libcoap 4.3.5-develop-72190a8
Loading...
Searching...
No Matches
coap_session.c
Go to the documentation of this file.
1/* coap_session.c -- Session management for libcoap
2 *
3 * Copyright (C) 2017 Jean-Claue Michelou <jcm@spinetix.com>
4 * Copyright (C) 2022-2024 Jon Shallow <supjps-libcoap@jpshallow.com>
5 *
6 * SPDX-License-Identifier: BSD-2-Clause
7 *
8 * This file is part of the CoAP library libcoap. Please see
9 * README for terms of use.
10 */
11
18
19#ifndef COAP_SESSION_C_
20#define COAP_SESSION_C_
21
22#include <stdio.h>
23
24#ifdef COAP_EPOLL_SUPPORT
25#include <sys/epoll.h>
26#include <sys/timerfd.h>
27#endif /* COAP_EPOLL_SUPPORT */
28
32 uint32_t fr = fp1.fractional_part * fp2.fractional_part;
33
34 res.integer_part = fp1.integer_part * fp2.integer_part + fr/1000;
35 res.fractional_part = fr % 1000;
36 return res;
37}
38
42 uint32_t fr = fp1.fractional_part * u2;
43
44 res.integer_part = fp1.integer_part * u2 + fr/1000;
45 res.fractional_part = fr % 1000;
46 return res;
47}
48
52 uint32_t fr = fp1.fractional_part + fp2.fractional_part;
53
54 res.integer_part = fp1.integer_part + fp2.integer_part + fr/1000;
55 res.fractional_part = fr % 1000;
56 return res;
57}
58
61 coap_fixed_point_t res = fp1;
62
63 res.integer_part += u2;
64 return res;
65}
66
69 coap_fixed_point_t res = fp1;
70
71 res.integer_part -= u2;
72 return res;
73}
74
78 uint32_t num = (fp1.integer_part * 1000 + fp1.fractional_part) / u2;
79
80 res.integer_part = num / 1000;
81 res.fractional_part = num % 1000;
82 return res;
83}
84
85#if COAP_Q_BLOCK_SUPPORT
89 uint8_t ran;
90
91 coap_prng_lkd(&ran, sizeof(ran));
93 res = coap_multi_fixed_uint(res, ran);
94 res = coap_div_fixed_uint(res, 0xff);
95 res = coap_add_fixed_fixed(COAP_NON_TIMEOUT(session), res);
96 return res;
97}
98
104
105 return ticks;
106}
107
108/*
109 * Save away derived Congestion Control parameters for speed of access.
110 * They will get updated whenever a component variable is updated.
111 */
112
113/*
114 * NON_PROBING_WAIT = NON_TIMEOUT * ((2 ** NON_MAX_RETRANSMIT) - 1) *
115 * ACK_RANDOM_FACTOR + (2 * MAX_LATENCY) + NON_TIMEOUT_RANDOM
116 *
117 * Do not include NON_TIMEOUT_RANDOM as that changes
118 */
119static void
120coap_session_fix_non_probing_wait_base(coap_session_t *s) {
122
124 ((1 << (COAP_NON_MAX_RETRANSMIT(s) + 1)) -1));
128}
129
130/*
131 * NON_PARTIAL_TIMEOUT = NON_TIMEOUT * ((2 ** NON_MAX_RETRANSMIT) - 1) *
132 * ACK_RANDOM_FACTOR + (2 * MAX_LATENCY) + NON_TIMEOUT
133 */
134static void
135coap_session_fix_non_partial_timeout(coap_session_t *s) {
137
139 ((1 << (COAP_NON_MAX_RETRANSMIT(s) + 1)) -1));
144}
145#endif /* COAP_Q_BLOCK_SUPPORT */
146
147void
149 if (value.integer_part > 0 && value.fractional_part < 1000) {
150 session->ack_timeout = value;
151 coap_log_debug("***%s: session ack_timeout set to %u.%03u\n",
152 coap_session_str(session), session->ack_timeout.integer_part,
154 }
155}
156
157void
159 coap_fixed_point_t value) {
160 if (value.integer_part > 0 && value.fractional_part < 1000) {
161 session->ack_random_factor = value;
162 coap_log_debug("***%s: session ack_random_factor set to %u.%03u\n",
165#if COAP_Q_BLOCK_SUPPORT
166 coap_session_fix_non_probing_wait_base(session);
167 coap_session_fix_non_partial_timeout(session);
168#endif /* COAP_Q_BLOCK_SUPPORT */
169 }
170 return;
171}
172
173void
175 if (value > 0) {
176 session->max_retransmit = value;
177 coap_log_debug("***%s: session max_retransmit set to %u\n",
178 coap_session_str(session), session->max_retransmit);
179 }
180}
181
182void
183coap_session_set_nstart(coap_session_t *session, uint16_t value) {
184 if (value > 0) {
185 session->nstart = value;
186 coap_log_debug("***%s: session nstart set to %u\n",
187 coap_session_str(session), session->nstart);
188 }
189}
190
191void
193 coap_fixed_point_t value) {
194 if (value.integer_part > 0 && value.fractional_part < 1000) {
195 session->default_leisure = value;
196 coap_log_debug("***%s: session default_leisure set to %u.%03u\n",
199 }
200}
201
202void
204 if (value > 0) {
205 session->probing_rate = value;
206 coap_log_debug("***%s: session probing_rate set to %" PRIu32 "\n",
207 coap_session_str(session), session->probing_rate);
208 }
209}
210
211void
213#if COAP_Q_BLOCK_SUPPORT
214 if (value > 0) {
215 session->max_payloads = value;
216 coap_log_debug("***%s: session max_payloads set to %u\n",
217 coap_session_str(session), session->max_payloads);
218 coap_session_fix_non_probing_wait_base(session);
219 coap_session_fix_non_partial_timeout(session);
220 }
221#else /* ! COAP_Q_BLOCK_SUPPORT */
222 (void)session;
223 (void)value;
224#endif /* ! COAP_Q_BLOCK_SUPPORT */
225}
226
227void
229#if COAP_Q_BLOCK_SUPPORT
230 if (value > 0) {
231 session->non_max_retransmit = value;
232 coap_log_debug("***%s: session non_max_retransmit set to %u\n",
233 coap_session_str(session), session->non_max_retransmit);
234 coap_session_fix_non_probing_wait_base(session);
235 coap_session_fix_non_partial_timeout(session);
236 }
237#else /* ! COAP_Q_BLOCK_SUPPORT */
238 (void)session;
239 (void)value;
240#endif /* ! COAP_Q_BLOCK_SUPPORT */
241}
242
243void
245 coap_fixed_point_t value) {
246#if COAP_Q_BLOCK_SUPPORT
247 if (value.integer_part > 0 && value.fractional_part < 1000) {
248 session->non_timeout = value;
249 coap_log_debug("***%s: session non_timeout set to %u.%03u\n",
250 coap_session_str(session), session->non_timeout.integer_part,
251 session->non_timeout.fractional_part);
252 coap_session_fix_non_probing_wait_base(session);
253 coap_session_fix_non_partial_timeout(session);
254 }
255#else /* ! COAP_Q_BLOCK_SUPPORT */
256 (void)session;
257 (void)value;
258#endif /* ! COAP_Q_BLOCK_SUPPORT */
259}
260
261void
263 coap_fixed_point_t value) {
264#if COAP_Q_BLOCK_SUPPORT
265 if (value.integer_part > 0 && value.fractional_part < 1000)
266 session->non_receive_timeout = value;
267 coap_log_debug("***%s: session non_receive_timeout set to %u.%03u\n",
268 coap_session_str(session),
269 session->non_receive_timeout.integer_part,
270 session->non_receive_timeout.fractional_part);
271#else /* ! COAP_Q_BLOCK_SUPPORT */
272 (void)session;
273 (void)value;
274#endif /* ! COAP_Q_BLOCK_SUPPORT */
275}
276
279 return session->ack_timeout;
280}
281
284 return session->ack_random_factor;
285}
286
287uint16_t
289 return session->max_retransmit;
290}
291
292uint16_t
294 return session->nstart;
295}
296
299 return session->default_leisure;
300}
301
302uint32_t
304 return session->probing_rate;
305}
306
307uint16_t
309#if COAP_Q_BLOCK_SUPPORT
310 return session->max_payloads;
311#else /* ! COAP_Q_BLOCK_SUPPORT */
312 (void)session;
314#endif /* ! COAP_Q_BLOCK_SUPPORT */
315}
316
317uint16_t
319#if COAP_Q_BLOCK_SUPPORT
320 return session->non_max_retransmit;
321#else /* ! COAP_Q_BLOCK_SUPPORT */
322 (void)session;
324#endif /* ! COAP_Q_BLOCK_SUPPORT */
325}
326
329#if COAP_Q_BLOCK_SUPPORT
330 return session->non_timeout;
331#else /* ! COAP_Q_BLOCK_SUPPORT */
332 (void)session;
334#endif /* ! COAP_Q_BLOCK_SUPPORT */
335}
336
339#if COAP_Q_BLOCK_SUPPORT
340 return session->non_receive_timeout;
341#else /* ! COAP_Q_BLOCK_SUPPORT */
342 (void)session;
344#endif /* ! COAP_Q_BLOCK_SUPPORT */
345}
346
349 coap_lock_lock(session->context, return NULL);
351 coap_lock_unlock(session->context);
352 return session;
353}
354
357 ++session->ref;
358 return session;
359}
360
361COAP_API void
363 if (session) {
364#if COAP_THREAD_SAFE
365 coap_context_t *context = session->context;
366 (void)context;
367#endif /* COAP_THREAD_SAFE */
368
369 coap_lock_lock(context, return);
371 coap_lock_unlock(context);
372 }
373}
374
375void
