellknown_response,
2971 data_string)) {
2972 goto error_released;
2973 }
2974 } else {
2976 coap_encode_var_safe(buf, sizeof(buf),
2978 goto error;
2979 }
2980 }
2981 response->code = COAP_RESPONSE_CODE(205);
2982 return;
2983
2984error:
2985 free_wellknown_response(session, data_string);
2986error_released:
2987 if (response->code == 0) {
2988 /* set error code 5.03 and remove all options and data from response */
2989 response->code = COAP_RESPONSE_CODE(503);
2990 response->used_size = response->e_token_length;
2991 response->data = NULL;
2992 }
2993}
2994#endif /* COAP_SERVER_SUPPORT */
2995
3006static int
3008 int num_cancelled = 0; /* the number of observers cancelled */
3009
3010#ifndef COAP_SERVER_SUPPORT
3011 (void)sent;
3012#endif /* ! COAP_SERVER_SUPPORT */
3013 (void)context;
3014
3015#if COAP_SERVER_SUPPORT
3016 /* remove observer for this resource, if any
3017 * Use token from sent and try to find a matching resource. Uh!
3018 */
3019 RESOURCES_ITER(context->resources, r) {
3020 coap_cancel_all_messages(context, sent->session, &sent->pdu->actual_token);
3021 num_cancelled += coap_delete_observer(r, sent->session, &sent->pdu->actual_token);
3022 }
3023#endif /* COAP_SERVER_SUPPORT */
3024
3025 return num_cancelled;
3026}
3027
3028#if COAP_SERVER_SUPPORT
3033enum respond_t { RESPONSE_DEFAULT, RESPONSE_DROP, RESPONSE_SEND };
3034
3035/*
3036 * Checks for No-Response option in given @p request and
3037 * returns @c RESPONSE_DROP if @p response should be suppressed
3038 * according to RFC 7967.
3039 *
3040 * If the response is a confirmable piggybacked response and RESPONSE_DROP,
3041 * change it to an empty ACK and @c RESPONSE_SEND so the client does not keep
3042 * on retrying.
3043 *
3044 * Checks if the response code is 0.00 and if either the session is reliable or
3045 * non-confirmable, @c RESPONSE_DROP is also returned.
3046 *
3047 * Multicast response checking is also carried out.
3048 *
3049 * NOTE: It is the responsibility of the application to determine whether
3050 * a delayed separate response should be sent as the original requesting packet
3051 * containing the No-Response option has long since gone.
3052 *
3053 * The value of the No-Response option is encoded as
3054 * follows:
3055 *
3056 * @verbatim
3057 * +-------+-----------------------+-----------------------------------+
3058 * | Value | Binary Representation | Description |
3059 * +-------+-----------------------+-----------------------------------+
3060 * | 0 | <empty> | Interested in all responses. |
3061 * +-------+-----------------------+-----------------------------------+
3062 * | 2 | 00000010 | Not interested in 2.xx responses. |
3063 * +-------+-----------------------+-----------------------------------+
3064 * | 8 | 00001000 | Not interested in 4.xx responses. |
3065 * +-------+-----------------------+-----------------------------------+
3066 * | 16 | 00010000 | Not interested in 5.xx responses. |
3067 * +-------+-----------------------+-----------------------------------+
3068 * @endverbatim
3069 *
3070 * @param request The CoAP request to check for the No-Response option.
3071 * This parameter must not be NULL.
3072 * @param response The response that is potentially suppressed.
3073 * This parameter must not be NULL.
3074 * @param session The session this request/response are associated with.
3075 * This parameter must not be NULL.
3076 * @return RESPONSE_DEFAULT when no special treatment is requested,
3077 * RESPONSE_DROP when the response must be discarded, or
3078 * RESPONSE_SEND when the response must be sent.
3079 */
3080static enum respond_t
3081no_response(coap_pdu_t *request, coap_pdu_t *response,
3082 coap_session_t *session, coap_resource_t *resource) {
3083 coap_opt_t *nores;
3084 coap_opt_iterator_t opt_iter;
3085 unsigned int val = 0;
3086
3087 assert(request);
3088 assert(response);
3089
3090 if (COAP_RESPONSE_CLASS(response->code) > 0) {
3091 nores = coap_check_option(request, COAP_OPTION_NORESPONSE, &opt_iter);
3092
3093 if (nores) {
3095
3096 /* The response should be dropped when the bit corresponding to
3097 * the response class is set (cf. table in function
3098 * documentation). When a No-Response option is present and the
3099 * bit is not set, the sender explicitly indicates interest in
3100 * this response. */
3101 if (((1 << (COAP_RESPONSE_CLASS(response->code) - 1)) & val) > 0) {
3102 /* Should be dropping the response */
3103 if (response->type == COAP_MESSAGE_ACK &&
3104 COAP_PROTO_NOT_RELIABLE(session->proto)) {
3105 /* Still need to ACK the request */
3106 response->code = 0;
3107 /* Remove token/data from piggybacked acknowledgment PDU */
3108 response->actual_token.length = 0;
3109 response->e_token_length = 0;
3110 response->used_size = 0;
3111 response->data = NULL;
3112 return RESPONSE_SEND;
3113 } else {
3114 return RESPONSE_DROP;
3115 }
3116 } else {
3117 /* True for mcast as well RFC7967 2.1 */
3118 return RESPONSE_SEND;
3119 }
3120 } else if (resource && session->context->mcast_per_resource &&
3121 coap_is_mcast(&session->addr_info.local)) {
3122 /* Handle any mcast suppression specifics if no NoResponse option */
3123 if ((resource->flags &
3125 COAP_RESPONSE_CLASS(response->code) == 2) {
3126 return RESPONSE_DROP;
3127 } else if ((resource->flags &
3129 response->code == COAP_RESPONSE_CODE(205)) {
3130 if (response->data == NULL)
3131 return RESPONSE_DROP;
3132 } else if ((resource->flags &
3134 COAP_RESPONSE_CLASS(response->code) == 4) {
3135 return RESPONSE_DROP;
3136 } else if ((resource->flags &
3138 COAP_RESPONSE_CLASS(response->code) == 5) {
3139 return RESPONSE_DROP;
3140 }
3141 }
3142 } else if (COAP_PDU_IS_EMPTY(response) &&
3143 (response->type == COAP_MESSAGE_NON ||
3144 COAP_PROTO_RELIABLE(session->proto))) {
3145 /* response is 0.00, and this is reliable or non-confirmable */
3146 return RESPONSE_DROP;
3147 }
3148
3149 /*
3150 * Do not send error responses for requests that were received via
3151 * IP multicast. RFC7252 8.1
3152 */
3153
3154 if (coap_is_mcast(&session->addr_info.local)) {
3155 if (request->type == COAP_MESSAGE_NON &&
3156 response->type == COAP_MESSAGE_RST)
3157 return RESPONSE_DROP;
3158
3159 if ((!resource || session->context->mcast_per_resource == 0) &&
3160 COAP_RESPONSE_CLASS(response->code) > 2)
3161 return RESPONSE_DROP;
3162 }
3163
3164 /* Default behavior applies when we are not dealing with a response
3165 * (class == 0) or the request did not contain a No-Response option.
3166 */
3167 return RESPONSE_DEFAULT;
3168}
3169
3170static coap_str_const_t coap_default_uri_wellknown = {
3172 (const uint8_t *)COAP_DEFAULT_URI_WELLKNOWN
3173};
3174
3175/* Initialized in coap_startup() */
3176static coap_resource_t resource_uri_wellknown;
3177
3178static void
3179handle_request(coap_context_t *context, coap_session_t *session, coap_pdu_t *pdu) {
3180 coap_method_handler_t h = NULL;
3181 coap_pdu_t *response = NULL;
3182 coap_opt_filter_t opt_filter;
3183 coap_resource_t *resource = NULL;
3184 /* The respond field indicates whether a response must be treated
3185 * specially due to a No-Response option that declares disinterest
3186 * or interest in a specific response class. DEFAULT indicates that
3187 * No-Response has not been specified. */
3188 enum respond_t respond = RESPONSE_DEFAULT;
3189 coap_opt_iterator_t opt_iter;
3190 coap_opt_t *opt;
3191 int is_proxy_uri = 0;
3192 int is_proxy_scheme = 0;
3193 int skip_hop_limit_check = 0;
3194 int resp = 0;
3195 int send_early_empty_ack = 0;
3196 coap_string_t *query = NULL;
3197 coap_opt_t *observe = NULL;
3198 coap_string_t *uri_path = NULL;
3199 int observe_action = COAP_OBSERVE_CANCEL;
3200 coap_block_b_t block;
3201 int added_block = 0;
3202 coap_lg_srcv_t *free_lg_srcv = NULL;
3203#if COAP_Q_BLOCK_SUPPORT
3204 int lg_xmit_ctrl = 0;
3205#endif /* COAP_Q_BLOCK_SUPPORT */
3206#if COAP_ASYNC_SUPPORT
3207 coap_async_t *async;
3208#endif /* COAP_ASYNC_SUPPORT */
3209
3210 if (coap_is_mcast(&session->addr_info.local)) {
3211 if (COAP_PROTO_RELIABLE(session->proto) || pdu->type != COAP_MESSAGE_NON) {
3212 coap_log_info("Invalid multicast packet received RFC7252 8.1\n");
3213 return;
3214 }
3215 }
3216#if COAP_ASYNC_SUPPORT
3217 async = coap_find_async_lkd(session, pdu->actual_token);
3218 if (async) {
3219 coap_tick_t now;
3220
3221 coap_ticks(&now);
3222 if (async->delay == 0 || async->delay > now) {
3223 /* re-transmit missing ACK (only if CON) */
3224 coap_log_info("Retransmit async response\n");
3225 coap_send_ack_lkd(session, pdu);
3226 /* and do not pass on to the upper layers */
3227 return;
3228 }
3229 }
3230#endif /* COAP_ASYNC_SUPPORT */
3231
3232 coap_option_filter_clear(&opt_filter);
3233 opt = coap_check_option(pdu, COAP_OPTION_PROXY_SCHEME, &opt_iter);
3234 if (opt) {
3235 opt = coap_check_option(pdu, COAP_OPTION_URI_HOST, &opt_iter);
3236 if (!opt) {
3237 coap_log_debug("Proxy-Scheme requires Uri-Host\n");
3238 resp = 402;
3239 goto fail_response;
3240 }
3241 is_proxy_scheme = 1;
3242 }
3243
3244 opt = coap_check_option(pdu, COAP_OPTION_PROXY_URI, &opt_iter);
3245 if (opt)
3246 is_proxy_uri = 1;
3247
3248 if (is_proxy_scheme || is_proxy_uri) {
3249 coap_uri_t uri;
3250
3251 if (!context->proxy_uri_resource) {
3252 /* Need to return a 5.05 RFC7252 Section 5.7.2 */
3253 coap_log_debug("Proxy-%s support not configured\n",
3254 is_proxy_scheme ? "Scheme" : "Uri");
3255 resp = 505;
3256 goto fail_response;
3257 }
3258 if (((size_t)pdu->code - 1 <
3259 (sizeof(resource->handler) / sizeof(resource->handler[0]))) &&
3260 !(context->proxy_uri_resource->handler[pdu->code - 1])) {
3261 /* Need to return a 5.05 RFC7252 Section 5.7.2 */
3262 coap_log_debug("Proxy-%s code %d.%02d handler not supported\n",
3263 is_proxy_scheme ? "Scheme" : "Uri",
3264 pdu->code/100, pdu->code%100);
3265 resp = 505;
3266 goto fail_response;
3267 }
3268
3269 /* Need to check if authority is the proxy endpoint RFC7252 Section 5.7.2 */
3270 if (is_proxy_uri) {
3272 coap_opt_length(opt), &uri) < 0) {
3273 /* Need to return a 5.05 RFC7252 Section 5.7.2 */
3274 coap_log_debug("Proxy-URI not decodable\n");
3275 resp = 505;
3276 goto fail_response;
3277 }
3278 } else {
3279 memset(&uri, 0, sizeof(uri));
3280 opt = coap_check_option(pdu, COAP_OPTION_URI_HOST, &opt_iter);
3281 if (opt) {
3282 uri.host.length = coap_opt_length(opt);
3283 uri.host.s = coap_opt_value(opt);
3284 } else
3285 uri.host.length = 0;
3286 }
3287
3288 resource = context->proxy_uri_resource;
3289 if (uri.host.length && resource->proxy_name_count &&
3290 resource->proxy_name_list) {
3291 size_t i;
3292
3293 if (resource->proxy_name_count == 1 &&
3294 resource->proxy_name_list[0]->length == 0) {
3295 /* If proxy_name_list[0] is zero length, then this is the endpoint */
3296 i = 0;
3297 } else {
3298 for (i = 0; i < resource->proxy_name_count; i++) {
3299 if (coap_string_equal(&uri.host, resource->proxy_name_list[i])) {
3300 break;
3301 }
3302 }
3303 }
3304 if (i != resource->proxy_name_count) {
3305 /* This server is hosting the proxy connection endpoint */
3306 if (pdu->crit_opt) {
3307 /* Cannot handle critical option */
3308 pdu->crit_opt = 0;
3309 resp = 402;
3310 goto fail_response;
3311 }
3312 is_proxy_uri = 0;
3313 is_proxy_scheme = 0;
3314 skip_hop_limit_check = 1;
3315 }
3316 }
3317 resource = NULL;
3318 }
3319
3320 if (!skip_hop_limit_check) {
3321 opt = coap_check_option(pdu, COAP_OPTION_HOP_LIMIT, &opt_iter);
3322 if (opt) {
3323 size_t hop_limit;
3324 uint8_t buf[4];
3325
3326 hop_limit =
3328 if (hop_limit == 1) {
3329 /* coap_send_internal() will fill in the IP address for us */
3330 resp = 508;
3331 goto fail_response;
3332 } else if (hop_limit < 1 || hop_limit > 255) {
3333 /* Need to return a 4.00 RFC8768 Section 3 */
3334 coap_log_info("Invalid Hop Limit\n");
3335 resp = 400;
3336 goto fail_response;
3337 }
3338 hop_limit--;
3340 coap_encode_var_safe8(buf, sizeof(buf), hop_limit),
3341 buf);
3342 }
3343 }
3344
3345 uri_path = coap_get_uri_path(pdu);
3346 if (!uri_path)
3347 return;
3348
3349 if (!is_proxy_uri && !is_proxy_scheme) {
3350 /* try to find the resource from the request URI */
3351 coap_str_const_t uri_path_c = { uri_path->length, uri_path->s };
3352 resource = coap_get_resource_from_uri_path_lkd(context, &uri_path_c);
3353 }
3354
3355 if ((resource == NULL) || (resource->is_unknown == 1) ||
3356 (resource->is_proxy_uri == 1)) {
3357 /* The resource was not found or there is an unexpected match against the
3358 * resource defined for handling unknown or proxy URIs.
3359 */
3360 if (resource != NULL)
3361 /* Close down unexpected match */
3362 resource = NULL;
3363 /*
3364 * Check if the request URI happens to be the well-known URI, or if the
3365 * unknown resource handler is defined, a PUT or optionally other methods,
3366 * if configured, for the unknown handler.
3367 *
3368 * if a PROXY URI/Scheme request and proxy URI handler defined, call the
3369 * proxy URI handler.
3370 *
3371 * else if unknown URI handler defined and COAP_RESOURCE_HANDLE_WELLKNOWN_CORE
3372 * set, call the unknown URI handler with any unknown URI (including
3373 * .well-known/core) if the appropriate method is defined.
3374 *
3375 * else if well-known URI generate a default response.
3376 *
3377 * else if unknown URI handler defined, call the unknown
3378 * URI handler (to allow for potential generation of resource
3379 * [RFC7272 5.8.3]) if the appropriate method is defined.
3380 *
3381 * else if DELETE return 2.02 (RFC7252: 5.8.4. DELETE).
3382 *
3383 * else return 4.04.
3384 */
3385
3386 if (is_proxy_uri || is_proxy_scheme) {
3387 resource = context->proxy_uri_resource;
3388 } else if (context->unknown_resource != NULL &&
3390 ((size_t)pdu->code - 1 <
3391 (sizeof(resource->handler) / sizeof(coap_method_handler_t))) &&
3392 (context->unknown_resource->handler[pdu->code - 1])) {
3393 resource = context->unknown_resource;
3394 } else if (coap_string_equal(uri_path, &coap_default_uri_wellknown)) {
3395 /* request for .well-known/core */
3396 resource = &resource_uri_wellknown;
3397 } else if ((context->unknown_resource != NULL) &&
3398 ((size_t)pdu->code - 1 <
3399 (sizeof(resource->handler) / sizeof(coap_method_handler_t))) &&
3400 (context->unknown_resource->handler[pdu->code - 1])) {
3401 /*
3402 * The unknown_resource can be used to handle undefined resources
3403 * for a PUT request and can support any other registered handler
3404 * defined for it
3405 * Example set up code:-
3406 * r = coap_resource_unknown_init(hnd_put_unknown);
3407 * coap_register_request_handler(r, COAP_REQUEST_POST,
3408 * hnd_post_unknown);
3409 * coap_register_request_handler(r, COAP_REQUEST_GET,
3410 * hnd_get_unknown);
3411 * coap_register_request_handler(r, COAP_REQUEST_DELETE,
3412 * hnd_delete_unknown);
3413 * coap_add_resource(ctx, r);
3414 *
3415 * Note: It is not possible to observe the unknown_resource, a separate
3416 * resource must be created (by PUT or POST) which has a GET
3417 * handler to be observed
3418 */
3419 resource = context->unknown_resource;
3420 } else if (pdu->code == COAP_REQUEST_CODE_DELETE) {
3421 /*
3422 * Request for DELETE on non-existant resource (RFC7252: 5.8.4. DELETE)
3423 */
3424 coap_log_debug("request for unknown resource '%*.*s',"
3425 " return 2.02\n",
3426 (int)uri_path->length,
3427 (int)uri_path->length,
3428 uri_path->s);
3429 resp = 202;
3430 goto fail_response;
3431 } else { /* request for any another resource, return 4.04 */
3432
3433 coap_log_debug("request for unknown resource '%*.*s', return 4.04\n",
3434 (int)uri_path->length, (int)uri_path->length, uri_path->s);
3435 resp = 404;
3436 goto fail_response;
3437 }
3438
3439 }
3440
3441#if COAP_OSCORE_SUPPORT
3442 if ((resource->flags & COAP_RESOURCE_FLAGS_OSCORE_ONLY) && !session->oscore_encryption) {
3443 coap_log_debug("request for OSCORE only resource '%*.*s', return 4.04\n",
3444 (int)uri_path->length, (int)uri_path->length, uri_path->s);
3445 resp = 401;
3446 goto fail_response;
3447 }
3448#endif /* COAP_OSCORE_SUPPORT */
3449 if (resource->is_unknown == 0 && resource->is_proxy_uri == 0) {
3450 /* Check for existing resource and If-Non-Match */
3451 opt = coap_check_option(pdu, COAP_OPTION_IF_NONE_MATCH, &opt_iter);
3452 if (opt) {
3453 resp = 412;
3454 goto fail_response;
3455 }
3456 }
3457
3458 /* the resource was found, check if there is a registered handler */
3459 if ((size_t)pdu->code - 1 <
3460 sizeof(resource->handler) / sizeof(coap_method_handler_t))
3461 h = resource->handler[pdu->code - 1];
3462
3463 if (h == NULL) {
3464 resp = 405;
3465 goto fail_response;
3466 }
3467 if (pdu->code == COAP_REQUEST_CODE_FETCH) {
3468 opt = coap_check_option(pdu, COAP_OPTION_CONTENT_FORMAT, &opt_iter);
3469 if (opt == NULL) {
3470 /* RFC 8132 2.3.1 */
3471 resp = 415;
3472 goto fail_response;
3473 }
3474 }
3475 if (context->mcast_per_resource &&
3476 (resource->flags & COAP_RESOURCE_FLAGS_HAS_MCAST_SUPPORT) == 0 &&
3477 coap_is_mcast(&session->addr_info.local)) {
3478 resp = 405;
3479 goto fail_response;
3480 }
3481
3482 response = coap_pdu_init(pdu->type == COAP_MESSAGE_CON ?
3484 0, pdu->mid, coap_session_max_pdu_size_lkd(session));
3485 if (!response) {
3486 coap_log_err("could not create response PDU\n");
3487 resp = 500;
3488 goto fail_response;
3489 }
3490 response->session = session;
3491#if COAP_ASYNC_SUPPORT
3492 /* If handling a separate response, need CON, not ACK response */
3493 if (async && pdu->type == COAP_MESSAGE_CON)
3494 response->type = COAP_MESSAGE_CON;
3495#endif /* COAP_ASYNC_SUPPORT */
3496 /* A lot of the reliable code assumes type is CON */
3497 if (COAP_PROTO_RELIABLE(session->proto) && response->type != COAP_MESSAGE_CON)
3498 response->type = COAP_MESSAGE_CON;
3499
3500 if (!coap_add_token(response, pdu->actual_token.length,
3501 pdu->actual_token.s)) {
3502 resp = 500;
3503 goto fail_response;
3504 }
3505
3506 query = coap_get_query(pdu);
3507
3508 /* check for Observe option RFC7641 and RFC8132 */
3509 if (resource->observable &&
3510 (pdu->code == COAP_REQUEST_CODE_GET ||
3511 pdu->code == COAP_REQUEST_CODE_FETCH)) {
3512 observe = coap_check_option(pdu, COAP_OPTION_OBSERVE, &opt_iter);
3513 }
3514
3515 /*
3516 * See if blocks need to be aggregated or next requests sent off
3517 * before invoking application request handler
3518 */
3519 if (session->block_mode & COAP_BLOCK_USE_LIBCOAP) {
3520 uint32_t block_mode = session->block_mode;
3521
3522 if (pdu->code == COAP_REQUEST_CODE_FETCH ||
3525 if (coap_handle_request_put_block(context, session, pdu, response,
3526 resource, uri_path, observe,
3527 &added_block, &free_lg_srcv)) {
3528 session->block_mode = block_mode;
3529 goto skip_handler;
3530 }
3531 session->block_mode = block_mode;
3532
3533 if (coap_handle_request_send_block(session, pdu, response, resource,
3534 query)) {
3535#if COAP_Q_BLOCK_SUPPORT
3536 lg_xmit_ctrl = 1;
3537#endif /* COAP_Q_BLOCK_SUPPORT */
3538 goto skip_handler;
3539 }
3540 }
3541
3542 if (observe) {
3543 observe_action =
3545 coap_opt_length(observe));
3546
3547 if (observe_action == COAP_OBSERVE_ESTABLISH) {
3548 coap_subscription_t *subscription;
3549
3550 if (coap_get_block_b(session, pdu, COAP_OPTION_BLOCK2, &block)) {
3551 if (block.num != 0) {
3552 response->code = COAP_RESPONSE_CODE(400);
3553 goto skip_handler;
3554 }
3555#if COAP_Q_BLOCK_SUPPORT
3556 } else if (coap_get_block_b(session, pdu, COAP_OPTION_Q_BLOCK2,
3557 &block)) {
3558 if (block.num != 0) {
3559 response->code = COAP_RESPONSE_CODE(400);
3560 goto skip_handler;
3561 }
3562#endif /* COAP_Q_BLOCK_SUPPORT */
3563 }
3564 subscription = coap_add_observer(resource, session, &pdu->actual_token,
3565 pdu);
3566 if (subscription) {
3567 uint8_t buf[4];
3568
3569 coap_touch_observer(context, session, &pdu->actual_token);
3571 coap_encode_var_safe(buf, sizeof(buf),
3572 resource->observe),
3573 buf);
3574 }
3575 } else if (observe_action == COAP_OBSERVE_CANCEL) {
3576 coap_delete_observer_request(resource, session, &pdu->actual_token, pdu);
3577 } else {
3578 coap_log_info("observe: unexpected action %d\n", observe_action);
3579 }
3580 }
3581
3582 /* TODO for non-proxy requests */
3583 if (resource == context->proxy_uri_resource &&
3584 COAP_PROTO_NOT_RELIABLE(session->proto) &&
3585 pdu->type == COAP_MESSAGE_CON) {
3586 /* Make the proxy response separate and fix response later */
3587 send_early_empty_ack = 1;
3588 }
3589 if (send_early_empty_ack) {
3590 coap_send_ack_lkd(session, pdu);
3591 if (pdu->mid == session->last_con_mid) {
3592 /* request has already been processed - do not process it again */
3593 coap_log_debug("Duplicate request with mid=0x%04x - not processed\n",
3594 pdu->mid);
3595 goto drop_it_no_debug;
3596 }
3597 session->last_con_mid = pdu->mid;
3598 }
3599#if COAP_WITH_OBSERVE_PERSIST
3600 /* If we are maintaining Observe persist */
3601 if (resource == context->unknown_resource) {
3602 context->unknown_pdu = pdu;
3603 context->unknown_session = session;
3604 } else
3605 context->unknown_pdu = NULL;
3606#endif /* COAP_WITH_OBSERVE_PERSIST */
3607
3608 /*
3609 * Call the request handler with everything set up
3610 */
3611 if (resource == &resource_uri_wellknown) {
3612 /* Leave context locked */
3613 coap_log_debug("call handler for pseudo resource '%*.*s' (3)\n",
3614 (int)resource->uri_path->length, (int)resource->uri_path->length,
3615 resource->uri_path->s);
3616 h(resource, session, pdu, query, response);
3617 } else {
3618 coap_log_debug("call custom handler for resource '%*.*s' (3)\n",
3619 (int)resource->uri_path->length, (int)resource->uri_path->length,
3620 resource->uri_path->s);
3622 h(resource, session, pdu, query, response),
3623 /* context is being freed off */
3624 goto finish);
3625 }
3626
3627 /* Check validity of response code */
3628 if (!coap_check_code_class(session, response)) {
3629 coap_log_warn("handle_request: Invalid PDU response code (%d.%02d)\n",
3630 COAP_RESPONSE_CLASS(response->code),
3631 response->code & 0x1f);
3632 goto drop_it_no_debug;
3633 }
3634
3635 /* Check if lg_xmit generated and update PDU code if so */
3636 coap_check_code_lg_xmit(session, pdu, response, resource, query);
3637
3638 if (free_lg_srcv) {
3639 /* Check to see if the server is doing a 4.01 + Echo response */
3640 if (response->code == COAP_RESPONSE_CODE(401) &&
3641 coap_check_option(response, COAP_OPTION_ECHO, &opt_iter)) {
3642 /* Need to keep lg_srcv around for client's response */
3643 } else {
3644 LL_DELETE(session->lg_srcv, free_lg_srcv);
3645 coap_block_delete_lg_srcv(session, free_lg_srcv);
3646 }
3647 }
3648 if (added_block && COAP_RESPONSE_CLASS(response->code) == 2) {
3649 /* Just in case, as there are more to go */
3650 response->code = COAP_RESPONSE_CODE(231);
3651 }
3652
3653skip_handler:
3654 if (send_early_empty_ack &&
3655 response->type == COAP_MESSAGE_ACK) {
3656 /* Response is now separate - convert to CON as needed */
3657 response->type = COAP_MESSAGE_CON;
3658 /* Check for empty ACK - need to drop as already sent */
3659 if (response->code == 0) {
3660 goto drop_it_no_debug;
3661 }
3662 }
3663 respond = no_response(pdu, response, session, resource);
3664 if (respond != RESPONSE_DROP) {
3665#if (COAP_MAX_LOGGING_LEVEL >= _COAP_LOG_DEBUG)
3666 coap_mid_t mid = pdu->mid;
3667#endif
3668 if (COAP_RESPONSE_CLASS(response->code) != 2) {
3669 if (observe) {
3671 }
3672 }
3673 if (COAP_RESPONSE_CLASS(response->code) > 2) {
3674 if (observe)
3675 coap_delete_observer(resource, session, &pdu->actual_token);
3676 if (response->code != COAP_RESPONSE_CODE(413))
3678 }
3679
3680 /* If original request contained a token, and the registered
3681 * application handler made no changes to the response, then
3682 * this is an empty ACK with a token, which is a malformed
3683 * PDU */
3684 if ((response->type == COAP_MESSAGE_ACK)
3685 && (response->code == 0)) {
3686 /* Remove token from otherwise-empty acknowledgment PDU */
3687 response->actual_token.length = 0;
3688 response->e_token_length = 0;
3689 response->used_size = 0;
3690 response->data = NULL;
3691 }
3692
3693 if (!coap_is_mcast(&session->addr_info.local) ||
3694 (context->mcast_per_resource &&
3695 resource &&
3697 /* No delays to response */
3698#if COAP_Q_BLOCK_SUPPORT
3699 if (session->block_mode & COAP_BLOCK_USE_LIBCOAP &&
3700 !lg_xmit_ctrl && response->code == COAP_RESPONSE_CODE(205) &&
3701 coap_get_block_b(session, response, COAP_OPTION_Q_BLOCK2, &block) &&
3702 block.m) {
3703 if (coap_send_q_block2(session, resource, query, pdu->code, block,
3704 response,
3705 COAP_SEND_INC_PDU) == COAP_INVALID_MID)
3706 coap_log_debug("cannot send response for mid=0x%x\n", mid);
3707 response = NULL;
3708 if (query)
3709 coap_delete_string(query);
3710 goto finish;
3711 }
3712#endif /* COAP_Q_BLOCK_SUPPORT */
3713 if (coap_send_internal(session, response) == COAP_INVALID_MID) {
3714 coap_log_debug("cannot send response for mid=0x%04x\n", mid);
3715 }
3716 } else {
3717 /* Need to delay mcast response */
3718 coap_queue_t *node = coap_new_node();
3719 uint8_t r;
3720 coap_tick_t delay;
3721
3722 if (!node) {
3723 coap_log_debug("mcast delay: insufficient memory\n");
3724 goto drop_it_no_debug;
3725 }
3726 if (!coap_pdu_encode_header(response, session->proto)) {
3728 goto drop_it_no_debug;
3729 }
3730
3731 node->id = response->mid;
3732 node->pdu = response;
3733 node->is_mcast = 1;
3734 coap_prng_lkd(&r, sizeof(r));
3735 delay = (COAP_DEFAULT_LEISURE_TICKS(session) * r) / 256;
3736 coap_log_debug(" %s: mid=0x%04x: mcast response delayed for %u.%03u secs\n",
3737 coap_session_str(session),
3738 response->mid,
3739 (unsigned int)(delay / COAP_TICKS_PER_SECOND),
3740 (unsigned int)((delay % COAP_TICKS_PER_SECOND) *
3741 1000 / COAP_TICKS_PER_SECOND));
3742 node->timeout = (unsigned int)delay;
3743 /* Use this to delay transmission */
3744 coap_wait_ack(session->context, session, node);
3745 }
3746 } else {
3747 coap_log_debug(" %s: mid=0x%04x: response dropped\n",
3748 coap_session_str(session),
3749 response->mid);
3750 coap_show_pdu(COAP_LOG_DEBUG, response);
3751drop_it_no_debug:
3752 coap_delete_pdu(response);
3753 }
3754 if (query)
3755 coap_delete_string(query);
3756#if COAP_Q_BLOCK_SUPPORT
3757 if (coap_get_block_b(session, pdu, COAP_OPTION_Q_BLOCK1, &block)) {
3758 if (COAP_PROTO_RELIABLE(session->proto)) {
3759 if (block.m) {
3760 /* All of the sequence not in yet */
3761 goto finish;
3762 }
3763 } else if (pdu->type == COAP_MESSAGE_NON) {
3764 /* More to go and not at a payload break */
3765 if (block.m && ((block.num + 1) % COAP_MAX_PAYLOADS(session))) {
3766 goto finish;
3767 }
3768 }
3769 }
3770#endif /* COAP_Q_BLOCK_SUPPORT */
3771
3772#if COAP_Q_BLOCK_SUPPORT || COAP_THREAD_SAFE
3773finish:
3774#endif /* COAP_Q_BLOCK_SUPPORT || COAP_THREAD_SAFE */
3775 coap_delete_string(uri_path);
3776 return;
3777
3778fail_response:
3779 coap_delete_pdu(response);
3780 response =
3782 &opt_filter);
3783 if (response)
3784 goto skip_handler;
3785 coap_delete_string(uri_path);
3786}
3787#endif /* COAP_SERVER_SUPPORT */
3788
3789#if COAP_CLIENT_SUPPORT
3790static void
3791handle_response(coap_context_t *context, coap_session_t *session,
3792 coap_pdu_t *sent, coap_pdu_t *rcvd) {
3793
3794 /* Set in case there is a later call to coap_update_token() */
3795 rcvd->session = session;
3796
3797 /* In a lossy context, the ACK of a separate response may have
3798 * been lost, so we need to stop retransmitting requests with the
3799 * same token. Matching on token potentially containing ext length bytes.