377 if (session) {
379#ifndef __COVERITY__
380 assert(session->ref > 0);
381 if (session->ref > 0)
382 --session->ref;
383 if (session->ref == 0 && session->type == COAP_SESSION_TYPE_CLIENT)
384 coap_session_free(session);
385#else /* __COVERITY__ */
386 /* Coverity scan is fooled by the reference counter leading to
387 * false positives for USE_AFTER_FREE. */
388 --session->ref;
389 __coverity_negative_sink__(session->ref);
390 /* Indicate that resources are released properly. */
391 if (session->ref == 0 && session->type == COAP_SESSION_TYPE_CLIENT) {
392 __coverity_free__(session);
393 }
394#endif /* __COVERITY__ */
395 }
396}
397
398void
399coap_session_set_app_data(coap_session_t *session, void *app_data) {
400 assert(session);
401 session->app = app_data;
402}
403
404void *
406 assert(session);
407 return session->app;
408}
409
410static coap_session_t *
412 const coap_addr_hash_t *addr_hash,
413 const coap_address_t *local_addr,
414 const coap_address_t *remote_addr, int ifindex,
415 coap_context_t *context, coap_endpoint_t *endpoint) {
417 sizeof(coap_session_t));
418#if ! COAP_SERVER_SUPPORT
419 (void)endpoint;
420#endif /* ! COAP_SERVER_SUPPORT */
421 if (!session)
422 return NULL;
423 memset(session, 0, sizeof(*session));
424 session->proto = proto;
425 session->type = type;
426 if (addr_hash)
427 memcpy(&session->addr_hash, addr_hash, sizeof(session->addr_hash));
428 else
429 memset(&session->addr_hash, 0, sizeof(session->addr_hash));
430 if (local_addr)
431 coap_address_copy(&session->addr_info.local, local_addr);
432 else
434 if (remote_addr)
435 coap_address_copy(&session->addr_info.remote, remote_addr);
436 else
438 session->ifindex = ifindex;
439 session->context = context;
440#if COAP_SERVER_SUPPORT
441 session->endpoint = endpoint;
442 if (endpoint)
443 session->mtu = endpoint->default_mtu;
444 else
445#endif /* COAP_SERVER_SUPPORT */
447 session->block_mode = context->block_mode;
448 if (proto == COAP_PROTO_DTLS) {
449 session->tls_overhead = 29;
450 if (session->tls_overhead >= session->mtu) {
451 session->tls_overhead = session->mtu;
452 coap_log_err("DTLS overhead exceeds MTU\n");
453 }
454 }
458 session->nstart = COAP_DEFAULT_NSTART;
461#if COAP_Q_BLOCK_SUPPORT
462 session->max_payloads = COAP_DEFAULT_MAX_PAYLOADS;
463 session->non_max_retransmit = COAP_DEFAULT_NON_MAX_RETRANSMIT;
464 session->non_timeout = COAP_DEFAULT_NON_TIMEOUT;
465 session->non_receive_timeout = COAP_DEFAULT_NON_RECEIVE_TIMEOUT;
466 coap_session_fix_non_probing_wait_base(session);
467 coap_session_fix_non_partial_timeout(session);
468#endif /* COAP_Q_BLOCK_SUPPORT */
469 session->dtls_event = -1;
474 session->max_token_size = context->max_token_size; /* RFC8974 */
475 if (session->type != COAP_SESSION_TYPE_CLIENT)
477
478 /* Randomly initialize */
479 /* TCP/TLS have no notion of mid */
480 if (COAP_PROTO_NOT_RELIABLE(session->proto))
481 coap_prng_lkd((unsigned char *)&session->tx_mid, sizeof(session->tx_mid));
482 coap_prng_lkd((unsigned char *)&session->tx_rtag, sizeof(session->tx_rtag));
483
484 return session;
485}
486
487void
489 coap_queue_t *q, *tmp;
490 coap_lg_xmit_t *lq, *ltmp;
491
492#if COAP_CLIENT_SUPPORT
493 coap_lg_crcv_t *lg_crcv, *etmp;
494
495 /* Need to do this before (D)TLS and socket is closed down */
496 LL_FOREACH_SAFE(session->lg_crcv, lg_crcv, etmp) {
497 if (lg_crcv->observe_set && session->no_observe_cancel == 0) {
498 /* Need to close down observe */
499 if (coap_cancel_observe_lkd(session, lg_crcv->app_token, COAP_MESSAGE_NON)) {
500 /* Need to delete node we set up for NON */
501 coap_queue_t *queue = session->context->sendqueue;
502
503 while (queue) {
504 if (queue->session == session) {
506 break;
507 }
508 queue = queue->next;
509 }
510 }
511 }
512 LL_DELETE(session->lg_crcv, lg_crcv);
513 coap_block_delete_lg_crcv(session, lg_crcv);
514 }
515#endif /* COAP_CLIENT_SUPPORT */
516
517 if (session->partial_pdu)
519 if (session->sock.lfunc[COAP_LAYER_SESSION].l_close)
520 session->sock.lfunc[COAP_LAYER_SESSION].l_close(session);
521 if (session->psk_identity)
523 if (session->psk_key)
525 if (session->psk_hint)
527
528#if COAP_SERVER_SUPPORT
529 coap_cache_entry_t *cp, *ctmp;
530 HASH_ITER(hh, session->context->cache, cp, ctmp) {
531 /* cp->session is NULL if not session based */
532 if (cp->session == session) {
533 coap_delete_cache_entry(session->context, cp);
534 }
535 }
536#endif /* COAP_SERVER_SUPPORT */
537 LL_FOREACH_SAFE(session->delayqueue, q, tmp) {
538 if (q->pdu->type==COAP_MESSAGE_CON) {
539 coap_handle_nack(session, q->pdu,
540 session->proto == COAP_PROTO_DTLS ?
542 q->id);
543 }
545 }
546 LL_FOREACH_SAFE(session->lg_xmit, lq, ltmp) {
547 LL_DELETE(session->lg_xmit, lq);
548 coap_block_delete_lg_xmit(session, lq);
549 }
550#if COAP_SERVER_SUPPORT
551 coap_lg_srcv_t *sq, *stmp;
552
553 LL_FOREACH_SAFE(session->lg_srcv, sq, stmp) {
554 LL_DELETE(session->lg_srcv, sq);
555 coap_block_delete_lg_srcv(session, sq);
556 }
557#endif /* COAP_SERVER_SUPPORT */
558#if COAP_OSCORE_SUPPORT
560#endif /* COAP_OSCORE_SUPPORT */
561#if COAP_WS_SUPPORT
562 coap_free_type(COAP_STRING, session->ws);
563 coap_delete_str_const(session->ws_host);
564#endif /* COAP_WS_SUPPORT */
565}
566
567void
569 if (!session)
570 return;
572 assert(session->ref == 0);
573 if (session->ref)
574 return;
575 /* Make sure nothing gets deleted under our feet */
577 coap_session_mfree(session);
578#if COAP_SERVER_SUPPORT
580 if (session->endpoint) {
581 if (session->endpoint->sessions)
582 SESSIONS_DELETE(session->endpoint->sessions, session);
583 } else
584#endif /* COAP_SERVER_SUPPORT */
585#if COAP_CLIENT_SUPPORT
586 if (session->context) {
587 if (session->context->sessions)
588 SESSIONS_DELETE(session->context->sessions, session);
589 }
591#endif /* COAP_CLIENT_SUPPORT */
593 coap_delete_bin_const(session->echo);
594 coap_log_debug("***%s: session %p: closed\n", coap_session_str(session),
595 (void *)session);
596
597 assert(session->ref == 1);
599}
600
601static size_t
603 size_t max_with_header) {
604#if COAP_DISABLE_TCP
605 (void)session;
606 return max_with_header > COAP_PDU_MAX_UDP_HEADER_SIZE
607 ? max_with_header - COAP_PDU_MAX_UDP_HEADER_SIZE
608 : 0;
609#else /* !COAP_DISABLE_TCP */
610 if (COAP_PROTO_NOT_RELIABLE(session->proto))
611 return max_with_header > COAP_PDU_MAX_UDP_HEADER_SIZE
612 ? max_with_header - COAP_PDU_MAX_UDP_HEADER_SIZE
613 : 0;
614 /* we must assume there is no token to be on the safe side */
615 if (max_with_header <= 2)
616 return 0;
617 else if (max_with_header <= COAP_MAX_MESSAGE_SIZE_TCP0 + 2)
618 return max_with_header - 2;
619 else if (max_with_header <= COAP_MAX_MESSAGE_SIZE_TCP8 + 3)
620 return max_with_header - 3;
621 else if (max_with_header <= COAP_MAX_MESSAGE_SIZE_TCP16 + 4)
622 return max_with_header - 4;
623 else
624 return max_with_header - COAP_PDU_MAX_TCP_HEADER_SIZE;
625#endif /* !COAP_DISABLE_TCP */
626}
627
628size_t
630 if (session->csm_rcv_mtu)
632 (size_t)(session->csm_rcv_mtu));
633
635 (size_t)(session->mtu - session->tls_overhead));
636}
637
638COAP_API size_t
640 size_t size;
641 coap_session_t *session_rw;
642
643 /*
644 * Need to do this to not get a compiler warning about const parameters
645 * but need to maintain source code backward compatibility
646 */
647 memcpy(&session_rw, &session, sizeof(session_rw));
648 coap_lock_lock(session_rw->context, return 0);
649 size = coap_session_max_pdu_size_lkd(session_rw);
650 coap_lock_unlock(session_rw->context);
651 return size;
652}
653
654size_t
656 size_t max_with_header;
657
659#if COAP_CLIENT_SUPPORT
660 /*
661 * Delay if session->doing_first is set.
662 * E.g. Reliable and CSM not in yet for checking block support
663 */
664 coap_session_t *session_rw;
665
666 /*
667 * Need to do this to not get a compiler warning about const parameters
668 * but need to maintain source code backward compatibility
669 */
670 memcpy(&session_rw, &session, sizeof(session_rw));
671 if (coap_client_delay_first(session_rw) == 0) {
672 coap_log_debug("coap_client_delay_first: timeout\n");
673 /* Have to go with the defaults */
674 }
675#endif /* COAP_CLIENT_SUPPORT */
676
677 max_with_header = (size_t)(session->mtu - session->tls_overhead);
678
679 return coap_session_max_pdu_size_internal(session, max_with_header);
680}
681
682void
683coap_session_set_mtu(coap_session_t *session, unsigned mtu) {
684#if defined(WITH_CONTIKI) || defined(WITH_LWIP)
685 if (mtu > COAP_DEFAULT_MAX_PDU_RX_SIZE)
686 mtu = COAP_DEFAULT_MAX_PDU_RX_SIZE;
687#endif
688 if (mtu < 64)
689 mtu = 64;
690 session->mtu = mtu;
691 if (session->tls_overhead >= session->mtu) {
692 session->tls_overhead = session->mtu;
693 coap_log_err("DTLS overhead exceeds MTU\n");
694 }
695}
696
697ssize_t
699 coap_queue_t *node) {
700 if (node) {
701 coap_queue_t *removed = NULL;
702 coap_remove_from_queue(&session->context->sendqueue, session, node->id, &removed);
703 assert(removed == node);
705 node->session = NULL;
706 node->t = 0;
707 } else {
708 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
709 coap_queue_t *q = NULL;
710 /* Check same mid is not getting re-used in violation of RFC7252 */
711 LL_FOREACH(session->delayqueue, q) {
712 if (q->id == pdu->mid) {
713 coap_log_err("** %s: mid=0x%04x: already in-use - dropped\n",
714 coap_session_str(session), pdu->mid);
715 return COAP_INVALID_MID;
716 }
717 }
718 }
719 node = coap_new_node();
720 if (node == NULL)
721 return COAP_INVALID_MID;
722 node->id = pdu->mid;
723 node->pdu = pdu;
724 if (pdu->type == COAP_MESSAGE_CON && COAP_PROTO_NOT_RELIABLE(session->proto)) {
725 uint8_t r;
726 coap_prng_lkd(&r, sizeof(r));
727 /* add timeout in range [ACK_TIMEOUT...ACK_TIMEOUT * ACK_RANDOM_FACTOR] */
728 node->timeout = coap_calc_timeout(session, r);
729 }
730 }
731 LL_APPEND(session->delayqueue, node);
732 coap_log_debug("** %s: mid=0x%04x: delayed\n",
733 coap_session_str(session), node->id);
734 return COAP_PDU_DELAYED;
735}
736
737#if !COAP_DISABLE_TCP
738void
740 coap_pdu_t *pdu;
741 uint8_t buf[4];
742 assert(COAP_PROTO_RELIABLE(session->proto));
743 coap_log_debug("***%s: sending CSM\n", coap_session_str(session));
744 session->state = COAP_SESSION_STATE_CSM;
745 session->partial_write = 0;
746 if (session->mtu == 0)
747 coap_session_set_mtu(session, COAP_DEFAULT_MTU); /* base value */
749 if (pdu == NULL
751 coap_encode_var_safe(buf, sizeof(buf),
752 session->context->csm_max_message_size), buf) == 0
754 coap_encode_var_safe(buf, sizeof(buf),
755 0), buf) == 0
756 || (session->max_token_size > COAP_TOKEN_DEFAULT_MAX &&
759 coap_encode_var_safe(buf, sizeof(buf),
760 session->max_token_size),
761 buf) == 0)
762 || coap_pdu_encode_header(pdu, session->proto) == 0
763 ) {
765 } else {
766 ssize_t bytes_written;
767
768 pdu->session = session;
769 bytes_written = coap_session_send_pdu(session, pdu);
770 if (bytes_written != (ssize_t)pdu->used_size + pdu->hdr_size) {
772 } else {
773 session->csm_rcv_mtu = session->context->csm_max_message_size;
774 if (session->csm_rcv_mtu > COAP_BERT_BASE)
775 session->csm_bert_loc_support = 1;
776 else
777 session->csm_bert_loc_support = 0;
778 }
779 }
780 if (pdu)
781 coap_delete_pdu(pdu);
782}
783#endif /* !COAP_DISABLE_TCP */
784
787 coap_mid_t mid;
788
789 coap_lock_lock(session->context, return COAP_INVALID_MID);
790 mid = coap_session_send_ping_lkd(session);
791 coap_lock_unlock(session->context);
792 return mid;
793}
794
797 coap_pdu_t *ping = NULL;
798
800 if (session->state != COAP_SESSION_STATE_ESTABLISHED ||
801 session->con_active)
802 return COAP_INVALID_MID;
803 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
804 uint16_t mid = coap_new_message_id_lkd(session);
805 ping = coap_pdu_init(COAP_MESSAGE_CON, 0, mid, 0);
806 }
807#if !COAP_DISABLE_TCP
808 else {
810 }
811#endif /* !COAP_DISABLE_TCP */
812 if (!ping)
813 return COAP_INVALID_MID;
814 return coap_send_internal(session, ping);
815}
816
817void
819 if (session->state != COAP_SESSION_STATE_ESTABLISHED) {
820 coap_log_debug("***%s: session connected\n",
821 coap_session_str(session));
822 if (session->state == COAP_SESSION_STATE_CSM) {
824 if (session->doing_first)
825 session->doing_first = 0;
826 }
827 }
828
830 session->partial_write = 0;
831
832 if (session->proto==COAP_PROTO_DTLS) {
833 session->tls_overhead = coap_dtls_get_overhead(session);
834 if (session->tls_overhead >= session->mtu) {
835 session->tls_overhead = session->mtu;
836 coap_log_err("DTLS overhead exceeds MTU\n");
837 }
838 }
839
840 while (session->delayqueue && session->state == COAP_SESSION_STATE_ESTABLISHED) {
841 ssize_t bytes_written;
842 coap_queue_t *q = session->delayqueue;
843 if (q->pdu->type == COAP_MESSAGE_CON && COAP_PROTO_NOT_RELIABLE(session->proto)) {
844 if (session->con_active >= COAP_NSTART(session))
845 break;
846 session->con_active++;
847 }
848 /* Take entry off the queue */
849 session->delayqueue = q->next;
850 q->next = NULL;
851
852 coap_log_debug("** %s: mid=0x%04x: transmitted after delay\n",
853 coap_session_str(session), (int)q->pdu->mid);
854 bytes_written = coap_session_send_pdu(session, q->pdu);
855 if (q->pdu->type == COAP_MESSAGE_CON && COAP_PROTO_NOT_RELIABLE(session->proto)) {
856 if (coap_wait_ack(session->context, session, q) >= 0)
857 q = NULL;
858 }
859 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
860 if (q)
862 if (bytes_written < 0)
863 break;
864 } else if (q) {
865 if (bytes_written <= 0 || (size_t)bytes_written < q->pdu->used_size + q->pdu->hdr_size) {
866 q->next = session->delayqueue;
867 session->delayqueue = q;
868 if (bytes_written > 0)
869 session->partial_write = (size_t)bytes_written;
870 break;
871 } else {
873 }
874 }
875 }
876}
877
878#if COAP_MAX_LOGGING_LEVEL >= _COAP_LOG_DEBUG
879static const char *
881 switch (reason) {
883 return "COAP_NACK_TOO_MANY_RETRIES";
885 return "COAP_NACK_NOT_DELIVERABLE";
886 case COAP_NACK_RST:
887 return "COAP_NACK_RST";
889 return "COAP_NACK_TLS_FAILED";
891 return "COAP_NACK_ICMP_ISSUE";
893 return "COAP_NACK_BAD_RESPONSE";
895 return "COAP_NACK_TLS_LAYER_FAILED";
897 return "COAP_NACK_WS_LAYER_FAILED";
899 return "COAP_NACK_WS_FAILED";
900 default:
901 return "???";
902 }
903}
904#endif /* COAP_MAX_LOGGING_LEVEL >= _COAP_LOG_DEBUG */
905
906void
908 coap_pdu_t *sent,
909 const coap_nack_reason_t reason,
910 const coap_mid_t mid) {
911 if (session->context->nack_handler) {
912 coap_bin_const_t token;
913
914 if (sent) {
915 coap_check_update_token(session, sent);
916 token = sent->actual_token;
917 }
919 session->context->nack_handler(session, sent, reason, mid));
920 if (sent) {
921 coap_update_token(sent, token.length, token.s);
922 }
923 }
924#if COAP_CLIENT_SUPPORT
925 if (reason != COAP_NACK_ICMP_ISSUE) {
926 session->doing_send_recv = 0;
927 }
928#endif /* COAP_CLIENT_SUPPORT */
929}
930
931COAP_API void
933 coap_lock_lock(session->context, return);
934 coap_session_disconnected_lkd(session, reason);
935 coap_lock_unlock(session->context);
936}
937
938void
940#if !COAP_DISABLE_TCP
941 coap_session_state_t state = session->state;
942#endif /* !COAP_DISABLE_TCP */
943 coap_lg_xmit_t *lq, *ltmp;
944#if COAP_SERVER_SUPPORT
945 coap_lg_srcv_t *sq, *stmp;
946#endif /* COAP_SERVER_SUPPORT */
947#if COAP_CLIENT_SUPPORT
948 coap_lg_crcv_t *cq, *etmp;
949#endif /* COAP_CLIENT_SUPPORT */
950 int sent_nack = 0;
951 coap_queue_t *q;
952
954 q = session->context->sendqueue;
955
956 while (q) {
957 if (q->session == session) {
958 /* Take the first one */
959 coap_handle_nack(session, q->pdu, reason, q->id);
960 sent_nack = 1;
961 break;
962 }
963 q = q->next;
964 }
965
966 if (reason != COAP_NACK_ICMP_ISSUE) {
967 while (session->delayqueue) {
968 q = session->delayqueue;
969 session->delayqueue = q->next;
970 q->next = NULL;
971 coap_log_debug("** %s: mid=0x%04x: not transmitted after disconnect\n",
972 coap_session_str(session), q->id);
973 if (q->pdu->type == COAP_MESSAGE_CON) {
974 coap_handle_nack(session, q->pdu, reason, q->id);
975 sent_nack = 1;
976 }
977
978#if COAP_CLIENT_SUPPORT
979 session->doing_send_recv = 0;
980#endif /* COAP_CLIENT_SUPPORT */
982 }
983 }
984#if COAP_CLIENT_SUPPORT
985 if (!sent_nack && session->lg_crcv) {
986 /* Take the first one */
987 coap_handle_nack(session, &session->lg_crcv->pdu, reason, session->lg_crcv->pdu.mid);
988 sent_nack = 1;
989 }
990#endif /* COAP_CLIENT_SUPPORT */
991 if (!sent_nack) {
992 /* Unable to determine which request disconnection was for */
993 coap_handle_nack(session, NULL, reason, 0);
994 }
995 if (reason == COAP_NACK_ICMP_ISSUE) {
996 coap_log_debug("***%s: session ICMP issue (%s)\n",
997 coap_session_str(session), coap_nack_name(reason));
998 return;
999 }
1000 coap_log_debug("***%s: session disconnected (%s)\n",
1001 coap_session_str(session), coap_nack_name(reason));
1002#if COAP_SERVER_SUPPORT
1003 coap_delete_observers(session->context, session);
1004#endif /* COAP_SERVER_SUPPORT */
1005
1006 if (session->proto == COAP_PROTO_UDP)
1008 else
1009 session->state = COAP_SESSION_STATE_NONE;
1010
1011 session->con_active = 0;
1012
1013 if (session->partial_pdu) {
1014 coap_delete_pdu(session->partial_pdu);
1015 session->partial_pdu = NULL;
1016 }
1017 session->partial_read = 0;
1018
1019 /* Not done if nack handler called above */
1020 while (session->delayqueue) {
1021 q = session->delayqueue;
1022 session->delayqueue = q->next;
1023 q->next = NULL;
1024 coap_log_debug("** %s: mid=0x%04x: not transmitted after disconnect\n",
1025 coap_session_str(session), q->id);
1026#if COAP_CLIENT_SUPPORT
1027 session->doing_send_recv = 0;
1028#endif /* COAP_CLIENT_SUPPORT */
1030 }
1031
1032#if COAP_CLIENT_SUPPORT
1033 /* Need to do this before (D)TLS and socket is closed down */
1034 LL_FOREACH_SAFE(session->lg_crcv, cq, etmp) {
1035 LL_DELETE(session->lg_crcv, cq);
1036 coap_block_delete_lg_crcv(session, cq);
1037 }
1038#endif /* COAP_CLIENT_SUPPORT */
1039 LL_FOREACH_SAFE(session->lg_xmit, lq, ltmp) {
1040 LL_DELETE(session->lg_xmit, lq);
1041 coap_block_delete_lg_xmit(session, lq);
1042 }
1043#if COAP_SERVER_SUPPORT
1044 LL_FOREACH_SAFE(session->lg_srcv, sq, stmp) {
1045 LL_DELETE(session->lg_srcv, sq);
1046 coap_block_delete_lg_srcv(session, sq);
1047 }
1048#endif /* COAP_SERVER_SUPPORT */
1049 coap_cancel_session_messages(session->context, session, reason);
1050
1051#if !COAP_DISABLE_TCP
1052 if (COAP_PROTO_RELIABLE(session->proto)) {
1053 if (coap_netif_available(session)) {
1057 }
1058 if (state != COAP_SESSION_STATE_NONE) {
1062 }
1063 if (session->doing_first)
1064 session->doing_first = 0;
1065 }
1066#endif /* !COAP_DISABLE_TCP */
1067 session->sock.lfunc[COAP_LAYER_SESSION].l_close(session);
1068}
1069
1070#if COAP_SERVER_SUPPORT
1071static void
1072coap_make_addr_hash(coap_addr_hash_t *addr_hash, coap_proto_t proto,
1073 const coap_addr_tuple_t *addr_info) {
1074 memset(addr_hash, 0, sizeof(coap_addr_hash_t));
1075 coap_address_copy(&addr_hash->remote, &addr_info->remote);
1076 addr_hash->lport = coap_address_get_port(&addr_info->local);
1077 addr_hash->proto = proto;
1078}
1079
1082 const coap_packet_t *packet, coap_tick_t now) {
1083 coap_session_t *session;
1084 coap_session_t *rtmp;
1085 unsigned int num_idle = 0;
1086 unsigned int num_hs = 0;
1087 coap_session_t *oldest = NULL;
1088 coap_session_t *oldest_hs = NULL;
1089 coap_addr_hash_t addr_hash;
1090
1091 coap_make_addr_hash(&addr_hash, endpoint->proto, &packet->addr_info);
1092 SESSIONS_FIND(endpoint->sessions, addr_hash, session);
1093 if (session) {
1094 /* Maybe mcast or unicast IP address which is not in the hash */
1095 coap_address_copy(&session->addr_info.local, &packet->addr_info.local);
1096 session->ifindex = packet->ifindex;
1097 session->last_rx_tx = now;
1098 return session;
1099 }
1100
1101#if COAP_CLIENT_SUPPORT
1102 if (coap_is_mcast(&packet->addr_info.local)) {
1103 /* Check if this a proxy client packet we sent on another socket */
1104 SESSIONS_ITER(endpoint->context->sessions, session, rtmp) {
1105 if (coap_address_equals(&session->addr_info.remote, &packet->addr_info.local) &&
1108 /* Drop looped back packet to stop recursion / confusion */
1109 return NULL;
1110 }
1111 }
1112 }
1113#endif /* COAP_CLIENT_SUPPORT */
1114 SESSIONS_ITER(endpoint->sessions, session, rtmp) {
1115 if (session->ref == 0 && session->delayqueue == NULL) {
1116 if (session->type == COAP_SESSION_TYPE_SERVER) {
1117 ++num_idle;
1118 if (oldest==NULL || session->last_rx_tx < oldest->last_rx_tx)
1119 oldest = session;
1120
1121 if (session->state == COAP_SESSION_STATE_HANDSHAKE) {
1122 ++num_hs;
1123 /* See if this is a partial (D)TLS session set up
1124 which needs to be cleared down to prevent DOS */
1125 if ((session->last_rx_tx + COAP_PARTIAL_SESSION_TIMEOUT_TICKS) < now) {
1126 if (oldest_hs == NULL ||
1127 session->last_rx_tx < oldest_hs->last_rx_tx)
1128 oldest_hs = session;
1129 }
1130 }
1131 } else if (session->type == COAP_SESSION_TYPE_HELLO) {
1132 ++num_hs;
1133 /* See if this is a partial (D)TLS session set up for Client Hello
1134 which needs to be cleared down to prevent DOS */
1135 if ((session->last_rx_tx + COAP_PARTIAL_SESSION_TIMEOUT_TICKS) < now) {
1136 if (oldest_hs == NULL ||
1137 session->last_rx_tx < oldest_hs->last_rx_tx)
1138 oldest_hs = session;
1139 }
1140 }
1141 }
1142 }
1143
1144 if (endpoint->context->max_idle_sessions > 0 &&
1145 num_idle >= endpoint->context->max_idle_sessions) {
1147 coap_session_free(oldest);
1148 } else if (oldest_hs) {
1149 coap_log_warn("***%s: Incomplete session timed out\n",
1150 coap_session_str(oldest_hs));
1152 coap_session_free(oldest_hs);
1153 }
1154
1155 if (num_hs > (endpoint->context->max_handshake_sessions ?