3800 */
3801 if (rcvd->type != COAP_MESSAGE_ACK)
3802 coap_cancel_all_messages(context, session, &rcvd->actual_token);
3803
3804 /* Check for message duplication */
3805 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
3806 if (rcvd->type == COAP_MESSAGE_CON) {
3807 if (rcvd->mid == session->last_con_mid) {
3808 /* Duplicate response: send ACK/RST, but don't process */
3809 if (session->last_con_handler_res == COAP_RESPONSE_OK)
3810 coap_send_ack_lkd(session, rcvd);
3811 else
3812 coap_send_rst_lkd(session, rcvd);
3813 return;
3814 }
3815 session->last_con_mid = rcvd->mid;
3816 } else if (rcvd->type == COAP_MESSAGE_ACK) {
3817 if (rcvd->mid == session->last_ack_mid) {
3818 /* Duplicate response */
3819 return;
3820 }
3821 session->last_ack_mid = rcvd->mid;
3822 }
3823 }
3824 /* Check to see if checking out extended token support */
3825 if (session->max_token_checked == COAP_EXT_T_CHECKING &&
3826 session->remote_test_mid == rcvd->mid) {
3827
3828 if (rcvd->actual_token.length != session->max_token_size ||
3829 rcvd->code == COAP_RESPONSE_CODE(400) ||
3830 rcvd->code == COAP_RESPONSE_CODE(503)) {
3831 coap_log_debug("Extended Token requested size support not available\n");
3833 } else {
3834 coap_log_debug("Extended Token support available\n");
3835 }
3837 session->doing_first = 0;
3838 return;
3839 }
3840#if COAP_Q_BLOCK_SUPPORT
3841 /* Check to see if checking out Q-Block support */
3842 if (session->block_mode & COAP_BLOCK_PROBE_Q_BLOCK &&
3843 session->remote_test_mid == rcvd->mid) {
3844 if (rcvd->code == COAP_RESPONSE_CODE(402)) {
3845 coap_log_debug("Q-Block support not available\n");
3846 set_block_mode_drop_q(session->block_mode);
3847 } else {
3848 coap_block_b_t qblock;
3849
3850 if (coap_get_block_b(session, rcvd, COAP_OPTION_Q_BLOCK2, &qblock)) {
3851 coap_log_debug("Q-Block support available\n");
3852 set_block_mode_has_q(session->block_mode);
3853 } else {
3854 coap_log_debug("Q-Block support not available\n");
3855 set_block_mode_drop_q(session->block_mode);
3856 }
3857 }
3858 session->doing_first = 0;
3859 return;
3860 }
3861#endif /* COAP_Q_BLOCK_SUPPORT */
3862
3863 if (session->block_mode & COAP_BLOCK_USE_LIBCOAP) {
3864 /* See if need to send next block to server */
3865 if (coap_handle_response_send_block(session, sent, rcvd)) {
3866 /* Next block transmitted, no need to inform app */
3867 coap_send_ack_lkd(session, rcvd);
3868 return;
3869 }
3870
3871 /* Need to see if needing to request next block */
3872 if (coap_handle_response_get_block(context, session, sent, rcvd,
3873 COAP_RECURSE_OK)) {
3874 /* Next block transmitted, ack sent no need to inform app */
3875 return;
3876 }
3877 }
3878 if (session->doing_first)
3879 session->doing_first = 0;
3880
3881 /* Call application-specific response handler when available. */
3882 if (session->doing_send_recv && session->req_token &&
3883 coap_binary_equal(session->req_token, &rcvd->actual_token)) {
3884 /* processing coap_send_recv() call */
3885 session->resp_pdu = rcvd;
3886 rcvd->ref++;
3887 coap_send_ack_lkd(session, rcvd);
3889 } else if (context->response_handler) {
3890 coap_response_t ret;
3891
3892 coap_lock_callback_ret_release(ret, context,
3893 context->response_handler(session, sent, rcvd,
3894 rcvd->mid),
3895 /* context is being freed off */
3896 return);
3897 if (ret == COAP_RESPONSE_FAIL && rcvd->type != COAP_MESSAGE_ACK) {
3898 coap_send_rst_lkd(session, rcvd);
3900 } else {
3901 coap_send_ack_lkd(session, rcvd);
3903 }
3904 } else {
3905 coap_send_ack_lkd(session, rcvd);
3907 }
3908}
3909#endif /* COAP_CLIENT_SUPPORT */
3910
3911#if !COAP_DISABLE_TCP
3912static void
3914 coap_pdu_t *pdu) {
3915 coap_opt_iterator_t opt_iter;
3916 coap_opt_t *option;
3917 int set_mtu = 0;
3918
3919 coap_option_iterator_init(pdu, &opt_iter, COAP_OPT_ALL);
3920
3921 if (pdu->code == COAP_SIGNALING_CODE_CSM) {
3922 if (session->csm_not_seen) {
3923 coap_tick_t now;
3924
3925 coap_ticks(&now);
3926 /* CSM timeout before CSM seen */
3927 coap_log_warn("***%s: CSM received after CSM timeout\n",
3928 coap_session_str(session));
3929 coap_log_warn("***%s: Increase timeout in coap_context_set_csm_timeout_ms() to > %d\n",
3930 coap_session_str(session),
3931 (int)(((now - session->csm_tx) * 1000) / COAP_TICKS_PER_SECOND));
3932 }
3933 if (session->max_token_checked == COAP_EXT_T_NOT_CHECKED) {
3935 }
3936 while ((option = coap_option_next(&opt_iter))) {
3939 coap_opt_length(option)));
3940 set_mtu = 1;
3941 } else if (opt_iter.number == COAP_SIGNALING_OPTION_BLOCK_WISE_TRANSFER) {
3942 session->csm_block_supported = 1;
3943 } else if (opt_iter.number == COAP_SIGNALING_OPTION_EXTENDED_TOKEN_LENGTH) {
3944 session->max_token_size =
3946 coap_opt_length(option));
3949 else if (session->max_token_size > COAP_TOKEN_EXT_MAX)
3952 }
3953 }
3954 if (set_mtu) {
3955 if (session->mtu > COAP_BERT_BASE && session->csm_block_supported)
3956 session->csm_bert_rem_support = 1;
3957 else
3958 session->csm_bert_rem_support = 0;
3959 }
3960 if (session->state == COAP_SESSION_STATE_CSM)
3961 coap_session_connected(session);
3962 } else if (pdu->code == COAP_SIGNALING_CODE_PING) {
3964 if (context->ping_handler) {
3965 coap_lock_callback(context,
3966 context->ping_handler(session, pdu, pdu->mid));
3967 }
3968 if (pong) {
3970 coap_send_internal(session, pong);
3971 }
3972 } else if (pdu->code == COAP_SIGNALING_CODE_PONG) {
3973 session->last_pong = session->last_rx_tx;
3974 if (context->pong_handler) {
3975 coap_lock_callback(context,
3976 context->pong_handler(session, pdu, pdu->mid));
3977 }
3978 } else if (pdu->code == COAP_SIGNALING_CODE_RELEASE
3979 || pdu->code == COAP_SIGNALING_CODE_ABORT) {
3981 }
3982}
3983#endif /* !COAP_DISABLE_TCP */
3984
3985static int
3987 if (COAP_PDU_IS_REQUEST(pdu) &&
3988 pdu->actual_token.length >
3989 (session->type == COAP_SESSION_TYPE_CLIENT ?
3990 session->max_token_size : session->context->max_token_size)) {
3991 /* https://rfc-editor.org/rfc/rfc8974#section-2.2.2 */
3992 if (session->max_token_size > COAP_TOKEN_DEFAULT_MAX) {
3993 coap_opt_filter_t opt_filter;
3994 coap_pdu_t *response;
3995
3996 memset(&opt_filter, 0, sizeof(coap_opt_filter_t));
3997 response = coap_new_error_response(pdu, COAP_RESPONSE_CODE(400),
3998 &opt_filter);
3999 if (!response) {
4000 coap_log_warn("coap_dispatch: cannot create error response\n");
4001 } else {
4002 /*
4003 * Note - have to leave in oversize token as per
4004 * https://rfc-editor.org/rfc/rfc7252#section-5.3.1
4005 */
4006 if (coap_send_internal(session, response) == COAP_INVALID_MID)
4007 coap_log_warn("coap_dispatch: error sending response\n");
4008 }
4009 } else {
4010 /* Indicate no extended token support */
4011 coap_send_rst_lkd(session, pdu);
4012 }
4013 return 0;
4014 }
4015 return 1;
4016}
4017
4018void
4020 coap_pdu_t *pdu) {
4021 coap_queue_t *sent = NULL;
4022 coap_pdu_t *response;
4023 coap_opt_filter_t opt_filter;
4024 int is_ping_rst;
4025 int packet_is_bad = 0;
4026#if COAP_OSCORE_SUPPORT
4027 coap_opt_iterator_t opt_iter;
4028 coap_pdu_t *dec_pdu = NULL;
4029#endif /* COAP_OSCORE_SUPPORT */
4030 int is_ext_token_rst;
4031
4032 pdu->session = session;
4034
4035 /* Check validity of received code */
4036 if (!coap_check_code_class(session, pdu)) {
4037 coap_log_info("coap_dispatch: Received invalid PDU code (%d.%02d)\n",
4039 pdu->code & 0x1f);
4040 packet_is_bad = 1;
4041 if (pdu->type == COAP_MESSAGE_CON) {
4043 }
4044 /* find message id in sendqueue to stop retransmission */
4045 coap_remove_from_queue(&context->sendqueue, session, pdu->mid, &sent);
4046 goto cleanup;
4047 }
4048
4049 coap_option_filter_clear(&opt_filter);
4050
4051#if COAP_OSCORE_SUPPORT
4052 if (!COAP_PDU_IS_SIGNALING(pdu) &&
4053 coap_option_check_critical(session, pdu, &opt_filter) == 0) {
4054 if (pdu->type == COAP_MESSAGE_NON) {
4055 coap_send_rst_lkd(session, pdu);
4056 goto cleanup;
4057 } else if (pdu->type == COAP_MESSAGE_CON) {
4058 if (COAP_PDU_IS_REQUEST(pdu)) {
4059 response =
4060 coap_new_error_response(pdu, COAP_RESPONSE_CODE(402), &opt_filter);
4061
4062 if (!response) {
4063 coap_log_warn("coap_dispatch: cannot create error response\n");
4064 } else {
4065 if (coap_send_internal(session, response) == COAP_INVALID_MID)
4066 coap_log_warn("coap_dispatch: error sending response\n");
4067 }
4068 } else {
4069 coap_send_rst_lkd(session, pdu);
4070 }
4071 }
4072 goto cleanup;
4073 }
4074
4075 if (coap_check_option(pdu, COAP_OPTION_OSCORE, &opt_iter) != NULL) {
4076 int decrypt = 1;
4077#if COAP_SERVER_SUPPORT
4078 coap_opt_t *opt;
4079 coap_resource_t *resource;
4080 coap_uri_t uri;
4081#endif /* COAP_SERVER_SUPPORT */
4082
4083 if (COAP_PDU_IS_RESPONSE(pdu) && !session->oscore_encryption)
4084 decrypt = 0;
4085
4086#if COAP_SERVER_SUPPORT
4087 if (decrypt && COAP_PDU_IS_REQUEST(pdu) &&
4088 coap_check_option(pdu, COAP_OPTION_PROXY_SCHEME, &opt_iter) != NULL &&
4089 (opt = coap_check_option(pdu, COAP_OPTION_URI_HOST, &opt_iter))
4090 != NULL) {
4091 /* Need to check whether this is a direct or proxy session */
4092 memset(&uri, 0, sizeof(uri));
4093 uri.host.length = coap_opt_length(opt);
4094 uri.host.s = coap_opt_value(opt);
4095 resource = context->proxy_uri_resource;
4096 if (uri.host.length && resource && resource->proxy_name_count &&
4097 resource->proxy_name_list) {
4098 size_t i;
4099 for (i = 0; i < resource->proxy_name_count; i++) {
4100 if (coap_string_equal(&uri.host, resource->proxy_name_list[i])) {
4101 break;
4102 }
4103 }
4104 if (i == resource->proxy_name_count) {
4105 /* This server is not hosting the proxy connection endpoint */
4106 decrypt = 0;
4107 }
4108 }
4109 }
4110#endif /* COAP_SERVER_SUPPORT */
4111 if (decrypt) {
4112 /* find message id in sendqueue to stop retransmission and get sent */
4113 coap_remove_from_queue(&context->sendqueue, session, pdu->mid, &sent);
4114 if ((dec_pdu = coap_oscore_decrypt_pdu(session, pdu)) == NULL) {
4115 if (session->recipient_ctx == NULL ||
4116 session->recipient_ctx->initial_state == 0) {
4117 coap_log_warn("OSCORE: PDU could not be decrypted\n");
4118 }
4120 return;
4121 } else {
4122 session->oscore_encryption = 1;
4123 pdu = dec_pdu;
4124 }
4125 coap_log_debug("Decrypted PDU\n");
4127 }
4128 }
4129#endif /* COAP_OSCORE_SUPPORT */
4130
4131 switch (pdu->type) {
4132 case COAP_MESSAGE_ACK:
4133 /* find message id in sendqueue to stop retransmission */
4134 coap_remove_from_queue(&context->sendqueue, session, pdu->mid, &sent);
4135
4136 if (sent && session->con_active) {
4137 session->con_active--;
4138 if (session->state == COAP_SESSION_STATE_ESTABLISHED)
4139 /* Flush out any entries on session->delayqueue */
4140 coap_session_connected(session);
4141 }
4142 if (coap_option_check_critical(session, pdu, &opt_filter) == 0) {
4143 packet_is_bad = 1;
4144 goto cleanup;
4145 }
4146
4147#if COAP_SERVER_SUPPORT
4148 /* if sent code was >= 64 the message might have been a
4149 * notification. Then, we must flag the observer to be alive
4150 * by setting obs->fail_cnt = 0. */
4151 if (sent && COAP_RESPONSE_CLASS(sent->pdu->code) == 2) {
4152 coap_touch_observer(context, sent->session, &sent->pdu->actual_token);
4153 }
4154#endif /* COAP_SERVER_SUPPORT */
4155
4156 if (pdu->code == 0) {
4157#if COAP_Q_BLOCK_SUPPORT
4158 if (sent) {
4159 coap_block_b_t block;
4160
4161 if (sent->pdu->type == COAP_MESSAGE_CON &&
4162 COAP_PROTO_NOT_RELIABLE(session->proto) &&
4163 coap_get_block_b(session, sent->pdu,
4164 COAP_PDU_IS_REQUEST(sent->pdu) ?
4166 &block)) {
4167 if (block.m) {
4168#if COAP_CLIENT_SUPPORT
4169 if (COAP_PDU_IS_REQUEST(sent->pdu))
4170 coap_send_q_block1(session, block, sent->pdu,
4171 COAP_SEND_SKIP_PDU);
4172#endif /* COAP_CLIENT_SUPPORT */
4173 if (COAP_PDU_IS_RESPONSE(sent->pdu))
4174 coap_send_q_blocks(session, sent->pdu->lg_xmit, block,
4175 sent->pdu, COAP_SEND_SKIP_PDU);
4176 }
4177 }
4178 }
4179#endif /* COAP_Q_BLOCK_SUPPORT */
4180#if COAP_CLIENT_SUPPORT
4181 /*
4182 * In coap_send(), lg_crcv was not set up if type is CON and protocol is not
4183 * reliable to save overhead as this can be set up on detection of a (Q)-Block2
4184 * response if the response was piggy-backed. Here, a separate response
4185 * detected and so the lg_crcv needs to be set up before the sent PDU
4186 * information is lost.
4187 *
4188 * lg_crcv was not set up if not a CoAP request or if DELETE.
4189 *
4190 * lg_crcv was always set up in coap_send() if Observe, Oscore and (Q)-Block1
4191 * options.
4192 */
4193 if (sent &&
4194 !coap_check_send_need_lg_crcv(session, pdu) &&
4195 COAP_PDU_IS_REQUEST(sent->pdu)) {
4196 /*
4197 * lg_crcv was not set up in coap_send(). It could have been set up
4198 * the first separate response.
4199 * See if there already is a lg_crcv set up.
4200 */
4201 coap_lg_crcv_t *lg_crcv;
4202 uint64_t token_match =
4204 sent->pdu->actual_token.length));
4205
4206 LL_FOREACH(session->lg_crcv, lg_crcv) {
4207 if (token_match == STATE_TOKEN_BASE(lg_crcv->state_token) ||
4208 coap_binary_equal(&sent->pdu->actual_token, lg_crcv->app_token)) {
4209 break;
4210 }
4211 }
4212 if (!lg_crcv) {
4213 /*
4214 * Need to set up a lg_crcv as it was not set up in coap_send()
4215 * to save time, but server has not sent back a piggy-back response.
4216 */
4217 lg_crcv = coap_block_new_lg_crcv(session, sent->pdu, NULL);
4218 if (lg_crcv) {
4219 LL_PREPEND(session->lg_crcv, lg_crcv);
4220 }
4221 }
4222 }
4223#endif /* COAP_CLIENT_SUPPORT */
4224 /* an empty ACK needs no further handling */
4225 goto cleanup;
4226 } else if (COAP_PDU_IS_REQUEST(pdu)) {
4227 /* This is not legitimate - Request using ACK - ignore */
4228 coap_log_debug("dropped ACK with request code (%d.%02d)\n",
4230 pdu->code & 0x1f);
4231 packet_is_bad = 1;
4232 goto cleanup;
4233 }
4234
4235 break;
4236
4237 case COAP_MESSAGE_RST:
4238 /* We have sent something the receiver disliked, so we remove
4239 * not only the message id but also the subscriptions we might
4240 * have. */
4241 is_ping_rst = 0;
4242 if (pdu->mid == session->last_ping_mid &&
4243 context->ping_timeout && session->last_ping > 0)
4244 is_ping_rst = 1;
4245
4246#if COAP_Q_BLOCK_SUPPORT
4247 /* Check to see if checking out Q-Block support */
4248 if (session->block_mode & COAP_BLOCK_PROBE_Q_BLOCK &&
4249 session->remote_test_mid == pdu->mid) {
4250 coap_log_debug("Q-Block support not available\n");
4251 set_block_mode_drop_q(session->block_mode);
4252 }
4253#endif /* COAP_Q_BLOCK_SUPPORT */
4254
4255 /* Check to see if checking out extended token support */
4256 is_ext_token_rst = 0;
4257 if (session->max_token_checked == COAP_EXT_T_CHECKING &&
4258 session->remote_test_mid == pdu->mid) {
4259 coap_log_debug("Extended Token support not available\n");
4262 session->doing_first = 0;
4263 is_ext_token_rst = 1;
4264 }
4265
4266 if (!is_ping_rst && !is_ext_token_rst)
4267 coap_log_alert("got RST for mid=0x%04x\n", pdu->mid);
4268
4269 if (session->con_active) {
4270 session->con_active--;
4271 if (session->state == COAP_SESSION_STATE_ESTABLISHED)
4272 /* Flush out any entries on session->delayqueue */
4273 coap_session_connected(session);
4274 }
4275
4276 /* find message id in sendqueue to stop retransmission */
4277 coap_remove_from_queue(&context->sendqueue, session, pdu->mid, &sent);
4278
4279 if (sent) {
4280 coap_cancel(context, sent);
4281
4282 if (!is_ping_rst && !is_ext_token_rst) {
4283 if (sent->pdu->type==COAP_MESSAGE_CON) {
4284 coap_handle_nack(sent->session, sent->pdu, COAP_NACK_RST, sent->id);
4285 }
4286 } else if (is_ping_rst) {
4287 if (context->pong_handler) {
4288 coap_lock_callback(context,
4289 context->pong_handler(session, pdu, pdu->mid));
4290 }
4291 session->last_pong = session->last_rx_tx;
4293 }
4294 } else {
4295#if COAP_SERVER_SUPPORT
4296 /* Need to check is there is a subscription active and delete it */
4297 RESOURCES_ITER(context->resources, r) {
4298 coap_subscription_t *obs, *tmp;
4299 LL_FOREACH_SAFE(r->subscribers, obs, tmp) {
4300 if (obs->pdu->mid == pdu->mid && obs->session == session) {
4301 /* Need to do this now as session may get de-referenced */
4303 coap_delete_observer(r, session, &obs->pdu->actual_token);
4304 coap_handle_nack(session, NULL, COAP_NACK_RST, pdu->mid);
4305 coap_session_release_lkd(session);
4306 goto cleanup;
4307 }
4308 }
4309 }
4310#endif /* COAP_SERVER_SUPPORT */
4311 coap_handle_nack(session, NULL, COAP_NACK_RST, pdu->mid);
4312 }
4313 goto cleanup;
4314
4315 case COAP_MESSAGE_NON:
4316 /* find transaction in sendqueue in case large response */
4317 coap_remove_from_queue(&context->sendqueue, session, pdu->mid, &sent);
4318 /* check for unknown critical options */
4319 if (coap_option_check_critical(session, pdu, &opt_filter) == 0) {
4320 packet_is_bad = 1;
4321 coap_send_rst_lkd(session, pdu);
4322 goto cleanup;
4323 }
4324 if (!check_token_size(session, pdu)) {
4325 goto cleanup;
4326 }
4327 break;
4328
4329 case COAP_MESSAGE_CON: /* check for unknown critical options */
4330 if (!COAP_PDU_IS_SIGNALING(pdu) &&
4331 coap_option_check_critical(session, pdu, &opt_filter) == 0) {
4332 packet_is_bad = 1;
4333 if (COAP_PDU_IS_REQUEST(pdu)) {
4334 response =
4335 coap_new_error_response(pdu, COAP_RESPONSE_CODE(402), &opt_filter);
4336
4337 if (!response) {
4338 coap_log_warn("coap_dispatch: cannot create error response\n");
4339 } else {
4340 if (coap_send_internal(session, response) == COAP_INVALID_MID)
4341 coap_log_warn("coap_dispatch: error sending response\n");
4342 }
4343 } else {
4344 coap_send_rst_lkd(session, pdu);
4345 }
4346 goto cleanup;
4347 }
4348 if (!check_token_size(session, pdu)) {
4349 goto cleanup;
4350 }
4351 break;
4352 default:
4353 break;
4354 }
4355
4356 /* Pass message to upper layer if a specific handler was
4357 * registered for a request that should be handled locally. */
4358#if !COAP_DISABLE_TCP
4359 if (COAP_PDU_IS_SIGNALING(pdu))
4360 handle_signaling(context, session, pdu);
4361 else
4362#endif /* !COAP_DISABLE_TCP */
4363#if COAP_SERVER_SUPPORT
4364 if (COAP_PDU_IS_REQUEST(pdu))
4365 handle_request(context, session, pdu);
4366 else
4367#endif /* COAP_SERVER_SUPPORT */
4368#if COAP_CLIENT_SUPPORT
4369 if (COAP_PDU_IS_RESPONSE(pdu))
4370 handle_response(context, session, sent ? sent->pdu : NULL, pdu);
4371 else
4372#endif /* COAP_CLIENT_SUPPORT */
4373 {
4374 if (COAP_PDU_IS_EMPTY(pdu)) {
4375 if (context->ping_handler) {
4376 coap_lock_callback(context,
4377 context->ping_handler(session, pdu, pdu->mid));
4378 }
4379 } else {
4380 packet_is_bad = 1;
4381 }
4382 coap_log_debug("dropped message with invalid code (%d.%02d)\n",
4384 pdu->code & 0x1f);
4385
4386 if (!coap_is_mcast(&session->addr_info.local)) {
4387 if (COAP_PDU_IS_EMPTY(pdu)) {
4388 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
4389 coap_tick_t now;
4390 coap_ticks(&now);
4391 if (session->last_tx_rst + COAP_TICKS_PER_SECOND/4 < now) {
4393 session->last_tx_rst = now;
4394 }
4395 }
4396 } else {
4397 if (pdu->type == COAP_MESSAGE_CON)
4399 }
4400 }
4401 }
4402
4403cleanup:
4404 if (packet_is_bad) {
4405 if (sent) {
4406 coap_handle_nack(session, sent->pdu, COAP_NACK_BAD_RESPONSE, sent->id);
4407 } else {
4409 }
4410 }
4412#if COAP_OSCORE_SUPPORT
4413 coap_delete_pdu(dec_pdu);
4414#endif /* COAP_OSCORE_SUPPORT */
4415}
4416
4417#if COAP_MAX_LOGGING_LEVEL >= _COAP_LOG_DEBUG
4418static const char *
4420 switch (event) {
4422 return "COAP_EVENT_DTLS_CLOSED";
4424 return "COAP_EVENT_DTLS_CONNECTED";
4426 return "COAP_EVENT_DTLS_RENEGOTIATE";
4428 return "COAP_EVENT_DTLS_ERROR";
4430 return "COAP_EVENT_TCP_CONNECTED";
4432 return "COAP_EVENT_TCP_CLOSED";
4434 return "COAP_EVENT_TCP_FAILED";
4436 return "COAP_EVENT_SESSION_CONNECTED";
4438 return "COAP_EVENT_SESSION_CLOSED";
4440 return "COAP_EVENT_SESSION_FAILED";
4442 return "COAP_EVENT_PARTIAL_BLOCK";
4444 return "COAP_EVENT_XMIT_BLOCK_FAIL";
4446 return "COAP_EVENT_SERVER_SESSION_NEW";
4448 return "COAP_EVENT_SERVER_SESSION_DEL";
4450 return "COAP_EVENT_BAD_PACKET";
4452 return "COAP_EVENT_MSG_RETRANSMITTED";
4454 return "COAP_EVENT_OSCORE_DECRYPTION_FAILURE";
4456 return "COAP_EVENT_OSCORE_NOT_ENABLED";
4458 return "COAP_EVENT_OSCORE_NO_PROTECTED_PAYLOAD";
4460 return "COAP_EVENT_OSCORE_NO_SECURITY";
4462 return "COAP_EVENT_OSCORE_INTERNAL_ERROR";
4464 return "COAP_EVENT_OSCORE_DECODE_ERROR";
4466 return "COAP_EVENT_WS_PACKET_SIZE";
4468 return "COAP_EVENT_WS_CONNECTED";
4470 return "COAP_EVENT_WS_CLOSED";
4472 return "COAP_EVENT_KEEPALIVE_FAILURE";
4473 default:
4474 return "???";
4475 }
4476}
4477#endif /* COAP_MAX_LOGGING_LEVEL >= _COAP_LOG_DEBUG */
4478
4479COAP_API int
4481 coap_session_t *session) {
4482 int ret;
4483
4484 coap_lock_lock(context, return 0);
4485 ret = coap_handle_event_lkd(context, event, session);
4486 coap_lock_unlock(context);
4487 return ret;
4488}
4489
4490int
4492 coap_session_t *session) {
4493 int ret = 0;
4494
4495 coap_log_debug("***EVENT: %s\n", coap_event_name(event));
4496
4497 if (context->handle_event) {
4498 coap_lock_callback_ret(ret, context, context->handle_event(session, event));
4499#if COAP_PROXY_SUPPORT
4500 if (event == COAP_EVENT_SERVER_SESSION_DEL)
4502#endif /* COAP_PROXY_SUPPORT */
4503#if COAP_CLIENT_SUPPORT
4504 switch (event) {
4517 /* Those that are deemed fatal to end sending a request */
4518 session->doing_send_recv = 0;
4519 break;
4534 default:
4535 break;
4536 }
4537#endif /* COAP_CLIENT_SUPPORT */
4538 }
4539 return ret;
4540}
4541
4542COAP_API int
4544 int ret;
4545
4546 coap_lock_lock(context, return 0);
4547 ret = coap_can_exit_lkd(context);
4548 coap_lock_unlock(context);
4549 return ret;
4550}
4551
4552int
4554 coap_session_t *s, *rtmp;
4555 if (!context)
4556 return 1;
4557 coap_lock_check_locked(context);
4558 if (context->sendqueue)
4559 return 0;
4560#if COAP_SERVER_SUPPORT
4561 coap_endpoint_t *ep;
4562
4563 LL_FOREACH(context->endpoint, ep) {
4564 SESSIONS_ITER(ep->sessions, s, rtmp) {
4565 if (s->delayqueue)
4566 return 0;
4567 if (s->lg_xmit)
4568 return 0;
4569 }
4570 }
4571#endif /* COAP_SERVER_SUPPORT */
4572#if COAP_CLIENT_SUPPORT
4573 SESSIONS_ITER(context->sessions, s, rtmp) {
4574 if (s->delayqueue)
4575 return 0;
4576 if (s->lg_xmit)
4577 return 0;
4578 }
4579#endif /* COAP_CLIENT_SUPPORT */
4580 return 1;
4581}
4582#if COAP_SERVER_SUPPORT
4583#if COAP_ASYNC_SUPPORT
4585coap_check_async(coap_context_t *context, coap_tick_t now) {
4586 coap_tick_t next_due = 0;
4587 coap_async_t *async, *tmp;
4588
4589 LL_FOREACH_SAFE(context->async_state, async, tmp) {
4590 if (async->delay != 0 && async->delay <= now) {
4591 /* Send off the request to the application */
4592 handle_request(context, async->session, async->pdu);
4593
4594 /* Remove this async entry as it has now fired */
4595 coap_free_async_lkd(async->session, async);
4596 } else {
4597 if (next_due == 0 || next_due > async->delay - now)
4598 next_due = async->delay - now;
4599 }
4600 }
4601 return next_due;
4602}
4603#endif /* COAP_ASYNC_SUPPORT */
4604#endif /* COAP_SERVER_SUPPORT */
4605
4607
4608#if COAP_THREAD_SAFE
4609/*
4610 * Global lock for multi-thread support
4611 */
4612coap_lock_t global_lock;
4613#endif /* COAP_THREAD_SAFE */
4614
4615void
4617 coap_tick_t now;
4618#ifndef WITH_CONTIKI
4619 uint64_t us;
4620#endif /* !WITH_CONTIKI */
4621
4622 if (coap_started)
4623 return;
4624 coap_started = 1;
4625
4626#if COAP_THREAD_SAFE
4628#endif /* COAP_THREAD_SAFE */
4629
4630#if defined(HAVE_WINSOCK2_H)
4631 WORD wVersionRequested = MAKEWORD(2, 2);
4632 WSADATA wsaData;
4633 WSAStartup(wVersionRequested, &wsaData);
4634#endif
4636 coap_ticks(&now);
4637#ifndef WITH_CONTIKI
4638 us = coap_ticks_to_rt_us(now);
4639 /* Be accurate to the nearest (approx) us */
4640 coap_prng_init_lkd((unsigned int)us);
4641#else /* WITH_CONTIKI */
4642 coap_start_io_process();
4643#endif /* WITH_CONTIKI */
4646#ifdef WITH_LWIP
4647 coap_io_lwip_init();
4648#endif /* WITH_LWIP */
4649#if COAP_SERVER_SUPPORT
4650 static coap_str_const_t well_known = { sizeof(".well-known/core")-1,
4651 (const uint8_t *)".well-known/core"
4652 };
4653 memset(&resource_uri_wellknown, 0, sizeof(resource_uri_wellknown));
4654 resource_uri_wellknown.handler[COAP_REQUEST_GET-1] = hnd_get_wellknown_lkd;
4655 resource_uri_wellknown.flags = COAP_RESOURCE_FLAGS_HAS_MCAST_SUPPORT;
4656 resource_uri_wellknown.uri_path = &well_known;
4657#endif /* COAP_SERVER_SUPPORT */
4659}
4660
4661void
4663 if (!coap_started)
4664 return;
4665 coap_started = 0;
4666#if defined(HAVE_WINSOCK2_H)
4667 WSACleanup();
4668#elif defined(WITH_CONTIKI)
4669 coap_stop_io_process();
4670#endif
4671#ifdef WITH_LWIP
4672 coap_io_lwip_cleanup();
4673#endif /* WITH_LWIP */
4675
4677}
4678
4679void
4681 coap_response_handler_t handler) {
4682#if COAP_CLIENT_SUPPORT
4683 context->response_handler = handler;
4684#else /* ! COAP_CLIENT_SUPPORT */
4685 (void)context;
4686 (void)handler;
4687#endif /* COAP_CLIENT_SUPPORT */
4688}
4689
4690void
4692 coap_nack_handler_t handler) {
4693 context->nack_handler = handler;
4694}
4695
4696void
4698 coap_ping_handler_t handler) {
4699 context->ping_handler = handler;
4700}
4701
4702void
4704 coap_pong_handler_t handler) {
4705 context->pong_handler = handler;
4706}
4707
4708COAP_API void
4710 coap_lock_lock(ctx, return);
4711 coap_register_option_lkd(ctx, type);
4712 coap_lock_unlock(ctx);
4713}
4714
4715void
4718}
4719
4720#if ! defined WITH_CONTIKI && ! defined WITH_LWIP && ! defined RIOT_VERSION
4721#if COAP_SERVER_SUPPORT
4722COAP_API int
4723coap_join_mcast_group_intf(coap_context_t *ctx, const char *group_name,
4724 const char *ifname) {
4725 int ret;
4726
4727 coap_lock_lock(ctx, return -1);
4728 ret = coap_join_mcast_group_intf_lkd(ctx, group_name, ifname);
4729 coap_lock_unlock(ctx);
4730 return ret;
4731}
4732
4733int
4734coap_join_mcast_group_intf_lkd(coap_context_t *ctx, const char *group_name,
4735 const char *ifname) {
4736#if COAP_IPV4_SUPPORT
4737 struct ip_mreq mreq4;
4738#endif /* COAP_IPV4_SUPPORT */
4739#if COAP_IPV6_SUPPORT
4740 struct ipv6_mreq mreq6;
4741#endif /* COAP_IPV6_SUPPORT */
4742 struct addrinfo *resmulti = NULL, hints, *ainfo;
4743 int result = -1;
4744 coap_endpoint_t *endpoint;
4745 int mgroup_setup = 0;
4746
4747 /* Need to have at least one endpoint! */
4748 assert(ctx->endpoint);
4749 if (!ctx->endpoint)
4750 return -1;
4751
4752 /* Default is let the kernel choose */
4753#if COAP_IPV6_SUPPORT
4754 mreq6.ipv6mr_interface = 0;
4755#endif /* COAP_IPV6_SUPPORT */
4756#if COAP_IPV4_SUPPORT
4757 mreq4.imr_interface.s_addr = INADDR_ANY;
4758#endif /* COAP_IPV4_SUPPORT */
4759
4760 memset(&hints, 0, sizeof(hints));
4761 hints.ai_socktype = SOCK_DGRAM;
4762
4763 /* resolve the multicast group address */
4764 result = getaddrinfo(group_name, NULL, &hints, &resmulti);
4765
4766 if (result != 0) {
4767 coap_log_err("coap_join_mcast_group_intf: %s: "
4768 "Cannot resolve multicast address: %s\n",
4769 group_name, gai_strerror(result));
4770 goto finish;
4771 }
4772
4773 /* Need to do a windows equivalent at some point */
4774#ifndef _WIN32
4775 if (ifname) {
4776 /* interface specified - check if we have correct IPv4/IPv6 information */
4777 int done_ip4 = 0;
4778 int done_ip6 = 0;
4779#if defined(ESPIDF_VERSION)
4780 struct netif *netif;
4781#else /* !ESPIDF_VERSION */
4782#if COAP_IPV4_SUPPORT
4783 int ip4fd;
4784#endif /* COAP_IPV4_SUPPORT */
4785 struct ifreq ifr;
4786#endif /* !ESPIDF_VERSION */
4787
4788 /* See which mcast address family types are being asked for */
4789 for (ainfo = resmulti; ainfo != NULL && !(done_ip4 == 1 && done_ip6 == 1);
4790 ainfo = ainfo->ai_next) {
4791 switch (ainfo->ai_family) {
4792#if COAP_IPV6_SUPPORT
4793 case AF_INET6:
4794 if (done_ip6)
4795 break;
4796 done_ip6 = 1;
4797#if defined(ESPIDF_VERSION)
4798 netif = netif_find(ifname);
4799 if (netif)
4800 mreq6.ipv6mr_interface = netif_get_index(netif);
4801 else
4802 coap_log_err("coap_join_mcast_group_intf: %s: "
4803 "Cannot get IPv4 address: %s\n",
4804 ifname, coap_socket_strerror());
4805#else /* !ESPIDF_VERSION */
4806 memset(&ifr, 0, sizeof(ifr));
4807 strncpy(ifr.ifr_name, ifname, IFNAMSIZ - 1);
4808 ifr.ifr_name[IFNAMSIZ - 1] = '\000';
4809
4810#ifdef HAVE_IF_NAMETOINDEX
4811 mreq6.ipv6mr_interface = if_nametoindex(ifr.ifr_name);
4812 if (mreq6.ipv6mr_interface == 0) {
4813 coap_log_warn("coap_join_mcast_group_intf: "
4814 "cannot get interface index for '%s'\n",
4815 ifname);
4816 }
4817#elif defined(__QNXNTO__)
4818#else /* !HAVE_IF_NAMETOINDEX */
4819 result = ioctl(ctx->endpoint->sock.fd, SIOCGIFINDEX, &ifr);
4820 if (result != 0) {
4821 coap_log_warn("coap_join_mcast_group_intf: "
4822 "cannot get interface index for '%s': %s\n",
4823 ifname, coap_socket_strerror());
4824 } else {
4825 /* Capture the IPv6 if_index for later */
4826 mreq6.ipv6mr_interface = ifr.ifr_ifindex;
4827 }
4828#endif /* !HAVE_IF_NAMETOINDEX */
4829#endif /* !ESPIDF_VERSION */
4830#endif /* COAP_IPV6_SUPPORT */
4831 break;
4832#if COAP_IPV4_SUPPORT
4833 case AF_INET:
4834 if (done_ip4)
4835 break;
4836 done_ip4 = 1;
4837#if defined(ESPIDF_VERSION)
4838 netif = netif_find(ifname);
4839 if (netif)
4840 mreq4.imr_interface.s_addr = netif_ip4_addr(netif)->addr;
4841 else
4842 coap_log_err("coap_join_mcast_group_intf: %s: "
4843 "Cannot get IPv4 address: %s\n",
4844 ifname, coap_socket_strerror());
4845#else /* !ESPIDF_VERSION */
4846 /*
4847 * Need an AF_INET socket to do this unfortunately to stop
4848 * "Invalid argument" error if AF_INET6 socket is used for SIOCGIFADDR
4849 */
4850 ip4fd = socket(AF_INET, SOCK_DGRAM, 0);
4851 if (ip4fd == -1) {
4852 coap_log_err("coap_join_mcast_group_intf: %s: socket: %s\n",
4853 ifname, coap_socket_strerror());
4854 continue;
4855 }
4856 memset(&ifr, 0, sizeof(ifr));
4857 strncpy(ifr.ifr_name, ifname, IFNAMSIZ - 1);
4858 ifr.ifr_name[IFNAMSIZ - 1] = '\000';
4859 result = ioctl(ip4fd, SIOCGIFADDR, &ifr);
4860 if (result != 0) {
4861 coap_log_err("coap_join_mcast_group_intf: %s: "
4862 "Cannot get IPv4 address: %s\n",
4863 ifname, coap_socket_strerror());
4864 } else {
4865 /* Capture the IPv4 address for later */
4866 mreq4.imr_interface = ((struct sockaddr_in *)&ifr.ifr_addr)->sin_addr;
4867 }
4868 close(ip4fd);
4869#endif /* !ESPIDF_VERSION */
4870 break;
4871#endif /* COAP_IPV4_SUPPORT */
4872 default:
4873 break;
4874 }
4875 }
4876 }
4877#else /* _WIN32 */
4878 /*
4879 * On Windows this function ignores the ifname variable so we unset this
4880 * variable on this platform in any case in order to enable the interface
4881 * selection from the bind address below.