1156 endpoint->context->max_handshake_sessions :
1158 /* Maxed out on number of sessions in (D)TLS negotiation state */
1159 coap_log_debug("Oustanding sessions in COAP_SESSION_STATE_HANDSHAKE too "
1160 "large. New request ignored\n");
1161 return NULL;
1162 }
1163
1164 if (endpoint->proto == COAP_PROTO_DTLS) {
1165 /*
1166 * Need to check that this actually is a Client Hello before wasting
1167 * time allocating and then freeing off session.
1168 */
1169
1170 /*
1171 * Generic header structure of the DTLS record layer.
1172 * typedef struct __attribute__((__packed__)) {
1173 * uint8_t content_type; content type of the included message
1174 * uint16_t version; Protocol version
1175 * uint16_t epoch; counter for cipher state changes
1176 * uint8_t sequence_number[6]; sequence number
1177 * uint16_t length; length of the following fragment
1178 * uint8_t handshake; If content_type == DTLS_CT_HANDSHAKE
1179 * } dtls_record_handshake_t;
1180 */
1181#define OFF_CONTENT_TYPE 0 /* offset of content_type in dtls_record_handshake_t */
1182#define DTLS_CT_ALERT 21 /* Content Type Alert */
1183#define DTLS_CT_HANDSHAKE 22 /* Content Type Handshake */
1184#define OFF_HANDSHAKE_TYPE 13 /* offset of handshake in dtls_record_handshake_t */
1185#define DTLS_HT_CLIENT_HELLO 1 /* Client Hello handshake type */
1186#define DTLS_CT_CID 25 /* Content Type Connection ID */
1187#define OFF_CID 11 /* offset of CID in dtls_record_handshake_t */
1188#define OFF_CID_DTLS13 1 /* offset of CID in DTLS1.3 Unified Header */
1189
1190 const uint8_t *payload = (const uint8_t *)packet->payload;
1191 size_t length = packet->length;
1192 if (length < (OFF_HANDSHAKE_TYPE + 1)) {
1193 coap_log_debug("coap_dtls_hello: ContentType %d Short Packet (%zu < %d) dropped\n",
1194 payload[OFF_CONTENT_TYPE], length,
1195 OFF_HANDSHAKE_TYPE + 1);
1196 return NULL;
1197 }
1198 if ((payload[OFF_CONTENT_TYPE] & 0x30) == 0x30 ||
1199 payload[OFF_CONTENT_TYPE] == DTLS_CT_CID) {
1200 /* Client may have changed its IP address */
1201 int changed = 0;
1202
1203 SESSIONS_ITER(endpoint->sessions, session, rtmp) {
1204 if (session->client_cid) {
1205 if ((session->is_dtls13 && (payload[OFF_CONTENT_TYPE] & 0x30) == 0x30 &&
1206 memcmp(session->client_cid->s, &payload[OFF_CID_DTLS13],
1207 session->client_cid->length) == 0) ||
1208 (!session->is_dtls13 && payload[OFF_CONTENT_TYPE] == DTLS_CT_CID &&
1209 memcmp(session->client_cid->s, &payload[OFF_CID],
1210 session->client_cid->length) == 0)) {
1211 /* Updating IP address */
1212 coap_log_info("***%s: CID: Old Client Session\n", coap_session_str(session));
1213 SESSIONS_DELETE(endpoint->sessions, session);
1214 session->addr_info = packet->addr_info;
1215 memcpy(&session->addr_hash, &addr_hash, sizeof(session->addr_hash));
1216 SESSIONS_ADD(endpoint->sessions, session);
1217 coap_log_info("***%s: CID: New Client Session\n", coap_session_str(session));
1218 return session;
1219 }
1220 }
1221 }
1222 if (!changed) {
1223 coap_log_debug("coap_dtls_hello: ContentType Connection-IS dropped\n");
1224 return NULL;
1225 }
1226 } else if (payload[OFF_CONTENT_TYPE] != DTLS_CT_HANDSHAKE ||
1227 payload[OFF_HANDSHAKE_TYPE] != DTLS_HT_CLIENT_HELLO) {
1228 /* only log if not a late alert */
1229 if (payload[OFF_CONTENT_TYPE] != DTLS_CT_ALERT)
1230 coap_log_debug("coap_dtls_hello: ContentType %d Handshake %d dropped\n",
1231 payload[OFF_CONTENT_TYPE],
1232 payload[OFF_HANDSHAKE_TYPE]);
1233 return NULL;
1234 }
1235 }
1236
1238 &addr_hash, &packet->addr_info.local,
1239 &packet->addr_info.remote,
1240 packet->ifindex, endpoint->context, endpoint);
1241 if (session) {
1242 session->last_rx_tx = now;
1243 memcpy(session->sock.lfunc, endpoint->sock.lfunc,
1244 sizeof(session->sock.lfunc));
1245 if (endpoint->proto == COAP_PROTO_UDP)
1247 else if (endpoint->proto == COAP_PROTO_DTLS) {
1248 session->type = COAP_SESSION_TYPE_HELLO;
1249 }
1250 SESSIONS_ADD(endpoint->sessions, session);
1251 coap_log_debug("***%s: session %p: new incoming session\n",
1252 coap_session_str(session), (void *)session);
1254 }
1255 return session;
1256}
1257
1260 coap_tick_t now) {
1261 if (session) {
1262 session->last_rx_tx = now;
1263 session->type = COAP_SESSION_TYPE_SERVER;
1264 coap_dtls_establish(session);
1265 }
1266 return session;
1267}
1268#endif /* COAP_SERVER_SUPPORT */
1269
1270#if COAP_CLIENT_SUPPORT
1271static coap_session_t *
1272coap_session_create_client(coap_context_t *ctx,
1273 const coap_address_t *local_if,
1274 const coap_address_t *server,
1275 coap_proto_t proto) {
1276 coap_session_t *session = NULL;
1277 int default_port = COAP_DEFAULT_PORT;
1278
1279 assert(server);
1280
1281 switch (proto) {
1282 case COAP_PROTO_UDP:
1283 default_port = COAP_DEFAULT_PORT;
1284 break;
1285 case COAP_PROTO_DTLS:
1286 if (!coap_dtls_is_supported()) {
1287 coap_log_crit("coap_new_client_session*: DTLS not supported\n");
1288 return NULL;
1289 }
1290 default_port = COAPS_DEFAULT_PORT;
1291 break;
1292 case COAP_PROTO_TCP:
1293 if (!coap_tcp_is_supported()) {
1294 coap_log_crit("coap_new_client_session*: TCP not supported\n");
1295 return NULL;
1296 }
1297 default_port = COAP_DEFAULT_PORT;
1298 break;
1299 case COAP_PROTO_TLS:
1300 if (!coap_tls_is_supported()) {
1301 coap_log_crit("coap_new_client_session*: TLS not supported\n");
1302 return NULL;
1303 }
1304 default_port = COAPS_DEFAULT_PORT;
1305 break;
1306 case COAP_PROTO_WS:
1307 if (!coap_ws_is_supported()) {
1308 coap_log_crit("coap_new_client_session*: WS not supported\n");
1309 return NULL;
1310 }
1311 default_port = 80;
1312 break;
1313 case COAP_PROTO_WSS:
1314 if (!coap_wss_is_supported()) {
1315 coap_log_crit("coap_new_client_session*: WSS not supported\n");
1316 return NULL;
1317 }
1318 default_port = 443;
1319 break;
1320 case COAP_PROTO_NONE:
1321 case COAP_PROTO_LAST:
1322 default:
1323 assert(0);
1324 return NULL;
1325 }
1326 session = coap_make_session(proto, COAP_SESSION_TYPE_CLIENT, NULL,
1327 local_if, server, 0, ctx, NULL);
1328 if (!session)
1329 goto error;
1330
1332 session->sock.session = session;
1333 memcpy(&session->sock.lfunc, coap_layers_coap[proto],
1334 sizeof(session->sock.lfunc));
1335
1336 if (COAP_PROTO_NOT_RELIABLE(proto)) {
1337 coap_session_t *s, *rtmp;
1338 if (!coap_netif_dgrm_connect(session, local_if, server, default_port)) {
1339 goto error;
1340 }
1341 /* Check that this is not a duplicate 4-tuple */
1342 SESSIONS_ITER_SAFE(ctx->sessions, s, rtmp) {
1345 &s->addr_info.local) &&
1347 &s->addr_info.remote)) {
1348 coap_log_warn("***%s: session %p: duplicate - already exists\n",
1349 coap_session_str(session), (void *)session);
1350 goto error;
1351 }
1352 }
1353#ifdef WITH_CONTIKI
1354 session->sock.context = ctx;
1355#endif /* WITH_CONTIKI */
1356#if !COAP_DISABLE_TCP
1357 } else if (COAP_PROTO_RELIABLE(proto)) {
1358 if (!coap_netif_strm_connect1(session, local_if, server, default_port)) {
1359 goto error;
1360 }
1361#endif /* !COAP_DISABLE_TCP */
1362 }
1363
1364#ifdef COAP_EPOLL_SUPPORT
1365 session->sock.session = session;
1366 coap_epoll_ctl_add(&session->sock,
1367 EPOLLIN |
1368 ((session->sock.flags & COAP_SOCKET_WANT_CONNECT) ?