4882 */
4883 ifname = 0;
4884#endif /* _WIN32 */
4885
4886 /* Add in mcast address(es) to appropriate interface */
4887 for (ainfo = resmulti; ainfo != NULL; ainfo = ainfo->ai_next) {
4888 LL_FOREACH(ctx->endpoint, endpoint) {
4889 /* Only UDP currently supported */
4890 if (endpoint->proto == COAP_PROTO_UDP) {
4891 coap_address_t gaddr;
4892
4893 coap_address_init(&gaddr);
4894#if COAP_IPV6_SUPPORT
4895 if (ainfo->ai_family == AF_INET6) {
4896 if (!ifname) {
4897 if (endpoint->bind_addr.addr.sa.sa_family == AF_INET6) {
4898 /*
4899 * Do it on the ifindex that the server is listening on
4900 * (sin6_scope_id could still be 0)
4901 */
4902 mreq6.ipv6mr_interface =
4903 endpoint->bind_addr.addr.sin6.sin6_scope_id;
4904 } else {
4905 mreq6.ipv6mr_interface = 0;
4906 }
4907 }
4908 gaddr.addr.sin6.sin6_family = AF_INET6;
4909 gaddr.addr.sin6.sin6_port = endpoint->bind_addr.addr.sin6.sin6_port;
4910 gaddr.addr.sin6.sin6_addr = mreq6.ipv6mr_multiaddr =
4911 ((struct sockaddr_in6 *)ainfo->ai_addr)->sin6_addr;
4912 result = setsockopt(endpoint->sock.fd, IPPROTO_IPV6, IPV6_JOIN_GROUP,
4913 (char *)&mreq6, sizeof(mreq6));
4914 }
4915#endif /* COAP_IPV6_SUPPORT */
4916#if COAP_IPV4_SUPPORT && COAP_IPV6_SUPPORT
4917 else
4918#endif /* COAP_IPV4_SUPPORT && COAP_IPV6_SUPPORT */
4919#if COAP_IPV4_SUPPORT
4920 if (ainfo->ai_family == AF_INET) {
4921 if (!ifname) {
4922 if (endpoint->bind_addr.addr.sa.sa_family == AF_INET) {
4923 /*
4924 * Do it on the interface that the server is listening on
4925 * (sin_addr could still be INADDR_ANY)
4926 */
4927 mreq4.imr_interface = endpoint->bind_addr.addr.sin.sin_addr;
4928 } else {
4929 mreq4.imr_interface.s_addr = INADDR_ANY;
4930 }
4931 }
4932 gaddr.addr.sin.sin_family = AF_INET;
4933 gaddr.addr.sin.sin_port = endpoint->bind_addr.addr.sin.sin_port;
4934 gaddr.addr.sin.sin_addr.s_addr = mreq4.imr_multiaddr.s_addr =
4935 ((struct sockaddr_in *)ainfo->ai_addr)->sin_addr.s_addr;
4936 result = setsockopt(endpoint->sock.fd, IPPROTO_IP, IP_ADD_MEMBERSHIP,
4937 (char *)&mreq4, sizeof(mreq4));
4938 }
4939#endif /* COAP_IPV4_SUPPORT */
4940 else {
4941 continue;
4942 }
4943
4944 if (result == COAP_SOCKET_ERROR) {
4945 coap_log_err("coap_join_mcast_group_intf: %s: setsockopt: %s\n",
4946 group_name, coap_socket_strerror());
4947 } else {
4948 char addr_str[INET6_ADDRSTRLEN + 8 + 1];
4949
4950 addr_str[sizeof(addr_str)-1] = '\000';
4951 if (coap_print_addr(&gaddr, (uint8_t *)addr_str,
4952 sizeof(addr_str) - 1)) {
4953 if (ifname)
4954 coap_log_debug("added mcast group %s i/f %s\n", addr_str,
4955 ifname);
4956 else
4957 coap_log_debug("added mcast group %s\n", addr_str);
4958 }
4959 mgroup_setup = 1;
4960 }
4961 }
4962 }
4963 }
4964 if (!mgroup_setup) {
4965 result = -1;
4966 }
4967
4968finish:
4969 freeaddrinfo(resmulti);
4970
4971 return result;
4972}
4973
4974void
4976 context->mcast_per_resource = 1;
4977}
4978
4979#endif /* ! COAP_SERVER_SUPPORT */
4980
4981#if COAP_CLIENT_SUPPORT
4982int
4983coap_mcast_set_hops(coap_session_t *session, size_t hops) {
4984 if (session && coap_is_mcast(&session->addr_info.remote)) {
4985 switch (session->addr_info.remote.addr.sa.sa_family) {
4986#if COAP_IPV4_SUPPORT
4987 case AF_INET:
4988 if (setsockopt(session->sock.fd, IPPROTO_IP, IP_MULTICAST_TTL,
4989 (const char *)&hops, sizeof(hops)) < 0) {
4990 coap_log_info("coap_mcast_set_hops: %zu: setsockopt: %s\n",
4991 hops, coap_socket_strerror());
4992 return 0;
4993 }
4994 return 1;
4995#endif /* COAP_IPV4_SUPPORT */
4996#if COAP_IPV6_SUPPORT
4997 case AF_INET6:
4998 if (setsockopt(session->sock.fd, IPPROTO_IPV6, IPV6_MULTICAST_HOPS,
4999 (const char *)&hops, sizeof(hops)) < 0) {
5000 coap_log_info("coap_mcast_set_hops: %zu: setsockopt: %s\n",
5001 hops, coap_socket_strerror());
5002 return 0;
5003 }
5004 return 1;
5005#endif /* COAP_IPV6_SUPPORT */
5006 default:
5007 break;
5008 }
5009 }
5010 return 0;
5011}
5012#endif /* COAP_CLIENT_SUPPORT */
5013
5014#else /* defined WITH_CONTIKI || defined WITH_LWIP */
5015COAP_API int
5017 const char *group_name COAP_UNUSED,
5018 const char *ifname COAP_UNUSED) {
5019 return -1;
5020}
5021
5022int
5024 size_t hops COAP_UNUSED) {
5025 return 0;
5026}
5027
5028void
5030}
5031#endif /* defined WITH_CONTIKI || defined WITH_LWIP */
void coap_address_init(coap_address_t *addr)
Resets the given coap_address_t object addr to its default values.
Definition: coap_address.c:253
int coap_is_mcast(const coap_address_t *a)
Checks if given address a denotes a multicast address.
Definition: coap_address.c:119
void coap_address_copy(coap_address_t *dst, const coap_address_t *src)
Definition: coap_address.c:801
void coap_debug_reset(void)
Reset all the defined logging parameters.
Definition: coap_debug.c:1402
struct coap_async_t coap_async_t
Async Entry information.
#define PRIu32
Definition: coap_internal.h:45
const char * coap_socket_strerror(void)
Definition: coap_io.c:1900
void coap_packet_get_memmapped(coap_packet_t *packet, unsigned char **address, size_t *length)
Given a packet, set msg and msg_len to an address and length of the packet's data in memory.
Definition: coap_io.c:1008
void coap_update_io_timer(coap_context_t *context, coap_tick_t delay)
Update when to continue with I/O processing, unless packets come in in the meantime.
Definition: coap_io.c:504
#define COAP_RXBUFFER_SIZE
Definition: coap_io.h:29
#define COAP_SOCKET_ERROR
Definition: coap_io.h:49
coap_nack_reason_t
Definition: coap_io.h:62
@ COAP_NACK_NOT_DELIVERABLE
Definition: coap_io.h:64
@ COAP_NACK_TOO_MANY_RETRIES
Definition: coap_io.h:63
@ COAP_NACK_ICMP_ISSUE
Definition: coap_io.h:67
@ COAP_NACK_RST
Definition: coap_io.h:65
@ COAP_NACK_BAD_RESPONSE
Definition: coap_io.h:68
#define COAP_SOCKET_MULTICAST
socket is used for multicast communication
#define COAP_SOCKET_WANT_ACCEPT
non blocking server socket is waiting for accept
#define COAP_SOCKET_NOT_EMPTY
the socket is not empty
#define COAP_SOCKET_CAN_WRITE
non blocking socket can now write without blocking
#define COAP_SOCKET_BOUND
the socket is bound
#define COAP_SOCKET_WANT_READ
non blocking socket is waiting for reading
#define COAP_SOCKET_CAN_ACCEPT
non blocking server socket can now accept without blocking
#define COAP_SOCKET_WANT_WRITE
non blocking socket is waiting for writing
#define COAP_SOCKET_CAN_CONNECT
non blocking client socket can now connect without blocking
void coap_epoll_ctl_mod(coap_socket_t *sock, uint32_t events, const char *func)
Epoll specific function to modify the state of events that epoll is tracking on the appropriate file ...
#define COAP_SOCKET_WANT_CONNECT
non blocking client socket is waiting for connect
#define COAP_SOCKET_CAN_READ
non blocking socket can now read without blocking
#define COAP_SOCKET_CONNECTED
the socket is connected
@ COAP_LAYER_SESSION
Library specific build wrapper for coap_internal.h.
#define COAP_API
void coap_dump_memory_type_counts(coap_log_t level)
Dumps the current usage of malloc'd memory types.
Definition: coap_mem.c:670
void coap_memory_init(void)
Initializes libcoap's memory management.
@ COAP_NODE
Definition: coap_mem.h:43
@ COAP_CONTEXT
Definition: coap_mem.h:44
@ COAP_STRING
Definition: coap_mem.h:39
void * coap_malloc_type(coap_memory_tag_t type, size_t size)
Allocates a chunk of size bytes and returns a pointer to the newly allocated memory.
void coap_free_type(coap_memory_tag_t type, void *p)
Releases the memory that was allocated by coap_malloc_type().
CoAP mutex mechanism wrapper.
#define FRAC_BITS
The number of bits for the fractional part of ACK_TIMEOUT and ACK_RANDOM_FACTOR.
Definition: coap_net.c:80
static ssize_t coap_send_pdu(coap_session_t *session, coap_pdu_t *pdu, coap_queue_t *node)
Definition: coap_net.c:1014
static int send_recv_terminate
Definition: coap_net.c:1908
#define MAX_BITS
The maximum number of bits for fixed point integers that are used for retransmission time calculation...
Definition: coap_net.c:86
void coap_cleanup(void)
Definition: coap_net.c:4662
#define ACK_TIMEOUT
creates a Qx.FRAC_BITS from session's 'ack_timeout'
Definition: coap_net.c:101
static const char * coap_event_name(coap_event_t event)
Definition: coap_net.c:4419
static int coap_cancel(coap_context_t *context, const coap_queue_t *sent)
This function cancels outstanding messages for the session and token specified in sent.
Definition: coap_net.c:3007
int coap_started
Definition: coap_net.c:4606
static int coap_handle_dgram_for_proto(coap_context_t *ctx, coap_session_t *session, coap_packet_t *packet)
Definition: coap_net.c:2156
static void coap_write_session(coap_context_t *ctx, coap_session_t *session, coap_tick_t now)
Definition: coap_net.c:2197
COAP_STATIC_INLINE void coap_free_node(coap_queue_t *node)
Definition: coap_net.c:111
#define SHR_FP(val, frac)
static void handle_signaling(coap_context_t *context, coap_session_t *session, coap_pdu_t *pdu)
Definition: coap_net.c:3913
#define min(a, b)
Definition: coap_net.c:73
void coap_startup(void)
Definition: coap_net.c:4616
static int check_token_size(coap_session_t *session, const coap_pdu_t *pdu)
Definition: coap_net.c:3986
static unsigned int s_csm_timeout
Definition: coap_net.c:503
COAP_STATIC_INLINE coap_queue_t * coap_malloc_node(void)
Definition: coap_net.c:106
#define FP1
#define ACK_RANDOM_FACTOR
creates a Qx.FRAC_BITS from session's 'ack_random_factor'
Definition: coap_net.c:97
#define INET6_ADDRSTRLEN
Definition: coap_net.c:69
int coap_dtls_context_set_pki(coap_context_t *ctx COAP_UNUSED, const coap_dtls_pki_t *setup_data COAP_UNUSED, const coap_dtls_role_t role COAP_UNUSED)
Definition: coap_notls.c:108
int coap_dtls_receive(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
Definition: coap_notls.c:238
int coap_dtls_context_set_pki_root_cas(coap_context_t *ctx COAP_UNUSED, const char *ca_file COAP_UNUSED, const char *ca_path COAP_UNUSED)
Definition: coap_notls.c:116
void coap_dtls_free_context(void *handle COAP_UNUSED)
Definition: coap_notls.c:181
void * coap_dtls_new_context(coap_context_t *coap_context COAP_UNUSED)
Definition: coap_notls.c:176
uint16_t coap_option_num_t
Definition: coap_option.h:20
uint8_t coap_opt_t
Use byte-oriented access methods here because sliding a complex struct coap_opt_t over the data buffe...
Definition: coap_option.h:26
#define SESSIONS_ITER_SAFE(e, el, rtmp)
#define SESSIONS_ITER(e, el, rtmp)
void coap_proxy_cleanup(coap_context_t *context)
Close down proxy tracking, releasing any memory used.
void coap_proxy_remove_association(coap_session_t *session, int send_failure)
void coap_io_do_epoll_lkd(coap_context_t *ctx, struct epoll_event *events, size_t nevents)
Process all the epoll events.
Definition: coap_net.c:2523
coap_mid_t coap_send_rst_lkd(coap_session_t *session, const coap_pdu_t *request)
Sends an RST message with code 0 for the specified request to dst.
Definition: coap_net.c:971
coap_mid_t coap_send_message_type_lkd(coap_session_t *session, const coap_pdu_t *request, coap_pdu_type_t type)
Helper function to create and send a message with type (usually ACK or RST).
Definition: coap_net.c:1095
coap_mid_t coap_send_error_lkd(coap_session_t *session, const coap_pdu_t *request, coap_pdu_code_t code, coap_opt_filter_t *opts)
Sends an error response with code code for request request to dst.
Definition: coap_net.c:1066
void coap_io_do_io_lkd(coap_context_t *ctx, coap_tick_t now)
Processes any outstanding read, write, accept or connect I/O as indicated in the coap_socket_t struct...
Definition: coap_net.c:2458
int coap_send_recv_lkd(coap_session_t *session, coap_pdu_t *request_pdu, coap_pdu_t **response_pdu, uint32_t timeout_ms)
Definition: coap_net.c:1937
int coap_io_process_lkd(coap_context_t *ctx, uint32_t timeout_ms)
The main I/O processing function.
Definition: coap_io.c:1591
unsigned int coap_io_prepare_epoll_lkd(coap_context_t *ctx, coap_tick_t now)
Any now timed out delayed packet is transmitted, along with any packets associated with requested obs...
Definition: coap_io.c:1252
coap_mid_t coap_send_lkd(coap_session_t *session, coap_pdu_t *pdu)
Sends a CoAP message to given peer.
Definition: coap_net.c:1356
coap_mid_t coap_send_ack_lkd(coap_session_t *session, const coap_pdu_t *request)
Sends an ACK message with code 0 for the specified request to dst.
Definition: coap_net.c:986
#define COAP_IO_NO_WAIT
Definition: coap_net.h:663
#define COAP_IO_WAIT
Definition: coap_net.h:662
COAP_API void coap_io_do_epoll(coap_context_t *ctx, struct epoll_event *events, size_t nevents)
Process all the epoll events.
Definition: coap_net.c:2512
COAP_API void coap_io_do_io(coap_context_t *ctx, coap_tick_t now)
Processes any outstanding read, write, accept or connect I/O as indicated in the coap_socket_t struct...
Definition: coap_net.c:2451
int coap_add_data_large_response_lkd(coap_resource_t *resource, coap_session_t *session, const coap_pdu_t *request, coap_pdu_t *response, const coap_string_t *query, uint16_t media_type, int maxage, uint64_t etag, size_t length, const uint8_t *data, coap_release_large_data_t release_func, void *app_ptr)
Associates given data with the response pdu that is passed as fourth parameter.
void coap_block_delete_lg_srcv(coap_session_t *session, coap_lg_srcv_t *lg_srcv)
void coap_block_delete_lg_crcv(coap_session_t *session, coap_lg_crcv_t *lg_crcv)
int coap_handle_response_get_block(coap_context_t *context, coap_session_t *session, coap_pdu_t *sent, coap_pdu_t *rcvd, coap_recurse_t recursive)
void coap_check_code_lg_xmit(const coap_session_t *session, const coap_pdu_t *request, coap_pdu_t *response, const coap_resource_t *resource, const coap_string_t *query)
The function checks that the code in a newly formed lg_xmit created by coap_add_data_large_response_l...
int coap_handle_response_send_block(coap_session_t *session, coap_pdu_t *sent, coap_pdu_t *rcvd)
int coap_handle_request_put_block(coap_context_t *context, coap_session_t *session, coap_pdu_t *pdu, coap_pdu_t *response, coap_resource_t *resource, coap_string_t *uri_path, coap_opt_t *observe, int *added_block, coap_lg_srcv_t **free_lg_srcv)
#define STATE_TOKEN_BASE(t)
coap_lg_crcv_t * coap_block_new_lg_crcv(coap_session_t *session, coap_pdu_t *pdu, coap_lg_xmit_t *lg_xmit)
int coap_handle_request_send_block(coap_session_t *session, coap_pdu_t *pdu, coap_pdu_t *response, coap_resource_t *resource, coap_string_t *query)
@ COAP_RECURSE_OK
#define COAP_OPT_BLOCK_SZX(opt)
Returns the value of the SZX-field of a Block option opt.