1369 EPOLLOUT : 0),
1370 __func__);
1371#endif /* COAP_EPOLL_SUPPORT */
1372
1374 if (local_if)
1375 session->sock.flags |= COAP_SOCKET_BOUND;
1376#if COAP_SERVER_SUPPORT
1377 if (ctx->proxy_uri_resource)
1378 session->proxy_session = 1;
1379#endif /* COAP_SERVER_SUPPORT */
1380 SESSIONS_ADD(ctx->sessions, session);
1381 return session;
1382
1383error:
1384 /*
1385 * Need to add in the session as coap_session_release_lkd()
1386 * will call SESSIONS_DELETE in coap_session_free().
1387 */
1388 if (session)
1389 SESSIONS_ADD(ctx->sessions, session);
1390 coap_session_release_lkd(session);
1391 return NULL;
1392}
1393
1394static void
1395coap_session_check_connect(coap_session_t *session) {
1396 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
1397 session->sock.lfunc[COAP_LAYER_SESSION].l_establish(session);
1398 }
1399#if !COAP_DISABLE_TCP
1400 if (COAP_PROTO_RELIABLE(session->proto)) {
1401 if (session->sock.flags & COAP_SOCKET_WANT_CONNECT) {
1403 if (session->state != COAP_SESSION_STATE_ESTABLISHED &&
1404 session->state != COAP_SESSION_STATE_NONE &&
1405 session->type == COAP_SESSION_TYPE_CLIENT) {
1406 session->doing_first = 1;
1407 }
1408 } else {
1409 /* Initial connect worked immediately */
1410 session->sock.lfunc[COAP_LAYER_SESSION].l_establish(session);
1411 }
1412 }
1413#endif /* !COAP_DISABLE_TCP */
1414 coap_ticks(&session->last_rx_tx);
1415}
1416#endif /* COAP_CLIENT_SUPPORT */
1417
1418void
1420 if (COAP_PROTO_NOT_RELIABLE(session->proto))
1421 coap_session_connected(session);
1422#if !COAP_DISABLE_TCP
1423 if (COAP_PROTO_RELIABLE(session->proto))
1424 coap_session_send_csm(session);
1425#endif /* !COAP_DISABLE_TCP */
1426}
1427
1428#if COAP_CLIENT_SUPPORT
1431 const coap_address_t *local_if,
1432 const coap_address_t *server,
1433 coap_proto_t proto) {
1434 coap_session_t *session;
1435
1436 coap_lock_lock(ctx, return NULL);
1437 session = coap_new_client_session_lkd(ctx, local_if, server, proto);
1438 coap_lock_unlock(ctx);
1439 return session;
1440}
1441
1444 const coap_address_t *local_if,
1445 const coap_address_t *server,
1446 coap_proto_t proto) {
1447 coap_session_t *session;
1448
1450 session = coap_session_create_client(ctx, local_if, server,
1451 proto);
1452 if (session) {
1453 coap_log_debug("***%s: session %p: created outgoing session\n",
1454 coap_session_str(session), (void *)session);
1455 coap_session_check_connect(session);
1456 }
1457 return session;
1458}
1459
1462 const coap_address_t *local_if,
1463 const coap_address_t *server,
1464 coap_proto_t proto, const char *identity,
1465 const uint8_t *key, unsigned key_len) {
1466 coap_session_t *session;
1467
1468 coap_lock_lock(ctx, return NULL);
1469 session = coap_new_client_session_psk_lkd(ctx, local_if, server, proto, identity, key, key_len);
1470 coap_lock_unlock(ctx);
1471 return session;
1472}
1473
1476 const coap_address_t *local_if,
1477 const coap_address_t *server,
1478 coap_proto_t proto, const char *identity,
1479 const uint8_t *key, unsigned key_len) {
1480 coap_dtls_cpsk_t setup_data;
1481
1483 memset(&setup_data, 0, sizeof(setup_data));
1485
1486 if (identity) {
1487 setup_data.psk_info.identity.s = (const uint8_t *)identity;
1488 setup_data.psk_info.identity.length = strlen(identity);
1489 }
1490
1491 if (key && key_len > 0) {
1492 setup_data.psk_info.key.s = key;
1493 setup_data.psk_info.key.length = key_len;
1494 }
1495
1496 return coap_new_client_session_psk2_lkd(ctx, local_if, server,
1497 proto, &setup_data);
1498}
1499
1500/*
1501 * Check the validity of the SNI to send to the server.
1502 *
1503 * https://datatracker.ietf.org/doc/html/rfc6066#section-3
1504 * Literal IPv4 and IPv6 addresses are not permitted in "HostName".
1505 */
1506static void
1507coap_sanitize_client_sni(char **client_sni) {
1508 char *cp;
1509
1510 if (*client_sni == NULL)
1511 return;
1512
1513 cp = *client_sni;
1514 switch (*cp) {
1515 case '0':
1516 case '1':
1517 case '2':
1518 case '3':
1519 case '4':
1520 case '5':
1521 case '6':
1522 case '7':
1523 case '8':
1524 case '9':
1525 case 'a':
1526 case 'b':
1527 case 'c':
1528 case 'd':
1529 case 'e':
1530 case 'f':
1531 case 'A':
1532 case 'B':
1533 case 'C':
1534 case 'D':
1535 case 'E':
1536 case 'F':
1537 case ':':
1538 break;
1539 case '\000':
1540 /* Empty entry invalid */
1541 *client_sni = NULL;
1542 return;
1543 default:
1544 /* Does not start with a hex digit or : - not literal IP. */
1545 return;
1546 }
1547 /* Check for IPv4 */
1548 while (*cp) {
1549 switch (*cp) {
1550 case '0':
1551 case '1':
1552 case '2':
1553 case '3':
1554 case '4':
1555 case '5':
1556 case '6':
1557 case '7':
1558 case '8':
1559 case '9':
1560 case '.':
1561 break;
1562 default:
1563 /* Not of format nnn.nnn.nnn.nnn. Could be IPv6 */
1564 goto check_ipv6;
1565 }
1566 cp++;
1567 }
1568 /* IPv4 address - not allowed. */
1569 *client_sni = NULL;
1570 return;
1571
1572check_ipv6:
1573 /* Check for IPv6 */
1574 cp = *client_sni;
1575 while (*cp) {
1576 switch (*cp) {
1577 case '0':
1578 case '1':
1579 case '2':
1580 case '3':
1581 case '4':
1582 case '5':
1583 case '6':
1584 case '7':
1585 case '8':
1586 case '9':
1587 case 'a':
1588 case 'b':
1589 case 'c':
1590 case 'd':
1591 case 'e':
1592 case 'f':
1593 case 'A':
1594 case 'B':
1595 case 'C':
1596 case 'D':
1597 case 'E':
1598 case 'F':
1599 case ':':
1600 break;
1601 case '%':
1602 /* Start of i/f specification, Previous is IPv6 */
1603 *client_sni = NULL;
1604 return;
1605 default:
1606 /* Not of format xx:xx::xx. */
1607 return;
1608 }
1609 cp++;
1610 }
1611 *client_sni = NULL;
1612 return;
1613}
1614
1617 const coap_address_t *local_if,
1618 const coap_address_t *server,
1619 coap_proto_t proto,
1620 coap_dtls_cpsk_t *setup_data) {
1621 coap_session_t *session;
1622
1623 coap_lock_lock(ctx, return NULL);
1624 session = coap_new_client_session_psk2_lkd(ctx, local_if, server, proto, setup_data);
1625 coap_lock_unlock(ctx);
1626 return session;
1627}
1628
1631 const coap_address_t *local_if,
1632 const coap_address_t *server,
1633 coap_proto_t proto,
1634 coap_dtls_cpsk_t *setup_data) {
1635 coap_session_t *session;
1636
1638 session = coap_session_create_client(ctx, local_if, server, proto);
1639
1640 if (!session || !setup_data)
1641 return NULL;
1642
1643 session->cpsk_setup_data = *setup_data;
1644 if (setup_data->psk_info.identity.s) {
1645 session->psk_identity =
1647 setup_data->psk_info.identity.length);
1648 if (!session->psk_identity) {
1649 coap_log_warn("Cannot store session Identity (PSK)\n");
1650 coap_session_release_lkd(session);
1651 return NULL;
1652 }
1654 coap_log_warn("Identity (PSK) not defined\n");
1655 coap_session_release_lkd(session);
1656 return NULL;
1657 }
1658
1659 if (setup_data->psk_info.key.s && setup_data->psk_info.key.length > 0) {
1660 session->psk_key = coap_new_bin_const(setup_data->psk_info.key.s,
1661 setup_data->psk_info.key.length);
1662 if (!session->psk_key) {
1663 coap_log_warn("Cannot store session pre-shared key (PSK)\n");
1664 coap_session_release_lkd(session);
1665 return NULL;
1666 }
1668 coap_log_warn("Pre-shared key (PSK) not defined\n");
1669 coap_session_release_lkd(session);
1670 return NULL;
1671 }
1672
1673 coap_sanitize_client_sni(&session->cpsk_setup_data.client_sni);
1674
1676 if (!coap_dtls_context_set_cpsk(ctx, &session->cpsk_setup_data)) {
1677 coap_session_release_lkd(session);
1678 return NULL;
1679 }
1680 }
1681 coap_log_debug("***%s: new outgoing session\n",
1682 coap_session_str(session));
1683 coap_session_check_connect(session);
1684 return session;
1685}
1686#endif /* COAP_CLIENT_SUPPORT */
1687
1688int
1690 const coap_bin_const_t *psk_hint
1691 ) {
1692 /* We may be refreshing the hint with the same hint */
1693 coap_bin_const_t *old_psk_hint = session->psk_hint;
1694
1695 if (psk_hint && psk_hint->s) {
1696 if (session->psk_hint) {
1697 if (coap_binary_equal(session->psk_hint, psk_hint))
1698 return 1;
1699 }
1700 session->psk_hint = coap_new_bin_const(psk_hint->s,
1701 psk_hint->length);
1702 if (!session->psk_hint) {
1703 coap_log_err("No memory to store identity hint (PSK)\n");
1704 if (old_psk_hint)
1705 coap_delete_bin_const(old_psk_hint);
1706 return 0;
1707 }
1708 } else {
1709 session->psk_hint = NULL;
1710 }
1711 if (old_psk_hint)
1712 coap_delete_bin_const(old_psk_hint);
1713
1714 return 1;
1715}
1716
1717int
1719 const coap_bin_const_t *psk_key
1720 ) {
1721 /* We may be refreshing the key with the same key */
1722 coap_bin_const_t *old_psk_key = session->psk_key;
1723
1724 if (psk_key && psk_key->s) {
1725 if (session->psk_key) {
1726 if (coap_binary_equal(session->psk_key, psk_key))
1727 return 1;
1728 }
1729 session->psk_key = coap_new_bin_const(psk_key->s, psk_key->length);
1730 if (!session->psk_key) {
1731 coap_log_err("No memory to store pre-shared key (PSK)\n");
1732 if (old_psk_key)
1733 coap_delete_bin_const(old_psk_key);
1734 return 0;
1735 }
1736 } else {
1737 session->psk_key = NULL;
1738 }
1739 if (old_psk_key)
1740 coap_delete_bin_const(old_psk_key);
1741
1742 return 1;
1743}
1744
1745int
1747 const coap_bin_const_t *psk_identity
1748 ) {
1749 /* We may be refreshing the identity with the same identity */
1750 coap_bin_const_t *old_psk_identity = session->psk_identity;
1751
1752 if (psk_identity && psk_identity->s) {
1753 if (session->psk_identity) {
1754 if (coap_binary_equal(session->psk_identity, psk_identity))
1755 return 1;
1756 }
1757 session->psk_identity = coap_new_bin_const(psk_identity->s,
1758 psk_identity->length);
1759 if (!session->psk_identity) {
1760 coap_log_err("No memory to store pre-shared key identity (PSK)\n");
1761 if (old_psk_identity)
1762 coap_delete_bin_const(old_psk_identity);
1763 return 0;
1764 }
1765 } else {
1766 session->psk_identity = NULL;
1767 }
1768 if (old_psk_identity)
1769 coap_delete_bin_const(old_psk_identity);
1770
1771 return 1;
1772}
1773
1774#if COAP_SERVER_SUPPORT
1775const coap_bin_const_t *
1777 if (session)
1778 return session->psk_hint;
1779 return NULL;
1780}
1781#endif /* COAP_SERVER_SUPPORT */
1782
1783const coap_bin_const_t *
1785 const coap_bin_const_t *psk_identity = NULL;
1786 if (session) {
1787 psk_identity = session->psk_identity;
1788 if (psk_identity == NULL) {
1789 psk_identity = &session->cpsk_setup_data.psk_info.identity;
1790 }
1791 }
1792 return psk_identity;
1793}
1794
1795const coap_bin_const_t *
1797 if (session)
1798 return session->psk_key;
1799 return NULL;
1800}
1801
1802#if COAP_CLIENT_SUPPORT
1805 const coap_address_t *local_if,
1806 const coap_address_t *server,
1807 coap_proto_t proto,
1808 coap_dtls_pki_t *setup_data) {
1809 coap_session_t *session;
1810
1811 coap_lock_lock(ctx, return NULL);
1812 session = coap_new_client_session_pki_lkd(ctx, local_if, server, proto, setup_data);
1813 coap_lock_unlock(ctx);
1814 return session;
1815}
1816
1819 const coap_address_t *local_if,
1820 const coap_address_t *server,
1821 coap_proto_t proto,
1822 coap_dtls_pki_t *setup_data) {
1823 coap_session_t *session;
1824 coap_dtls_pki_t l_setup_data;
1825
1826 if (!setup_data)
1827 return NULL;
1828 if (setup_data->version != COAP_DTLS_PKI_SETUP_VERSION) {
1829 coap_log_err("coap_new_client_session_pki: Wrong version of setup_data\n");
1830 return NULL;
1831 }
1832
1834 l_setup_data = *setup_data;
1835 coap_sanitize_client_sni(&l_setup_data.client_sni);
1836
1837 session = coap_session_create_client(ctx, local_if, server, proto);
1838
1839 if (!session) {
1840 return NULL;
1841 }
1842
1844 /* we know that setup_data is not NULL */
1845 if (!coap_dtls_context_set_pki(ctx, &l_setup_data, COAP_DTLS_ROLE_CLIENT)) {
1846 coap_session_release_lkd(session);
1847 return NULL;
1848 }
1849 }
1850 coap_log_debug("***%s: new outgoing session\n",
1851 coap_session_str(session));
1852 coap_session_check_connect(session);
1853 return session;
1854}
1855#endif /* ! COAP_CLIENT_SUPPORT */
1856
1857#if COAP_SERVER_SUPPORT
1858#if !COAP_DISABLE_TCP
1861 coap_session_t *session;
1863 NULL, NULL, NULL, 0, ctx, ep);
1864 if (!session)
1865 goto error;
1866
1867 memcpy(session->sock.lfunc, ep->sock.lfunc, sizeof(session->sock.lfunc));
1868 if (!coap_netif_strm_accept(ep, session, extra))
1869 goto error;
1870
1871 coap_make_addr_hash(&session->addr_hash, session->proto, &session->addr_info);
1872
1873#ifdef COAP_EPOLL_SUPPORT
1874 session->sock.session = session;
1875 coap_epoll_ctl_add(&session->sock,
1876 EPOLLIN,
1877 __func__);
1878#endif /* COAP_EPOLL_SUPPORT */
1879 SESSIONS_ADD(ep->sessions, session);
1880 if (session) {
1881 coap_log_debug("***%s: session %p: new incoming session\n",
1882 coap_session_str(session), (void *)session);
1886 session->sock.lfunc[COAP_LAYER_SESSION].l_establish(session);
1887 }
1888 return session;
1889
1890error:
1891 /*
1892 * Need to add in the session as coap_session_release_lkd()
1893 * will call SESSIONS_DELETE in coap_session_free().
1894 */
1895 if (session) {
1896 SESSIONS_ADD(ep->sessions, session);
1897 coap_session_free(session);
1898 }
1899 return NULL;
1900}
1901#endif /* !COAP_DISABLE_TCP */
1902#endif /* COAP_SERVER_SUPPORT */
1903
1904void
1906 const uint8_t *data) {
1907 session->tx_token = coap_decode_var_bytes8(data, len);
1908 /*
1909 * Decrement as when first used by coap_session_new_token() it will
1910 * get incremented
1911 */
1912 session->tx_token--;
1913}
1914
1915void
1917 uint8_t *data) {
1918 *len = coap_encode_var_safe8(data,
1919 sizeof(session->tx_token), ++session->tx_token);
1920}
1921
1922COAP_API uint16_t
1924 uint16_t mid;
1925
1926 coap_lock_lock(session->context, return 0);
1927 mid = coap_new_message_id_lkd(session);
1928 coap_lock_unlock(session->context);
1929 return mid;
1930}
1931
1932uint16_t
1935 if (COAP_PROTO_NOT_RELIABLE(session->proto))
1936 return ++session->tx_mid;
1937 /* TCP/TLS have no notion of mid */
1938 return 0;
1939}
1940
1941const coap_address_t *
1943 if (session)
1944 return &session->addr_info.remote;
1945 return NULL;
1946}
1947
1948const coap_address_t *
1950 if (session)
1951 return &session->addr_info.local;
1952 return NULL;
1953}
1954
1955const coap_address_t *
1957#if COAP_CLIENT_SUPPORT
1958 if (session && session->type == COAP_SESSION_TYPE_CLIENT &&
1959 session->sock.flags & COAP_SOCKET_MULTICAST)
1960 return &session->sock.mcast_addr;
1961#else /* ! COAP_CLIENT_SUPPORT */
1962 (void)session;
1963#endif /* ! COAP_CLIENT_SUPPORT */
1964 return NULL;
1965}
1966
1969 if (session)
1970 return session->context;
1971 return NULL;
1972}
1973
1976 if (session)
1977 return session->proto;
1978 return 0;
1979}
1980
1983 if (session)
1984 return session->type;
1985 return 0;
1986}
1987
1988#if COAP_CLIENT_SUPPORT
1989int
1991#if COAP_SERVER_SUPPORT
1992 if (session && session->type == COAP_SESSION_TYPE_SERVER) {
1994 session->type = COAP_SESSION_TYPE_CLIENT;
1995 return 1;
1996 }
1997#else /* ! COAP_SERVER_SUPPORT */
1998 (void)session;
1999#endif /* ! COAP_SERVER_SUPPORT */
2000 return 0;
2001}
2002#endif /* COAP_CLIENT_SUPPORT */
2003
2006 if (session)
2007 return session->state;
2008 return 0;
2009}
2010
2011int
2013 if (session)
2014 return session->ifindex;
2015 return -1;
2016}
2017
2018void *
2020 coap_tls_library_t *tls_lib) {
2021 if (session)
2022 return coap_dtls_get_tls(session, tls_lib);
2023 return NULL;
2024}
2025
2026static const char *
2028 switch (proto) {
2029 case COAP_PROTO_UDP:
2030 return "UDP ";
2031 case COAP_PROTO_DTLS:
2032 return "DTLS";
2033 case COAP_PROTO_TCP:
2034 return "TCP ";
2035 case COAP_PROTO_TLS:
2036 return "TLS ";
2037 case COAP_PROTO_WS:
2038 return "WS ";
2039 case COAP_PROTO_WSS:
2040 return "WSS ";
2041 case COAP_PROTO_NONE:
2042 case COAP_PROTO_LAST:
2043 default:
2044 return "????" ;
2045 break;
2046 }
2047 return NULL;
2048}
2049
2050#if COAP_SERVER_SUPPORT
2052coap_new_endpoint(coap_context_t *context, const coap_address_t *listen_addr, coap_proto_t proto) {
2053 coap_endpoint_t *endpoint;
2054
2055 coap_lock_lock(context, return NULL);
2056 endpoint = coap_new_endpoint_lkd(context, listen_addr, proto);
2057 coap_lock_unlock(context);
2058 return endpoint;
2059}
2060
2062coap_new_endpoint_lkd(coap_context_t *context, const coap_address_t *listen_addr,
2063 coap_proto_t proto) {
2064 coap_endpoint_t *ep = NULL;
2065
2066 assert(context);
2067 assert(listen_addr);
2068 assert(proto != COAP_PROTO_NONE);
2069
2070 coap_lock_check_locked(context);
2071
2072 if (proto == COAP_PROTO_DTLS && !coap_dtls_is_supported()) {
2073 coap_log_crit("coap_new_endpoint: DTLS not supported\n");
2074 goto error;
2075 }
2076
2077 if (proto == COAP_PROTO_TLS && !coap_tls_is_supported()) {
2078 coap_log_crit("coap_new_endpoint: TLS not supported\n");
2079 goto error;
2080 }
2081
2082 if (proto == COAP_PROTO_TCP && !coap_tcp_is_supported()) {
2083 coap_log_crit("coap_new_endpoint: TCP not supported\n");
2084 goto error;
2085 }
2086
2087 if (proto == COAP_PROTO_WS && !coap_ws_is_supported()) {
2088 coap_log_crit("coap_new_endpoint: WS not supported\n");
2089 goto error;
2090 }
2091
2092 if (proto == COAP_PROTO_WSS && !coap_wss_is_supported()) {
2093 coap_log_crit("coap_new_endpoint: WSS not supported\n");
2094 goto error;
2095 }
2096
2097 if (proto == COAP_PROTO_DTLS || proto == COAP_PROTO_TLS ||
2098 proto == COAP_PROTO_WSS) {
2100 coap_log_info("coap_new_endpoint: one of coap_context_set_psk() or "
2101 "coap_context_set_pki() not called\n");
2102 goto error;
2103 }
2104 }
2105
2106 ep = coap_malloc_endpoint();
2107 if (!ep) {
2108 coap_log_warn("coap_new_endpoint: malloc");
2109 goto error;
2110 }
2111
2112 memset(ep, 0, sizeof(coap_endpoint_t));
2113 ep->context = context;
2114 ep->proto = proto;
2115 ep->sock.endpoint = ep;
2116 assert(proto < COAP_PROTO_LAST);
2117 memcpy(&ep->sock.lfunc, coap_layers_coap[proto], sizeof(ep->sock.lfunc));
2118
2119 if (COAP_PROTO_NOT_RELIABLE(proto)) {
2120 if (!coap_netif_dgrm_listen(ep, listen_addr))
2121 goto error;
2122#ifdef WITH_CONTIKI
2123 ep->sock.context = context;
2124#endif /* WITH_CONTIKI */
2125#if !COAP_DISABLE_TCP
2126 } else if (COAP_PROTO_RELIABLE(proto)) {
2127 if (!coap_netif_strm_listen(ep, listen_addr))
2128 goto error;
2129#endif /* !COAP_DISABLE_TCP */
2130 } else {
2131 coap_log_crit("coap_new_endpoint: protocol not supported\n");
2132 goto error;
2133 }
2134
2136#ifndef INET6_ADDRSTRLEN
2137#define INET6_ADDRSTRLEN 40
2138#endif
2139 unsigned char addr_str[INET6_ADDRSTRLEN + 8];
2140
2141 if (coap_print_addr(&ep->bind_addr, addr_str, INET6_ADDRSTRLEN + 8)) {
2142 coap_log_debug("created %s endpoint %s\n", coap_proto_name(ep->proto),
2143 addr_str);
2144 }
2145 }
2146
2148
2149#ifdef COAP_EPOLL_SUPPORT
2150 ep->sock.endpoint = ep;
2152 EPOLLIN,
2153 __func__);
2154#endif /* COAP_EPOLL_SUPPORT */
2155
2156 LL_PREPEND(context->endpoint, ep);
2157 return ep;
2158
2159error:
2161 return NULL;
2162}
2163
2164void
2166 ep->default_mtu = (uint16_t)mtu;
2167}
2168
2169COAP_API void
2171 if (ep) {
2172 coap_context_t *context = ep->context;
2173 if (context) {
2174 coap_lock_lock(context, return);
2175 }
2177 if (context) {
2178 coap_lock_unlock(context);
2179 }
2180 }
2181}
2182
2183void
2185 if (ep) {
2186 coap_session_t *session, *rtmp;
2187
2188 if (ep->context) {
2189 /* If fully allocated and inserted */
2191 SESSIONS_ITER_SAFE(ep->sessions, session, rtmp) {
2192 assert(session->ref == 0);
2193 if (session->ref == 0) {
2195 coap_session_free(session);
2196 }
2197 }
2198 if (coap_netif_available_ep(ep)) {
2199 /*
2200 * ep->sock.endpoint is set in coap_new_endpoint().