Definition: coap_block.h:89
#define COAP_BLOCK_TRY_Q_BLOCK
Definition: coap_block.h:63
#define COAP_BLOCK_SINGLE_BODY
Definition: coap_block.h:62
int coap_get_block_b(const coap_session_t *session, const coap_pdu_t *pdu, coap_option_num_t number, coap_block_b_t *block)
Initializes block from pdu.
Definition: coap_block.c:54
#define COAP_BLOCK_NO_PREEMPTIVE_RTAG
Definition: coap_block.h:65
#define COAP_BLOCK_USE_LIBCOAP
Definition: coap_block.h:61
void coap_delete_cache_entry(coap_context_t *context, coap_cache_entry_t *cache_entry)
Remove a cache-entry from the hash list and free off all the appropriate contents apart from app_data...
int64_t coap_tick_diff_t
This data type is used to represent the difference between two clock_tick_t values.
Definition: coap_time.h:155
void coap_clock_init(void)
Initializes the internal clock.
uint64_t coap_tick_t
This data type represents internal timer ticks with COAP_TICKS_PER_SECOND resolution.
Definition: coap_time.h:143
#define COAP_TICKS_PER_SECOND
Use ms resolution on POSIX systems.
Definition: coap_time.h:158
uint64_t coap_ticks_to_rt_us(coap_tick_t t)
Helper function that converts coap ticks to POSIX wallclock time in us.
void coap_prng_init_lkd(unsigned int seed)
Seeds the default random number generation function with the given seed.
Definition: coap_prng.c:166
int coap_prng_lkd(void *buf, size_t len)
Fills buf with len random bytes using the default pseudo random number generator.
Definition: coap_prng.c:178
void coap_delete_all_resources(coap_context_t *context)
Deletes all resources from given context and frees their storage.
coap_print_status_t coap_print_wellknown_lkd(coap_context_t *context, unsigned char *buf, size_t *buflen, size_t offset, const coap_string_t *query_filter)
Prints the names of all known resources for context to buf.
coap_resource_t * coap_get_resource_from_uri_path_lkd(coap_context_t *context, coap_str_const_t *uri_path)
Returns the resource identified by the unique string uri_path.
#define RESOURCES_ITER(r, tmp)
#define COAP_RESOURCE_HANDLE_WELLKNOWN_CORE
Define this when invoking coap_resource_unknown_init2() if .well-known/core is to be passed to the un...
#define COAP_RESOURCE_FLAGS_HAS_MCAST_SUPPORT
This resource has support for multicast requests.
Definition: coap_resource.h:85
#define COAP_RESOURCE_FLAGS_LIB_DIS_MCAST_SUPPRESS_4_XX
Disable libcoap library suppressing 4.xx multicast responses (overridden by RFC7969 No-Response optio...
#define COAP_RESOURCE_FLAGS_LIB_DIS_MCAST_DELAYS
Disable libcoap library from adding in delays to multicast requests before releasing the response bac...
Definition: coap_resource.h:96
void(* coap_method_handler_t)(coap_resource_t *resource, coap_session_t *session, const coap_pdu_t *request, const coap_string_t *query, coap_pdu_t *response)
Definition of message handler function.
Definition: coap_resource.h:41
#define COAP_RESOURCE_FLAGS_OSCORE_ONLY
Define this resource as an OSCORE enabled access only.
#define COAP_RESOURCE_FLAGS_LIB_DIS_MCAST_SUPPRESS_5_XX
Disable libcoap library suppressing 5.xx multicast responses (overridden by RFC7969 No-Response optio...
uint32_t coap_print_status_t
Status word to encode the result of conditional print or copy operations such as coap_print_link().
#define COAP_PRINT_STATUS_ERROR
#define COAP_RESOURCE_FLAGS_FORCE_SINGLE_BODY
Force all large traffic to this resource to be presented as a single body to the request handler.
#define COAP_RESOURCE_FLAGS_LIB_ENA_MCAST_SUPPRESS_2_05
Enable libcoap library suppression of 205 multicast responses that are empty (overridden by RFC7969 N...
#define COAP_RESOURCE_FLAGS_LIB_ENA_MCAST_SUPPRESS_2_XX
Enable libcoap library suppressing 2.xx multicast responses (overridden by RFC7969 No-Response option...
void coap_register_option_lkd(coap_context_t *ctx, uint16_t type)
Registers the option type type with the given context object ctx.
Definition: coap_net.c:4716
int coap_handle_event_lkd(coap_context_t *context, coap_event_t event, coap_session_t *session)
Invokes the event handler of context for the given event and data.
Definition: coap_net.c:4491
uint16_t coap_new_message_id_lkd(coap_session_t *session)
Returns a new message id and updates session->tx_mid accordingly.
unsigned int coap_adjust_basetime(coap_context_t *ctx, coap_tick_t now)
Set sendqueue_basetime in the given context object ctx to now.
Definition: coap_net.c:130
int coap_delete_node_lkd(coap_queue_t *node)
Destroys specified node.
Definition: coap_net.c:227
void coap_delete_all(coap_queue_t *queue)
Removes all items from given queue and frees the allocated storage.
Definition: coap_net.c:247
int coap_context_set_psk2_lkd(coap_context_t *context, coap_dtls_spsk_t *setup_data)
Set the context's default PSK hint and/or key for a server.
int coap_remove_from_queue(coap_queue_t **queue, coap_session_t *session, coap_mid_t id, coap_queue_t **node)
This function removes the element with given id from the list given list.
Definition: coap_net.c:2673
coap_queue_t * coap_peek_next(coap_context_t *context)
Returns the next pdu to send without removing from sendqeue.
Definition: coap_net.c:270
COAP_API int coap_delete_node(coap_queue_t *node)
Destroys specified node.
Definition: coap_net.c:204
int coap_client_delay_first(coap_session_t *session)
Delay the sending of the first client request until some other negotiation has completed.
Definition: coap_net.c:1226
int coap_context_set_psk_lkd(coap_context_t *context, const char *hint, const uint8_t *key, size_t key_len)
Set the context's default PSK hint and/or key for a server.
coap_queue_t * coap_pop_next(coap_context_t *context)
Returns the next pdu to send and removes it from the sendqeue.
Definition: coap_net.c:278
void coap_dispatch(coap_context_t *context, coap_session_t *session, coap_pdu_t *pdu)
Dispatches the PDUs from the receive queue in given context.
Definition: coap_net.c:4019
coap_mid_t coap_send_internal(coap_session_t *session, coap_pdu_t *pdu)
Sends a CoAP message to given peer.
Definition: coap_net.c:1679
int coap_insert_node(coap_queue_t **queue, coap_queue_t *node)
Adds node to given queue, ordered by variable t in node.
Definition: coap_net.c:167
unsigned int coap_calc_timeout(coap_session_t *session, unsigned char r)
Calculates the initial timeout based on the session CoAP transmission parameters 'ack_timeout',...
Definition: coap_net.c:1123
int coap_join_mcast_group_intf_lkd(coap_context_t *ctx, const char *groupname, const char *ifname)
Function interface for joining a multicast group for listening for the currently defined endpoints th...
void coap_free_context_lkd(coap_context_t *context)
CoAP stack context must be released with coap_free_context_lkd().
Definition: coap_net.c:755
int coap_can_exit_lkd(coap_context_t *context)
Returns 1 if there are no messages to send or to dispatch in the context's queues.
Definition: coap_net.c:4553
coap_mid_t coap_retransmit(coap_context_t *context, coap_queue_t *node)
Handles retransmissions of confirmable messages.
Definition: coap_net.c:2053
int coap_check_code_class(coap_session_t *session, coap_pdu_t *pdu)
Check whether the pdu contains a valid code class.
Definition: coap_net.c:1294
int coap_context_set_pki_root_cas_lkd(coap_context_t *ctx, const char *ca_file, const char *ca_dir)
Set the context's default Root CA information for a client or server.
Definition: coap_net.c:448
int coap_option_check_critical(coap_session_t *session, coap_pdu_t *pdu, coap_opt_filter_t *unknown)
Verifies that pdu contains no unknown critical options.
Definition: coap_net.c:846
coap_mid_t coap_wait_ack(coap_context_t *context, coap_session_t *session, coap_queue_t *node)
Definition: coap_net.c:1149
coap_queue_t * coap_new_node(void)
Creates a new node suitable for adding to the CoAP sendqueue.
Definition: coap_net.c:256
void coap_cancel_session_messages(coap_context_t *context, coap_session_t *session, coap_nack_reason_t reason)
Cancels all outstanding messages for session session.
Definition: coap_net.c:2718
int coap_context_set_pki_lkd(coap_context_t *context, const coap_dtls_pki_t *setup_data)
Set the context's default PKI information for a server.
int coap_handle_dgram(coap_context_t *ctx, coap_session_t *session, uint8_t *msg, size_t msg_len)
Parses and interprets a CoAP datagram with context ctx.
Definition: coap_net.c:2628
void coap_cancel_all_messages(coap_context_t *context, coap_session_t *session, coap_bin_const_t *token)
Cancels all outstanding messages for session session that have the specified token.
Definition: coap_net.c:2757
void coap_context_set_session_timeout(coap_context_t *context, unsigned int session_timeout)
Set the session timeout value.
Definition: coap_net.c:546
unsigned int coap_context_get_max_handshake_sessions(const coap_context_t *context)
Get the session timeout value.
Definition: coap_net.c:499
COAP_API int coap_join_mcast_group_intf(coap_context_t *ctx, const char *groupname, const char *ifname)
Function interface for joining a multicast group for listening for the currently defined endpoints th...
void(* coap_pong_handler_t)(coap_session_t *session, const coap_pdu_t *received, const coap_mid_t mid)
Received Pong handler that is used as callback in coap_context_t.
Definition: coap_net.h:100
unsigned int coap_context_get_max_idle_sessions(const coap_context_t *context)
Get the maximum idle sessions count.
Definition: coap_net.c:488
COAP_API int coap_send_recv(coap_session_t *session, coap_pdu_t *request_pdu, coap_pdu_t **response_pdu, uint32_t timeout_ms)
Definition: coap_net.c:1916
coap_context_t * coap_new_context(const coap_address_t *listen_addr)
Creates a new coap_context_t object that will hold the CoAP stack status.
Definition: coap_net.c:642
COAP_API coap_mid_t coap_send(coap_session_t *session, coap_pdu_t *pdu)
Sends a CoAP message to given peer.
Definition: coap_net.c:1346
COAP_API int coap_context_set_pki(coap_context_t *context, const coap_dtls_pki_t *setup_data)
Set the context's default PKI information for a server.
void coap_mcast_per_resource(coap_context_t *context)
Function interface to enable processing mcast requests on a per resource basis.
coap_response_t(* coap_response_handler_t)(coap_session_t *session, const coap_pdu_t *sent, const coap_pdu_t *received, const coap_mid_t mid)
Response handler that is used as callback in coap_context_t.
Definition: coap_net.h:64
COAP_API coap_mid_t coap_send_error(coap_session_t *session, const coap_pdu_t *request, coap_pdu_code_t code, coap_opt_filter_t *opts)
Sends an error response with code code for request request to dst.
Definition: coap_net.c:1053
void coap_context_set_csm_max_message_size(coap_context_t *context, uint32_t csm_max_message_size)
Set the CSM max session size value.
Definition: coap_net.c:534
void coap_context_set_csm_timeout(coap_context_t *context, unsigned int csm_timeout)
Set the CSM timeout value.
Definition: coap_net.c:506
void coap_send_recv_terminate(void)
Terminate any active coap_send_recv() sessions.
Definition: coap_net.c:1911
void coap_register_response_handler(coap_context_t *context, coap_response_handler_t handler)
Registers a new message handler that is called whenever a response is received.
Definition: coap_net.c:4680
coap_pdu_t * coap_new_error_response(const coap_pdu_t *request, coap_pdu_code_t code, coap_opt_filter_t *opts)
Creates a new ACK PDU with specified error code.
Definition: coap_net.c:2790
void coap_context_set_max_handshake_sessions(coap_context_t *context, unsigned int max_handshake_sessions)
Set the maximum number of sessions in (D)TLS handshake value.
Definition: coap_net.c:493
int coap_context_get_coap_fd(const coap_context_t *context)
Get the libcoap internal file descriptor for using in an application's select() or returned as an eve...
Definition: coap_net.c:557
int coap_mcast_set_hops(coap_session_t *session, size_t hops)
Function interface for defining the hop count (ttl) for sending multicast traffic.
void coap_context_set_app_data(coap_context_t *context, void *app_data)
Stores data with the given context.
Definition: coap_net.c:630
coap_response_t
Definition: coap_net.h:48
void(* coap_ping_handler_t)(coap_session_t *session, const coap_pdu_t *received, const coap_mid_t mid)
Received Ping handler that is used as callback in coap_context_t.
Definition: coap_net.h:89
void coap_ticks(coap_tick_t *)
Returns the current value of an internal tick counter.
COAP_API void coap_free_context(coap_context_t *context)
CoAP stack context must be released with coap_free_context().
Definition: coap_net.c:746
void(* coap_nack_handler_t)(coap_session_t *session, const coap_pdu_t *sent, const coap_nack_reason_t reason, const coap_mid_t mid)
Negative Acknowedge handler that is used as callback in coap_context_t.
Definition: coap_net.h:77
void * coap_context_get_app_data(const coap_context_t *context)
Returns any application-specific data that has been stored with context using the function coap_conte...
Definition: coap_net.c:636
COAP_API int coap_context_set_pki_root_cas(coap_context_t *ctx, const char *ca_file, const char *ca_dir)
Set the context's default Root CA information for a client or server.
Definition: coap_net.c:436
uint32_t coap_context_get_csm_max_message_size(const coap_context_t *context)
Get the CSM max session size value.
Definition: coap_net.c:541
unsigned int coap_context_get_session_timeout(const coap_context_t *context)
Get the session timeout value.
Definition: coap_net.c:552
COAP_API int coap_context_set_psk(coap_context_t *context, const char *hint, const uint8_t *key, size_t key_len)
Set the context's default PSK hint and/or key for a server.
COAP_API void coap_register_option(coap_context_t *ctx, uint16_t type)
Registers the option type type with the given context object ctx.
Definition: coap_net.c:4709
COAP_API coap_mid_t coap_send_ack(coap_session_t *session, const coap_pdu_t *request)
Sends an ACK message with code 0 for the specified request to dst.
Definition: coap_net.c:976
unsigned int coap_context_get_csm_timeout_ms(const coap_context_t *context)
Get the CSM timeout value.
Definition: coap_net.c:529
void coap_register_ping_handler(coap_context_t *context, coap_ping_handler_t handler)
Registers a new message handler that is called whenever a CoAP Ping message is received.
Definition: coap_net.c:4697
COAP_API int coap_context_set_psk2(coap_context_t *context, coap_dtls_spsk_t *setup_data)
Set the context's default PSK hint and/or key for a server.
int coap_context_set_cid_tuple_change(coap_context_t *context, uint8_t every)
Set the Connection ID client tuple frequency change for testing CIDs.
Definition: coap_net.c:463
void * coap_get_app_data(const coap_context_t *ctx)
Definition: coap_net.c:740
void coap_context_set_max_idle_sessions(coap_context_t *context, unsigned int max_idle_sessions)
Set the maximum idle sessions count.
Definition: coap_net.c:482
COAP_API coap_mid_t coap_send_message_type(coap_session_t *session, const coap_pdu_t *request, coap_pdu_type_t type)
Helper function to create and send a message with type (usually ACK or RST).
Definition: coap_net.c:1084
COAP_API coap_mid_t coap_send_rst(coap_session_t *session, const coap_pdu_t *request)
Sends an RST message with code 0 for the specified request to dst.
Definition: coap_net.c:961
void coap_context_set_keepalive(coap_context_t *context, unsigned int seconds)
Set the context keepalive timer for sessions.
Definition: coap_net.c:458
void coap_set_app_data(coap_context_t *ctx, void *app_data)
Definition: coap_net.c:734
COAP_API int coap_can_exit(coap_context_t *context)
Returns 1 if there are no messages to send or to dispatch in the context's queues.
Definition: coap_net.c:4543
unsigned int coap_context_get_csm_timeout(const coap_context_t *context)
Get the CSM timeout value.
Definition: coap_net.c:513
void coap_register_pong_handler(coap_context_t *context, coap_pong_handler_t handler)
Registers a new message handler that is called whenever a CoAP Pong message is received.
Definition: coap_net.c:4703
void coap_context_set_max_token_size(coap_context_t *context, size_t max_token_size)
Set the maximum token size (RFC8974).
Definition: coap_net.c:474
COAP_API int coap_handle_event(coap_context_t *context, coap_event_t event, coap_session_t *session)
Invokes the event handler of context for the given event and data.
Definition: coap_net.c:4480
void coap_register_nack_handler(coap_context_t *context, coap_nack_handler_t handler)
Registers a new message handler that is called whenever a confirmable message (request or response) i...
Definition: coap_net.c:4691
void coap_context_set_csm_timeout_ms(coap_context_t *context, unsigned int csm_timeout_ms)
Set the CSM timeout value.
Definition: coap_net.c:519
@ COAP_RESPONSE_FAIL
Response not liked - send CoAP RST packet.
Definition: coap_net.h:49
@ COAP_RESPONSE_OK
Response is fine.
Definition: coap_net.h:50
const coap_bin_const_t * coap_get_session_client_psk_identity(const coap_session_t *coap_session)
Get the current client's PSK identity.
void coap_dtls_startup(void)
Initialize the underlying (D)TLS Library layer.
Definition: coap_notls.c:149
coap_session_t * coap_session_new_dtls_session(coap_session_t *session, coap_tick_t now)
Create a new DTLS session for the session.
int coap_dtls_hello(coap_session_t *coap_session, const uint8_t *data, size_t data_len)
Handling client HELLO messages from a new candiate peer.
int coap_dtls_set_cid_tuple_change(coap_context_t *context, uint8_t every)
Set the Connection ID client tuple frequency change for testing CIDs.
int coap_dtls_context_set_spsk(coap_context_t *coap_context, coap_dtls_spsk_t *setup_data)
Set the DTLS context's default server PSK information.
void coap_dtls_shutdown(void)
Close down the underlying (D)TLS Library layer.
Definition: coap_notls.c:161
const coap_bin_const_t * coap_get_session_client_psk_key(const coap_session_t *coap_session)
Get the current client's PSK key.
const coap_bin_const_t * coap_get_session_server_psk_key(const coap_session_t *coap_session)
Get the current server's PSK key.
const coap_bin_const_t * coap_get_session_server_psk_hint(const coap_session_t *coap_session)
Get the current server's PSK identity hint.
#define COAP_DTLS_PKI_SETUP_VERSION
Latest PKI setup version.
Definition: coap_dtls.h:307
@ COAP_DTLS_ROLE_SERVER
Internal function invoked for server.
Definition: coap_dtls.h:46
unsigned int coap_encode_var_safe(uint8_t *buf, size_t length, unsigned int val)
Encodes multiple-length byte sequences.
Definition: coap_encode.c:47
unsigned int coap_decode_var_bytes(const uint8_t *buf, size_t len)
Decodes multiple-length byte sequences.
Definition: coap_encode.c:38
uint64_t coap_decode_var_bytes8(const uint8_t *buf, size_t len)
Decodes multiple-length byte sequences.
Definition: coap_encode.c:67
unsigned int coap_encode_var_safe8(uint8_t *buf, size_t length, uint64_t val)
Encodes multiple-length byte sequences.
Definition: coap_encode.c:77
coap_event_t
Scalar type to represent different events, e.g.
Definition: coap_event.h:34
@ COAP_EVENT_OSCORE_DECODE_ERROR
Triggered when there is an OSCORE decode of OSCORE option failure.
Definition: coap_event.h:118
@ COAP_EVENT_SESSION_CONNECTED
Triggered when TCP layer completes exchange of CSM information.
Definition: coap_event.h:61
@ COAP_EVENT_OSCORE_INTERNAL_ERROR
Triggered when there is an OSCORE internal error i.e malloc failed.
Definition: coap_event.h:116
@ COAP_EVENT_DTLS_CLOSED
Triggerred when (D)TLS session closed.
Definition: coap_event.h:39
@ COAP_EVENT_TCP_FAILED
Triggered when TCP layer fails for some reason.
Definition: coap_event.h:55
@ COAP_EVENT_WS_CONNECTED
Triggered when the WebSockets layer is up.
Definition: coap_event.h:125
@ COAP_EVENT_DTLS_CONNECTED
Triggered when (D)TLS session connected.
Definition: coap_event.h:41
@ COAP_EVENT_SESSION_FAILED
Triggered when TCP layer fails following exchange of CSM information.
Definition: coap_event.h:65
@ COAP_EVENT_PARTIAL_BLOCK
Triggered when not all of a large body has been received.
Definition: coap_event.h:71
@ COAP_EVENT_XMIT_BLOCK_FAIL
Triggered when not all of a large body has been transmitted.
Definition: coap_event.h:73
@ COAP_EVENT_SERVER_SESSION_NEW
Called in the CoAP IO loop if a new server-side session is created due to an incoming connection.
Definition: coap_event.h:85
@ COAP_EVENT_OSCORE_NOT_ENABLED
Triggered when trying to use OSCORE to decrypt, but it is not enabled.
Definition: coap_event.h:110
@ COAP_EVENT_WS_CLOSED
Triggered when the WebSockets layer is closed.
Definition: coap_event.h:127
@ COAP_EVENT_SESSION_CLOSED
Triggered when TCP layer closes following exchange of CSM information.
Definition: coap_event.h:63
@ COAP_EVENT_SERVER_SESSION_DEL
Called in the CoAP IO loop if a server session is deleted (e.g., due to inactivity or because the max...
Definition: coap_event.h:94
@ COAP_EVENT_OSCORE_NO_SECURITY
Triggered when there is no OSCORE security definition found.
Definition: coap_event.h:114
@ COAP_EVENT_DTLS_RENEGOTIATE
Triggered when (D)TLS session renegotiated.
Definition: coap_event.h:43
@ COAP_EVENT_BAD_PACKET
Triggered when badly formatted packet received.
Definition: coap_event.h:100
@ COAP_EVENT_MSG_RETRANSMITTED
Triggered when a message is retransmitted.
Definition: coap_event.h:102
@ COAP_EVENT_OSCORE_NO_PROTECTED_PAYLOAD
Triggered when there is no OSCORE encrypted payload provided.
Definition: coap_event.h:112
@ COAP_EVENT_TCP_CLOSED
Triggered when TCP layer is closed.
Definition: coap_event.h:53
@ COAP_EVENT_WS_PACKET_SIZE
Triggered when there is an oversize WebSockets packet.
Definition: coap_event.h:123
@ COAP_EVENT_TCP_CONNECTED
Triggered when TCP layer connects.
Definition: coap_event.h:51
@ COAP_EVENT_OSCORE_DECRYPTION_FAILURE
Triggered when there is an OSCORE decryption failure.
Definition: coap_event.h:108
@ COAP_EVENT_KEEPALIVE_FAILURE
Triggered when no response to a keep alive (ping) packet.
Definition: coap_event.h:132
@ COAP_EVENT_DTLS_ERROR
Triggered when (D)TLS error occurs.
Definition: coap_event.h:45
coap_mutex_t coap_lock_t
#define coap_lock_callback_ret_release(r, c, func, failed)
Dummy for no thread-safe code.
#define coap_lock_callback_release(c, func, failed)
Dummy for no thread-safe code.
#define coap_lock_unlock(c)
Dummy for no thread-safe code.
#define coap_lock_lock(c, failed)
Dummy for no thread-safe code.
#define coap_lock_callback(c, func)
Dummy for no thread-safe code.
#define coap_lock_check_locked(c)
Dummy for no thread-safe code.
#define coap_lock_init()
Dummy for no thread-safe code.
#define coap_lock_callback_ret(r, c, func)
Dummy for no thread-safe code.
#define coap_log_debug(...)
Definition: coap_debug.h:120
#define coap_log_alert(...)
Definition: coap_debug.h:84
void coap_show_pdu(coap_log_t level, const coap_pdu_t *pdu)
Display the contents of the specified pdu.
Definition: coap_debug.c:784
#define coap_log_emerg(...)
Definition: coap_debug.h:81
size_t coap_print_addr(const coap_address_t *addr, unsigned char *buf, size_t len)
Print the address into the defined buffer.
Definition: coap_debug.c:239
const char * coap_endpoint_str(const coap_endpoint_t *endpoint)
Get endpoint description.
const char * coap_session_str(const coap_session_t *session)
Get session description.
#define coap_log_info(...)
Definition: coap_debug.h:108
#define coap_log_warn(...)
Definition: coap_debug.h:102
#define coap_log_err(...)
Definition: coap_debug.h:96
@ COAP_LOG_DEBUG
Definition: coap_debug.h:58
int coap_netif_strm_connect2(coap_session_t *session)
Layer function interface for Netif stream connect (tcp).
ssize_t coap_netif_dgrm_read(coap_session_t *session, coap_packet_t *packet)
Function interface for layer data datagram receiving for sessions.
Definition: coap_netif.c:72
ssize_t coap_netif_dgrm_read_ep(coap_endpoint_t *endpoint, coap_packet_t *packet)
Function interface for layer data datagram receiving for endpoints.
int coap_netif_available(coap_session_t *session)
Function interface to check whether netif for session is still available.
Definition: coap_netif.c:25
#define COAP_OBSERVE_CANCEL
The value COAP_OBSERVE_CANCEL in a GET/FETCH request option COAP_OPTION_OBSERVE indicates that the ob...
#define COAP_OBSERVE_ESTABLISH
The value COAP_OBSERVE_ESTABLISH in a GET/FETCH request option COAP_OPTION_OBSERVE indicates a new ob...
coap_opt_t * coap_option_next(coap_opt_iterator_t *oi)
Updates the iterator oi to point to the next option.
Definition: coap_option.c:153
uint32_t coap_opt_length(const coap_opt_t *opt)
Returns the length of the given option.
Definition: coap_option.c:212
coap_opt_iterator_t * coap_option_iterator_init(const coap_pdu_t *pdu, coap_opt_iterator_t *oi, const coap_opt_filter_t *filter)
Initializes the given option iterator oi to point to the beginning of the pdu's option list.
Definition: coap_option.c:117
#define COAP_OPT_ALL
Pre-defined filter that includes all options.
Definition: coap_option.h:108
int coap_option_filter_unset(coap_opt_filter_t *filter, coap_option_num_t option)
Clears the corresponding entry for number in filter.
Definition: coap_option.c:501
void coap_option_filter_clear(coap_opt_filter_t *filter)
Clears filter filter.
Definition: coap_option.c:491
coap_opt_t * coap_check_option(const coap_pdu_t *pdu, coap_option_num_t number, coap_opt_iterator_t *oi)
Retrieves the first option of number number from pdu.
Definition: coap_option.c:199
const uint8_t * coap_opt_value(const coap_opt_t *opt)
Returns a pointer to the value of the given option.
Definition: coap_option.c:249
int coap_option_filter_get(coap_opt_filter_t *filter, coap_option_num_t option)
Checks if number is contained in filter.
Definition: coap_option.c:506
int coap_option_filter_set(coap_opt_filter_t *filter, coap_option_num_t option)
Sets the corresponding entry for number in filter.
Definition: coap_option.c:496
coap_pdu_t * coap_oscore_new_pdu_encrypted_lkd(coap_session_t *session, coap_pdu_t *pdu, coap_bin_const_t *kid_context, oscore_partial_iv_t send_partial_iv)
Encrypts the specified pdu when OSCORE encryption is required on session.
struct coap_pdu_t * coap_oscore_decrypt_pdu(coap_session_t *session, coap_pdu_t *pdu)
Decrypts the OSCORE-encrypted parts of pdu when OSCORE is used.
int coap_rebuild_pdu_for_proxy(coap_pdu_t *pdu)
Convert PDU to use Proxy-Scheme option if Proxy-Uri option is present.
void coap_delete_all_oscore(coap_context_t *context)
Cleanup all allocated OSCORE information.
#define COAP_PDU_IS_RESPONSE(pdu)
#define COAP_TOKEN_EXT_2B_TKL
size_t coap_insert_option(coap_pdu_t *pdu, coap_option_num_t number, size_t len, const uint8_t *data)
Inserts option of given number in the pdu with the appropriate data.
Definition: coap_pdu.c:619
int coap_remove_option(coap_pdu_t *pdu, coap_option_num_t number)
Removes (first) option of given number from the pdu.
Definition: coap_pdu.c:482
#define COAP_DROPPED_RESPONSE
Indicates that a response is suppressed.
int coap_pdu_parse_header(coap_pdu_t *pdu, coap_proto_t proto)
Decode the protocol specific header for the specified PDU.
Definition: coap_pdu.c:1066
size_t coap_pdu_parse_header_size(coap_proto_t proto, const uint8_t *data)
Interprets data to determine the number of bytes in the header.
Definition: coap_pdu.c:982
#define COAP_PDU_DELAYED
#define COAP_PDU_IS_EMPTY(pdu)
#define COAP_PDU_IS_SIGNALING(pdu)
int coap_option_check_repeatable(coap_option_num_t number)
Check whether the option is allowed to be repeated or not.
Definition: coap_pdu.c:576
int coap_pdu_parse_opt(coap_pdu_t *pdu)
Verify consistency in the given CoAP PDU structure and locate the data.
Definition: coap_pdu.c:1328
size_t coap_update_option(coap_pdu_t *pdu, coap_option_num_t number, size_t len, const uint8_t *data)
Updates existing first option of given number in the pdu with the new data.
Definition: coap_pdu.c:713
#define COAP_TOKEN_EXT_1B_TKL
size_t coap_pdu_encode_header(coap_pdu_t *pdu, coap_proto_t proto)
Compose the protocol specific header for the specified PDU.
Definition: coap_pdu.c:1478
#define COAP_DEFAULT_VERSION
size_t coap_pdu_parse_size(coap_proto_t proto, const uint8_t *data, size_t length)
Parses data to extract the message size.
Definition: coap_pdu.c:1013
int coap_pdu_resize(coap_pdu_t *pdu, size_t new_size)
Dynamically grows the size of pdu to new_size.
Definition: coap_pdu.c:290
#define COAP_PDU_IS_REQUEST(pdu)
size_t coap_add_option_internal(coap_pdu_t *pdu, coap_option_num_t number, size_t len, const uint8_t *data)
Adds option of given number to pdu that is passed as first parameter.
Definition: coap_pdu.c:769
#define COAP_OPTION_HOP_LIMIT
Definition: coap_pdu.h:133
#define COAP_OPTION_NORESPONSE
Definition: coap_pdu.h:145
#define COAP_OPTION_URI_HOST
Definition: coap_pdu.h:120
#define COAP_OPTION_IF_MATCH
Definition: coap_pdu.h:119
#define COAP_OPTION_BLOCK2
Definition: coap_pdu.h:137
const char * coap_response_phrase(unsigned char code)
Returns a human-readable response phrase for the specified CoAP response code.
Definition: coap_pdu.c:940
#define COAP_OPTION_CONTENT_FORMAT
Definition: coap_pdu.h:128
#define COAP_OPTION_BLOCK1
Definition: coap_pdu.h:138
#define COAP_OPTION_Q_BLOCK1
Definition: coap_pdu.h:135
#define COAP_OPTION_PROXY_SCHEME
Definition: coap_pdu.h:142
#define COAP_OPTION_URI_QUERY
Definition: coap_pdu.h:132
void coap_delete_pdu(coap_pdu_t *pdu)
Dispose of an CoAP PDU and frees associated storage.
Definition: coap_pdu.c:183
int coap_mid_t
coap_mid_t is used to store the CoAP Message ID of a CoAP PDU.
Definition: coap_pdu.h:263
#define COAP_TOKEN_DEFAULT_MAX
Definition: coap_pdu.h:56
#define COAP_OPTION_IF_NONE_MATCH
Definition: coap_pdu.h:122
#define COAP_TOKEN_EXT_MAX
Definition: coap_pdu.h:60
#define COAP_OPTION_URI_PATH
Definition: coap_pdu.h:127
#define COAP_SIGNALING_OPTION_EXTENDED_TOKEN_LENGTH
Definition: coap_pdu.h:199
#define COAP_RESPONSE_CODE(N)
Definition: coap_pdu.h:160
#define COAP_RESPONSE_CLASS(C)
Definition: coap_pdu.h:163
coap_pdu_code_t
Set of codes available for a PDU.
Definition: coap_pdu.h:326
#define COAP_OPTION_OSCORE
Definition: coap_pdu.h:126
coap_pdu_type_t
CoAP PDU message type definitions.
Definition: coap_pdu.h:68
#define COAP_SIGNALING_OPTION_BLOCK_WISE_TRANSFER
Definition: coap_pdu.h:198
int coap_add_token(coap_pdu_t *pdu, size_t len, const uint8_t *data)
Adds token of length len to pdu.
Definition: coap_pdu.c:349
#define COAP_OPTION_Q_BLOCK2
Definition: coap_pdu.h:140
#define COAP_SIGNALING_OPTION_CUSTODY
Definition: coap_pdu.h:202
int coap_pdu_parse(coap_proto_t proto, const uint8_t *data, size_t length, coap_pdu_t *pdu)
Parses data into the CoAP PDU structure given in result.
Definition: coap_pdu.c:1455
#define COAP_OPTION_RTAG
Definition: coap_pdu.h:146
#define COAP_OPTION_URI_PORT
Definition: coap_pdu.h:124
coap_pdu_t * coap_pdu_init(coap_pdu_type_t type, coap_pdu_code_t code, coap_mid_t mid, size_t size)
Creates a new CoAP PDU with at least enough storage space for the given size maximum message size.
Definition: coap_pdu.c:99
#define COAP_OPTION_ACCEPT
Definition: coap_pdu.h:134
#define COAP_INVALID_MID
Indicates an invalid message id.
Definition: coap_pdu.h:266
#define COAP_OPTION_PROXY_URI
Definition: coap_pdu.h:141
#define COAP_OPTION_OBSERVE
Definition: coap_pdu.h:123
#define COAP_DEFAULT_URI_WELLKNOWN
well-known resources URI
Definition: coap_pdu.h:53
#define COAP_BERT_BASE
Definition: coap_pdu.h:44
#define COAP_OPTION_ECHO
Definition: coap_pdu.h:144
#define COAP_MEDIATYPE_APPLICATION_LINK_FORMAT
Definition: coap_pdu.h:214
#define COAP_SIGNALING_OPTION_MAX_MESSAGE_SIZE
Definition: coap_pdu.h:197
int coap_add_data(coap_pdu_t *pdu, size_t len, const uint8_t *data)
Adds given data to the pdu that is passed as first parameter.
Definition: coap_pdu.c:834
@ COAP_REQUEST_GET
Definition: coap_pdu.h:79
@ COAP_PROTO_WS
Definition: coap_pdu.h:318
@ COAP_PROTO_DTLS
Definition: coap_pdu.h:315
@ COAP_PROTO_UDP
Definition: coap_pdu.h:314
@ COAP_PROTO_WSS
Definition: coap_pdu.h:319
@ COAP_SIGNALING_CODE_ABORT
Definition: coap_pdu.h:369
@ COAP_SIGNALING_CODE_CSM
Definition: coap_pdu.h:365
@ COAP_SIGNALING_CODE_PING
Definition: coap_pdu.h:366
@ COAP_REQUEST_CODE_DELETE
Definition: coap_pdu.h:332
@ COAP_SIGNALING_CODE_PONG
Definition: coap_pdu.h:367
@ COAP_EMPTY_CODE
Definition: coap_pdu.h:327
@ COAP_REQUEST_CODE_GET
Definition: coap_pdu.h:329
@ COAP_SIGNALING_CODE_RELEASE
Definition: coap_pdu.h:368
@ COAP_REQUEST_CODE_FETCH
Definition: coap_pdu.h:333
@ COAP_MESSAGE_NON
Definition: coap_pdu.h:70
@ COAP_MESSAGE_ACK
Definition: coap_pdu.h:71
@ COAP_MESSAGE_CON
Definition: coap_pdu.h:69
@ COAP_MESSAGE_RST
Definition: coap_pdu.h:72
void coap_connect_session(coap_session_t *session, coap_tick_t now)
ssize_t coap_session_delay_pdu(coap_session_t *session, coap_pdu_t *pdu, coap_queue_t *node)
Definition: coap_session.c:698
#define COAP_DEFAULT_LEISURE_TICKS(s)
The DEFAULT_LEISURE definition for the session (s).
void coap_handle_nack(coap_session_t *session, coap_pdu_t *sent, const coap_nack_reason_t reason, const coap_mid_t mid)
Definition: coap_session.c:907
size_t coap_session_max_pdu_rcv_size(const coap_session_t *session)
Get maximum acceptable receive PDU size.