2201 * ep->sock.session is never set.
2202 *
2203 * session->sock.session is set for both clients and servers (when a
2204 * new session is accepted), but does not affect the endpoint.
2205 *
2206 * So, it is safe to call coap_netif_close_ep() after all the sessions
2207 * have been freed above as we are only working with the endpoint sock.
2208 */
2209#ifdef COAP_EPOLL_SUPPORT
2210 assert(ep->sock.session == NULL);
2211#endif /* COAP_EPOLL_SUPPORT */
2213 }
2214
2215 if (ep->context->endpoint) {
2216 LL_DELETE(ep->context->endpoint, ep);
2217 }
2218 }
2220 }
2221}
2222#endif /* COAP_SERVER_SUPPORT */
2223
2226 const coap_address_t *remote_addr,
2227 int ifindex) {
2228 coap_session_t *s, *rtmp;
2229#if COAP_CLIENT_SUPPORT
2230 SESSIONS_ITER(ctx->sessions, s, rtmp) {
2231 if (s->ifindex == ifindex) {
2232 if (s->sock.flags & COAP_SOCKET_MULTICAST) {
2233 if (coap_address_equals(&s->sock.mcast_addr, remote_addr))
2234 return s;
2235 } else if (coap_address_equals(&s->addr_info.remote, remote_addr))
2236 return s;
2237 }
2238 }
2239#endif /* COAP_CLIENT_SUPPORT */
2240#if COAP_SERVER_SUPPORT
2241 coap_endpoint_t *ep;
2242
2243 LL_FOREACH(ctx->endpoint, ep) {
2244 SESSIONS_ITER(ep->sessions, s, rtmp) {
2245 if (s->ifindex == ifindex && coap_address_equals(&s->addr_info.remote,
2246 remote_addr))
2247 return s;
2248 }
2249 }
2250#endif /* COAP_SERVER_SUPPORT */
2251 return NULL;
2252}
2253
2254#ifndef INET6_ADDRSTRLEN
2255#define INET6_ADDRSTRLEN 46
2256#endif
2257const char *
2259 static char szSession[2 * (INET6_ADDRSTRLEN + 8) + 24];
2260 char *p = szSession, *end = szSession + sizeof(szSession);
2261 if (coap_print_addr(&session->addr_info.local,
2262 (unsigned char *)p, end - p) > 0)
2263 p += strlen(p);
2264 if (p + 6 < end) {
2265 strcpy(p, " <-> ");
2266 p += 5;
2267 }
2268 if (p + 1 < end) {
2269 if (coap_print_addr(&session->addr_info.remote,
2270 (unsigned char *)p, end - p) > 0)
2271 p += strlen(p);
2272 }
2273 if (session->ifindex > 0 && p + 1 < end)
2274 p += snprintf(p, end - p, " (if%d)", session->ifindex);
2275 if (p + 6 < end) {
2276 strcpy(p, " ");
2277 p++;
2278 strcpy(p, coap_proto_name(session->proto));
2279 }
2280
2281 return szSession;
2282}
2283
2284#if COAP_SERVER_SUPPORT
2285const char *
2286coap_endpoint_str(const coap_endpoint_t *endpoint) {
2287 static char szEndpoint[128];
2288 char *p = szEndpoint, *end = szEndpoint + sizeof(szEndpoint);
2289 if (coap_print_addr(&endpoint->bind_addr, (unsigned char *)p, end - p) > 0)
2290 p += strlen(p);
2291 if (p + 6 < end) {
2292 if (endpoint->proto == COAP_PROTO_UDP) {
2293 strcpy(p, " UDP");
2294 } else if (endpoint->proto == COAP_PROTO_DTLS) {
2295 strcpy(p, " DTLS");
2296 } else {
2297 strcpy(p, " NONE");
2298 }
2299 }
2300
2301 return szEndpoint;
2302}
2303#endif /* COAP_SERVER_SUPPORT */
2304#if COAP_CLIENT_SUPPORT
2305void
2307 session->no_observe_cancel = 1;
2308}
2309#endif /* COAP_CLIENT_SUPPORT */
2310#endif /* COAP_SESSION_C_ */
void coap_address_init(coap_address_t *addr)
Resets the given coap_address_t object addr to its default values.
int coap_is_mcast(const coap_address_t *a)
Checks if given address a denotes a multicast address.
uint16_t coap_address_get_port(const coap_address_t *addr)
Returns the port from addr in host byte order.
void coap_address_copy(coap_address_t *dst, const coap_address_t *src)
int coap_address_equals(const coap_address_t *a, const coap_address_t *b)
Compares given address objects a and b.
#define PRIu32
coap_nack_reason_t
Definition coap_io.h:62
@ COAP_NACK_NOT_DELIVERABLE
Definition coap_io.h:64
@ COAP_NACK_WS_FAILED
Definition coap_io.h:71
@ COAP_NACK_TOO_MANY_RETRIES
Definition coap_io.h:63
@ COAP_NACK_TLS_FAILED
Definition coap_io.h:66
@ COAP_NACK_TLS_LAYER_FAILED
Definition coap_io.h:69
@ COAP_NACK_ICMP_ISSUE
Definition coap_io.h:67
@ COAP_NACK_WS_LAYER_FAILED
Definition coap_io.h:70
@ COAP_NACK_RST
Definition coap_io.h:65
@ COAP_NACK_BAD_RESPONSE
Definition coap_io.h:68
#define COAP_SOCKET_MULTICAST
socket is used for multicast communication
void coap_epoll_ctl_add(coap_socket_t *sock, uint32_t events, const char *func)
Epoll specific function to add the state of events that epoll is to track for the appropriate file de...
#define COAP_SOCKET_NOT_EMPTY
the socket is not empty
#define COAP_SOCKET_BOUND
the socket is bound
#define COAP_SOCKET_WANT_READ
non blocking socket is waiting for reading
coap_endpoint_t * coap_malloc_endpoint(void)
#define COAP_SOCKET_WANT_CONNECT
non blocking client socket is waiting for connect
void coap_mfree_endpoint(coap_endpoint_t *ep)
coap_layer_func_t coap_layers_coap[COAP_PROTO_LAST][COAP_LAYER_LAST]
Definition coap_layers.c:39
@ COAP_LAYER_SESSION
Library specific build wrapper for coap_internal.h.
#define COAP_API
@ COAP_SESSION
Definition coap_mem.h:51
@ COAP_STRING
Definition coap_mem.h:39
void * coap_malloc_type(coap_memory_tag_t type, size_t size)
Allocates a chunk of size bytes and returns a pointer to the newly allocated memory.
void coap_free_type(coap_memory_tag_t type, void *p)
Releases the memory that was allocated by coap_malloc_type().
int coap_dtls_context_set_pki(coap_context_t *ctx COAP_UNUSED, const coap_dtls_pki_t *setup_data COAP_UNUSED, const coap_dtls_role_t role COAP_UNUSED)
Definition coap_notls.c:108
void * coap_dtls_get_tls(const coap_session_t *c_session COAP_UNUSED, coap_tls_library_t *tls_lib)
Definition coap_notls.c:153
unsigned int coap_dtls_get_overhead(coap_session_t *session COAP_UNUSED)
Definition coap_notls.c:256
int coap_dtls_context_check_keys_enabled(coap_context_t *ctx COAP_UNUSED)
Definition coap_notls.c:142
static const char * coap_proto_name(coap_proto_t proto)
COAP_API coap_mid_t coap_session_send_ping(coap_session_t *session)
Send a ping message for the session.
static const char * coap_nack_name(coap_nack_reason_t reason)
static coap_session_t * coap_make_session(coap_proto_t proto, coap_session_type_t type, const coap_addr_hash_t *addr_hash, const coap_address_t *local_addr, const coap_address_t *remote_addr, int ifindex, coap_context_t *context, coap_endpoint_t *endpoint)
static size_t coap_session_max_pdu_size_internal(const coap_session_t *session, size_t max_with_header)
#define INET6_ADDRSTRLEN
void coap_session_set_no_observe_cancel(coap_session_t *session)
Disable client automatically sending observe cancel on session close.