Definition: coap_session.c:629
coap_session_t * coap_endpoint_get_session(coap_endpoint_t *endpoint, const coap_packet_t *packet, coap_tick_t now)
Lookup the server session for the packet received on an endpoint, or create a new one.
void coap_free_endpoint_lkd(coap_endpoint_t *endpoint)
Release an endpoint and all the structures associated with it.
void coap_read_session(coap_context_t *ctx, coap_session_t *session, coap_tick_t now)
Definition: coap_net.c:2225
#define COAP_NSTART(s)
#define COAP_MAX_PAYLOADS(s)
void coap_session_connected(coap_session_t *session)
Notify session that it has just connected or reconnected.
Definition: coap_session.c:818
ssize_t coap_session_send_pdu(coap_session_t *session, coap_pdu_t *pdu)
Send a pdu according to the session's protocol.
Definition: coap_net.c:1001
size_t coap_session_max_pdu_size_lkd(const coap_session_t *session)
Get maximum acceptable PDU size.
Definition: coap_session.c:655
void coap_session_release_lkd(coap_session_t *session)
Decrement reference counter on a session.
Definition: coap_session.c:376
coap_session_t * coap_session_reference_lkd(coap_session_t *session)
Increment reference counter on a session.
Definition: coap_session.c:356
void coap_session_disconnected_lkd(coap_session_t *session, coap_nack_reason_t reason)
Notify session that it has failed.
Definition: coap_session.c:939
coap_endpoint_t * coap_new_endpoint_lkd(coap_context_t *context, const coap_address_t *listen_addr, coap_proto_t proto)
Create a new endpoint for communicating with peers.
coap_session_t * coap_new_server_session(coap_context_t *ctx, coap_endpoint_t *ep, void *extra)
Creates a new server session for the specified endpoint.
@ COAP_EXT_T_NOT_CHECKED
Not checked.
@ COAP_EXT_T_CHECKING
Token size check request sent.
@ COAP_EXT_T_CHECKED
Token size valid.
void coap_session_set_mtu(coap_session_t *session, unsigned mtu)
Set the session MTU.
Definition: coap_session.c:683
coap_session_state_t
coap_session_state_t values
Definition: coap_session.h:55
#define COAP_PROTO_NOT_RELIABLE(p)
Definition: coap_session.h:37
#define COAP_PROTO_RELIABLE(p)
Definition: coap_session.h:38
@ COAP_SESSION_TYPE_HELLO
server-side ephemeral session for responding to a client hello
Definition: coap_session.h:48
@ COAP_SESSION_TYPE_CLIENT
client-side
Definition: coap_session.h:46
@ COAP_SESSION_STATE_CSM
Definition: coap_session.h:59
@ COAP_SESSION_STATE_ESTABLISHED
Definition: coap_session.h:60
@ COAP_SESSION_STATE_NONE
Definition: coap_session.h:56
void coap_delete_bin_const(coap_bin_const_t *s)
Deletes the given const binary data and releases any memory allocated.
Definition: coap_str.c:120
coap_binary_t * coap_new_binary(size_t size)
Returns a new binary object with at least size bytes storage allocated.
Definition: coap_str.c:77
coap_bin_const_t * coap_new_bin_const(const uint8_t *data, size_t size)
Take the specified byte array (text) and create a coap_bin_const_t * Returns a new const binary objec...
Definition: coap_str.c:110
void coap_delete_binary(coap_binary_t *s)
Deletes the given coap_binary_t object and releases any memory allocated.
Definition: coap_str.c:105
#define coap_binary_equal(binary1, binary2)
Compares the two binary data for equality.
Definition: coap_str.h:211
#define coap_string_equal(string1, string2)
Compares the two strings for equality.
Definition: coap_str.h:197
coap_string_t * coap_new_string(size_t size)
Returns a new string object with at least size+1 bytes storage allocated.
Definition: coap_str.c:21
void coap_delete_string(coap_string_t *s)
Deletes the given string and releases any memory allocated.
Definition: coap_str.c:46
int coap_delete_observer_request(coap_resource_t *resource, coap_session_t *session, const coap_bin_const_t *token, coap_pdu_t *request)
Removes any subscription for session observer from resource and releases the allocated storage.
void coap_persist_cleanup(coap_context_t *context)
Close down persist tracking, releasing any memory used.
int coap_delete_observer(coap_resource_t *resource, coap_session_t *session, const coap_bin_const_t *token)
Removes any subscription for session observer from resource and releases the allocated storage.
int coap_cancel_observe_lkd(coap_session_t *session, coap_binary_t *token, coap_pdu_type_t message_type)
Cancel an observe that is being tracked by the client large receive logic.
void coap_handle_failed_notify(coap_context_t *context, coap_session_t *session, const coap_bin_const_t *token)
Handles a failed observe notify.
coap_subscription_t * coap_add_observer(coap_resource_t *resource, coap_session_t *session, const coap_bin_const_t *token, const coap_pdu_t *pdu)
Adds the specified peer as observer for resource.
void coap_touch_observer(coap_context_t *context, coap_session_t *session, const coap_bin_const_t *token)
Flags that data is ready to be sent to observers.
int coap_epoll_is_supported(void)
Determine whether epoll is supported or not.
Definition: coap_net.c:567
int coap_tls_is_supported(void)
Check whether TLS is available.
Definition: coap_notls.c:41
int coap_af_unix_is_supported(void)
Check whether socket type AF_UNIX is available.
Definition: coap_net.c:621
int coap_ipv6_is_supported(void)
Check whether IPv6 is available.
Definition: coap_net.c:594
int coap_threadsafe_is_supported(void)
Determine whether libcoap is threadsafe or not.
Definition: coap_net.c:576
int coap_dtls_is_supported(void)
Check whether DTLS is available.
Definition: coap_notls.c:36
int coap_server_is_supported(void)
Check whether Server code is available.
Definition: coap_net.c:612
int coap_client_is_supported(void)
Check whether Client code is available.
Definition: coap_net.c:603
int coap_ipv4_is_supported(void)
Check whether IPv4 is available.
Definition: coap_net.c:585
coap_string_t * coap_get_uri_path(const coap_pdu_t *request)
Extract uri_path string from request PDU.
Definition: coap_uri.c:985
int coap_split_proxy_uri(const uint8_t *str_var, size_t len, coap_uri_t *uri)
Parses a given string into URI components.
Definition: coap_uri.c:276
coap_string_t * coap_get_query(const coap_pdu_t *request)
Extract query string from request PDU according to escape rules in 6.5.8.
Definition: coap_uri.c:934
#define COAP_UNUSED
Definition: libcoap.h:70
#define COAP_STATIC_INLINE
Definition: libcoap.h:53
coap_address_t remote
remote address and port
Definition: coap_io.h:56
coap_address_t local
local address and port
Definition: coap_io.h:57
Multi-purpose address abstraction.
Definition: coap_address.h:148
struct sockaddr_in sin
Definition: coap_address.h:152
struct sockaddr_in6 sin6
Definition: coap_address.h:153
struct sockaddr sa
Definition: coap_address.h:151
union coap_address_t::@0 addr
CoAP binary data definition with const data.
Definition: coap_str.h:64
size_t length
length of binary data
Definition: coap_str.h:65
const uint8_t * s
read-only binary data
Definition: coap_str.h:66
CoAP binary data definition.
Definition: coap_str.h:56
size_t length
length of binary data
Definition: coap_str.h:57
uint8_t * s
binary data
Definition: coap_str.h:58
Structure of Block options with BERT support.
Definition: coap_block.h:51
unsigned int num
block number
Definition: coap_block.h:52
unsigned int bert
Operating as BERT.
Definition: coap_block.h:57
unsigned int aszx
block size (0-7 including BERT
Definition: coap_block.h:55
unsigned int m
1 if more blocks follow, 0 otherwise
Definition: coap_block.h:53
unsigned int szx
block size (0-6)
Definition: coap_block.h:54
The CoAP stack's global state is stored in a coap_context_t object.
coap_tick_t sendqueue_basetime
The time stamp in the first element of the sendqeue is relative to sendqueue_basetime.
coap_pong_handler_t pong_handler
Called when a ping response is received.
void * app
application-specific data
coap_session_t * sessions
client sessions
coap_nack_handler_t nack_handler
Called when a response issue has occurred.
unsigned int ping_timeout
Minimum inactivity time before sending a ping message.
coap_resource_t * resources
hash table or list of known resources
uint16_t * cache_ignore_options
CoAP options to ignore when creating a cache-key.
coap_opt_filter_t known_options
coap_ping_handler_t ping_handler
Called when a CoAP ping is received.
uint32_t csm_max_message_size
Value for CSM Max-Message-Size.
size_t cache_ignore_count
The number of CoAP options to ignore when creating a cache-key.
unsigned int max_handshake_sessions
Maximum number of simultaneous negotating sessions per endpoint.
coap_queue_t * sendqueue
uint32_t max_token_size
Largest token size supported RFC8974.
coap_response_handler_t response_handler
Called when a response is received.
coap_cache_entry_t * cache
CoAP cache-entry cache.
uint8_t mcast_per_resource
Mcast controlled on a per resource basis.
coap_endpoint_t * endpoint
the endpoints used for listening
uint32_t csm_timeout_ms
Timeout for waiting for a CSM from the remote side.
coap_event_handler_t handle_event
Callback function that is used to signal events to the application.
unsigned int session_timeout
Number of seconds of inactivity after which an unused session will be closed.
uint32_t block_mode
Zero or more COAP_BLOCK_ or'd options.
coap_resource_t * proxy_uri_resource
can be used for handling proxy URI resources
coap_dtls_spsk_t spsk_setup_data
Contains the initial PSK server setup data.
coap_resource_t * unknown_resource
can be used for handling unknown resources
unsigned int max_idle_sessions
Maximum number of simultaneous unused sessions per endpoint.
coap_bin_const_t key
Definition: coap_dtls.h:381
coap_bin_const_t identity
Definition: coap_dtls.h:380
coap_dtls_cpsk_info_t psk_info
Client PSK definition.
Definition: coap_dtls.h:443
The structure used for defining the PKI setup data to be used.
Definition: coap_dtls.h:312
uint8_t version
Definition: coap_dtls.h:313
coap_bin_const_t hint
Definition: coap_dtls.h:451
coap_bin_const_t key
Definition: coap_dtls.h:452
The structure used for defining the Server PSK setup data to be used.
Definition: coap_dtls.h:501
coap_dtls_spsk_info_t psk_info
Server PSK definition.
Definition: coap_dtls.h:533
Abstraction of virtual endpoint that can be attached to coap_context_t.
coap_context_t * context
endpoint's context
coap_session_t * sessions
hash table or list of active sessions
coap_address_t bind_addr
local interface address
coap_socket_t sock
socket object for the interface, if any
coap_proto_t proto
protocol used on this interface
uint64_t state_token
state token
coap_binary_t * app_token
original PDU token
coap_layer_read_t l_read
coap_layer_write_t l_write
coap_layer_establish_t l_establish
Structure to hold large body (many blocks) client receive information.
uint64_t state_token
state token
coap_binary_t * app_token
app requesting PDU token
Structure to hold large body (many blocks) server receive information.
Structure to hold large body (many blocks) transmission information.
union coap_lg_xmit_t::@1 b
coap_pdu_t pdu
skeletal PDU
coap_l_block1_t b1
uint16_t option
large block transmisson CoAP option
Iterator to run through PDU options.
Definition: coap_option.h:168
coap_option_num_t number
decoded option number
Definition: coap_option.h:170
size_t length
length of payload
coap_addr_tuple_t addr_info
local and remote addresses
unsigned char * payload
payload
structure for CoAP PDUs
uint8_t * token
first byte of token (or extended length bytes prefix), if any, or options
coap_lg_xmit_t * lg_xmit
Holds ptr to lg_xmit if sending a set of blocks.
size_t max_size
maximum size for token, options and payload, or zero for variable size pdu
unsigned ref
reference count
coap_pdu_code_t code
request method (value 1–31) or response code (value 64-255)
uint8_t hdr_size
actual size used for protocol-specific header (0 until header is encoded)
coap_bin_const_t actual_token
Actual token in pdu.
uint8_t * data
first byte of payload, if any
coap_mid_t mid
message id, if any, in regular host byte order
uint32_t e_token_length
length of Token space (includes leading extended bytes
size_t used_size
used bytes of storage for token, options and payload
uint8_t crit_opt
Set if unknown critical option for proxy.
size_t alloc_size
allocated storage for token, options and payload
coap_session_t * session
Session responsible for PDU or NULL.
coap_pdu_type_t type
message type
Queue entry.
coap_session_t * session
the CoAP session
coap_pdu_t * pdu
the CoAP PDU to send
unsigned int timeout
the randomized timeout value
uint8_t is_mcast
Set if this is a queued mcast response.
struct coap_queue_t * next
coap_mid_t id
CoAP message id.
coap_tick_t t
when to send PDU for the next time
unsigned char retransmit_cnt
retransmission counter, will be removed when zero
Abstraction of resource that can be attached to coap_context_t.
coap_str_const_t ** proxy_name_list
Array valid names this host is known by (proxy support)
coap_str_const_t * uri_path
Request URI Path for this resource.
unsigned int observe
The next value for the Observe option.
coap_method_handler_t handler[7]
Used to store handlers for the seven coap methods GET, POST, PUT, DELETE, FETCH, PATCH and IPATCH.
unsigned int is_proxy_uri
resource created for proxy URI handler
unsigned int is_unknown
resource created for unknown handler
unsigned int observable
can be observed
size_t proxy_name_count
Count of valid names this host is known by (proxy support)
int flags
zero or more COAP_RESOURCE_FLAGS_* or'd together
Abstraction of virtual session that can be attached to coap_context_t (client) or coap_endpoint_t (se...
coap_lg_xmit_t * lg_xmit
list of large transmissions
volatile uint8_t max_token_checked
Check for max token size coap_ext_token_check_t.
uint8_t csm_not_seen
Set if timeout waiting for CSM.
coap_bin_const_t * psk_key
If client, this field contains the current pre-shared key for server; When this field is NULL,...
uint32_t block_mode
Zero or more COAP_BLOCK_ or'd options.
uint8_t doing_first
Set if doing client's first request.
uint8_t delay_recursive
Set if in coap_client_delay_first()
coap_socket_t sock
socket object for the session, if any
coap_pdu_t * partial_pdu
incomplete incoming pdu
uint32_t max_token_size
Largest token size supported RFC8974.
coap_bin_const_t * psk_identity
If client, this field contains the current identity for server; When this field is NULL,...
coap_session_state_t state
current state of relationship with peer
uint8_t csm_bert_rem_support
CSM TCP BERT blocks supported (remote)
coap_mid_t remote_test_mid
mid used for checking remote support
uint8_t read_header[8]
storage space for header of incoming message header
coap_addr_tuple_t addr_info
remote/local address info
coap_proto_t proto
protocol used
unsigned ref
reference count from queues
coap_response_t last_con_handler_res
The result of calling the response handler of the last CON.
coap_bin_const_t * psk_hint
If client, this field contains the server provided identity hint.
coap_bin_const_t * last_token
uint8_t doing_send_recv
Set if coap_send_recv() active.
coap_dtls_cpsk_t cpsk_setup_data
client provided PSK initial setup data
size_t mtu
path or CSM mtu (xmt)
size_t partial_read
if > 0 indicates number of bytes already read for an incoming message
void * tls
security parameters
uint16_t max_retransmit
maximum re-transmit count (default 4)
uint8_t csm_block_supported
CSM TCP blocks supported.
uint8_t proxy_session
Set if this is an ongoing proxy session.
uint8_t con_active
Active CON request sent.
coap_queue_t * delayqueue
list of delayed messages waiting to be sent
uint32_t tx_rtag
Next Request-Tag number to use.
coap_mid_t last_ping_mid
the last keepalive message id that was used in this session
coap_lg_srcv_t * lg_srcv
Server list of expected large receives.
coap_bin_const_t * req_token
Token in request pdu of coap_send_recv()
coap_pdu_t * resp_pdu
PDU returned in coap_send_recv() call.
coap_lg_crcv_t * lg_crcv
Client list of expected large receives.
coap_mid_t last_con_mid
The last CON mid that has been been processed.
coap_session_type_t type
client or server side socket
coap_mid_t last_ack_mid
The last ACK mid that has been been processed.
coap_context_t * context
session's context
size_t partial_write
if > 0 indicates number of bytes already written from the pdu at the head of sendqueue
coap_bin_const_t * echo
last token used to make a request
coap_layer_func_t lfunc[COAP_LAYER_LAST]
Layer functions to use.
coap_session_t * session
Used to determine session owner.
coap_endpoint_t * endpoint
Used by the epoll logic for a listening endpoint.
coap_address_t mcast_addr
remote address and port (multicast track)
coap_socket_flags_t flags
1 or more of COAP_SOCKET* flag values
CoAP string data definition with const data.
Definition: coap_str.h:46
const uint8_t * s
read-only string data
Definition: coap_str.h:48
size_t length
length of string
Definition: coap_str.h:47
CoAP string data definition.
Definition: coap_str.h:38
uint8_t * s
string data
Definition: coap_str.h:40
size_t length
length of string
Definition: coap_str.h:39
Number of notifications that may be sent non-confirmable before a confirmable message is sent to dete...
struct coap_session_t * session
subscriber session
coap_pdu_t * pdu
cache_key to identify requester
Representation of parsed URI.
Definition: coap_uri.h:65
coap_str_const_t host
The host part of the URI.
Definition: coap_uri.h:66