#define SESSIONS_ADD(e, obj)
#define SESSIONS_ITER_SAFE(e, el, rtmp)
#define COAP_PARTIAL_SESSION_TIMEOUT_TICKS
#define SESSIONS_DELETE(e, obj)
#define COAP_DEFAULT_MAX_HANDSHAKE_SESSIONS
#define SESSIONS_ITER(e, el, rtmp)
#define SESSIONS_FIND(e, k, res)
void coap_block_delete_lg_srcv(coap_session_t *session, coap_lg_srcv_t *lg_srcv)
void coap_block_delete_lg_crcv(coap_session_t *session, coap_lg_crcv_t *lg_crcv)
void coap_check_update_token(coap_session_t *session, coap_pdu_t *pdu)
The function checks if the token needs to be updated before PDU is presented to the application (only...
void coap_block_delete_lg_xmit(coap_session_t *session, coap_lg_xmit_t *lg_xmit)
void coap_delete_cache_entry(coap_context_t *context, coap_cache_entry_t *cache_entry)
Remove a cache-entry from the hash list and free off all the appropriate contents apart from app_data...
#define COAP_DEFAULT_NON_MAX_RETRANSMIT
The number of times for requests for re-transmission of missing Q-Block1 when no response has been re...
uint16_t coap_session_get_non_max_retransmit(const coap_session_t *session)
Get the CoAP NON maximum retransmit count of missing Q-Block1 or Q-Block2 requested before there is a...
coap_fixed_point_t coap_session_get_default_leisure(const coap_session_t *session)
Get the CoAP default leisure time RFC7252 DEFAULT_LEISURE.
void coap_session_set_max_retransmit(coap_session_t *session, uint16_t value)
Set the CoAP maximum retransmit count before failure.
#define COAP_DEFAULT_NON_TIMEOUT
The delay (+ ACK_RANDOM_FACTOR) to introduce once NON MAX_PAYLOADS Q-Block1 or Q-Block2 have been sen...
coap_fixed_point_t coap_session_get_non_timeout(const coap_session_t *session)
Get the CoAP MAX_PAYLOADS limit delay timeout.
void coap_session_set_ack_random_factor(coap_session_t *session, coap_fixed_point_t value)
Set the CoAP ack randomize factor.
#define COAP_DEFAULT_MAX_LATENCY
The MAX_LATENCY definition.
coap_fixed_point_t coap_session_get_ack_random_factor(const coap_session_t *session)
Get the CoAP ack randomize factor.
#define COAP_DEFAULT_ACK_RANDOM_FACTOR
A factor that is used to randomize the wait time before a message is retransmitted to prevent synchro...
uint16_t coap_session_get_max_retransmit(const coap_session_t *session)
Get the CoAP maximum retransmit before failure.
void coap_session_set_max_payloads(coap_session_t *session, uint16_t value)
Set the CoAP maximum payloads count of Q-Block1 or Q-Block2 before delay is introduced RFC9177 MAX_PA...
#define COAP_DEFAULT_MAX_RETRANSMIT
Number of message retransmissions before message sending is stopped.
uint32_t coap_session_get_probing_rate(const coap_session_t *session)
Get the CoAP probing rate when there is no response RFC7252 PROBING_RATE.
#define COAP_DEFAULT_ACK_TIMEOUT
Number of seconds when to expect an ACK or a response to an outstanding CON message.
#define COAP_DEFAULT_DEFAULT_LEISURE
The number of seconds to use as bounds for multicast traffic RFC 7252, Section 4.8 Default value of D...
void coap_session_set_ack_timeout(coap_session_t *session, coap_fixed_point_t value)
Set the CoAP initial ack response timeout before the next re-transmit.
#define COAP_DEFAULT_NSTART
The number of simultaneous outstanding interactions that a client maintains to a given server.
void coap_session_set_non_receive_timeout(coap_session_t *session, coap_fixed_point_t value)
Set the CoAP non receive timeout delay timeout.
void coap_session_set_nstart(coap_session_t *session, uint16_t value)
Set the CoAP maximum concurrent transmission count of Confirmable messages RFC7252 NSTART.
#define COAP_DEFAULT_PROBING_RATE
The number of bytes/second allowed when there is no response RFC 7252, Section 4.8 Default value of P...
void coap_session_set_non_max_retransmit(coap_session_t *session, uint16_t value)
Set the CoAP NON maximum retransmit count of missing Q-Block1 or Q-Block2 requested before there is a...
uint16_t coap_session_get_max_payloads(const coap_session_t *session)
Get the CoAP maximum payloads count of Q-Block1 or Q-Block2 before delay is introduced RFC9177 MAX_PA...
#define COAP_DEFAULT_NON_RECEIVE_TIMEOUT
The time to wait for any missing Q-Block1 or Q-Block2 packets before requesting re-transmission of mi...
void coap_session_set_probing_rate(coap_session_t *session, uint32_t value)
Set the CoAP probing rate when there is no response RFC7252 PROBING_RATE.
void coap_session_set_default_leisure(coap_session_t *session, coap_fixed_point_t value)
Set the CoAP default leisure time (for multicast) RFC7252 DEFAULT_LEISURE.
coap_fixed_point_t coap_session_get_non_receive_timeout(const coap_session_t *session)
Get the CoAP non receive timeout delay timeout.
uint16_t coap_session_get_nstart(const coap_session_t *session)
Get the CoAP maximum concurrent transmission count of Confirmable messages RFC7252 NSTART.
#define COAP_DEFAULT_MAX_PAYLOADS
Number of Q-Block1 or Q-Block2 payloads that can be sent in a burst before a delay has to kick in.
coap_fixed_point_t coap_session_get_ack_timeout(const coap_session_t *session)
Get the CoAP initial ack response timeout before the next re-transmit.
void coap_session_set_non_timeout(coap_session_t *session, coap_fixed_point_t value)
Set the CoAP non timeout delay timeout.
uint64_t coap_tick_t
This data type represents internal timer ticks with COAP_TICKS_PER_SECOND resolution.
Definition coap_time.h:143
#define COAP_TICKS_PER_SECOND
Use ms resolution on POSIX systems.
Definition coap_time.h:158
int coap_prng_lkd(void *buf, size_t len)
Fills buf with len random bytes using the default pseudo random number generator.
Definition coap_prng.c:178
int coap_handle_event_lkd(coap_context_t *context, coap_event_t event, coap_session_t *session)
Invokes the event handler of context for the given event and data.
Definition coap_net.c:4496
uint16_t coap_new_message_id_lkd(coap_session_t *session)
Returns a new message id and updates session->tx_mid accordingly.
int coap_delete_node_lkd(coap_queue_t *node)
Destroys specified node.
Definition coap_net.c:227
int coap_remove_from_queue(coap_queue_t **queue, coap_session_t *session, coap_mid_t id, coap_queue_t **node)
This function removes the element with given id from the list given list.
Definition coap_net.c:2678
int coap_client_delay_first(coap_session_t *session)
Delay the sending of the first client request until some other negotiation has completed.
Definition coap_net.c:1226
coap_mid_t coap_send_internal(coap_session_t *session, coap_pdu_t *pdu)
Sends a CoAP message to given peer.
Definition coap_net.c:1679
unsigned int coap_calc_timeout(coap_session_t *session, unsigned char r)
Calculates the initial timeout based on the session CoAP transmission parameters 'ack_timeout',...
Definition coap_net.c:1123
coap_mid_t coap_wait_ack(coap_context_t *context, coap_session_t *session, coap_queue_t *node)
Definition coap_net.c:1149
coap_queue_t * coap_new_node(void)
Creates a new node suitable for adding to the CoAP sendqueue.
Definition coap_net.c:256
void coap_cancel_session_messages(coap_context_t *context, coap_session_t *session, coap_nack_reason_t reason)
Cancels all outstanding messages for session session.
Definition coap_net.c:2723
void coap_ticks(coap_tick_t *)
Returns the current value of an internal tick counter.
COAP_API uint16_t coap_new_message_id(coap_session_t *session)
Returns a new message id and updates session->tx_mid accordingly.
@ COAP_RESPONSE_OK
Response is fine.
Definition coap_net.h:50
void coap_dtls_establish(coap_session_t *session)
Layer function interface for layer below DTLS connect being established.
Definition coap_dtls.c:266
coap_session_t * coap_session_new_dtls_session(coap_session_t *session, coap_tick_t now)
Create a new DTLS session for the session.
int coap_dtls_context_set_cpsk(coap_context_t *coap_context, coap_dtls_cpsk_t *setup_data)
Set the DTLS context's default client PSK information.
#define COAP_DTLS_PKI_SETUP_VERSION
Latest PKI setup version.
Definition coap_dtls.h:307
#define COAP_DTLS_CPSK_SETUP_VERSION
Latest CPSK setup version.
Definition coap_dtls.h:405
coap_tls_library_t
Definition coap_dtls.h:70
@ COAP_DTLS_ROLE_CLIENT
Internal function invoked for client.
Definition coap_dtls.h:45
unsigned int coap_encode_var_safe(uint8_t *buf, size_t length, unsigned int val)
Encodes multiple-length byte sequences.
Definition coap_encode.c:47
uint64_t coap_decode_var_bytes8(const uint8_t *buf, size_t len)
Decodes multiple-length byte sequences.
Definition coap_encode.c:67
unsigned int coap_encode_var_safe8(uint8_t *buf, size_t length, uint64_t val)
Encodes multiple-length byte sequences.
Definition coap_encode.c:77
@ COAP_EVENT_SESSION_CONNECTED
Triggered when TCP layer completes exchange of CSM information.
Definition coap_event.h:61
@ COAP_EVENT_TCP_FAILED
Triggered when TCP layer fails for some reason.
Definition coap_event.h:55
@ COAP_EVENT_SESSION_FAILED
Triggered when TCP layer fails following exchange of CSM information.
Definition coap_event.h:65
@ COAP_EVENT_SERVER_SESSION_NEW
Called in the CoAP IO loop if a new server-side session is created due to an incoming connection.
Definition coap_event.h:85
@ COAP_EVENT_SESSION_CLOSED
Triggered when TCP layer closes following exchange of CSM information.
Definition coap_event.h:63
@ COAP_EVENT_SERVER_SESSION_DEL
Called in the CoAP IO loop if a server session is deleted (e.g., due to inactivity or because the max...
Definition coap_event.h:94
@ COAP_EVENT_TCP_CLOSED
Triggered when TCP layer is closed.
Definition coap_event.h:53
@ COAP_EVENT_TCP_CONNECTED
Triggered when TCP layer connects.
Definition coap_event.h:51
#define coap_lock_unlock(c)
Dummy for no thread-safe code.
#define coap_lock_lock(c, failed)
Dummy for no thread-safe code.
#define coap_lock_callback(c, func)
Dummy for no thread-safe code.
#define coap_lock_check_locked(c)
Dummy for no thread-safe code.
#define coap_log_debug(...)
Definition coap_debug.h:120
coap_log_t coap_get_log_level(void)
Get the current logging level.
Definition coap_debug.c:101
size_t coap_print_addr(const coap_address_t *addr, unsigned char *buf, size_t len)
Print the address into the defined buffer.
Definition coap_debug.c:239
const char * coap_endpoint_str(const coap_endpoint_t *endpoint)
Get endpoint description.
const char * coap_session_str(const coap_session_t *session)
Get session description.
#define coap_log_info(...)
Definition coap_debug.h:108
#define coap_log_warn(...)
Definition coap_debug.h:102
#define coap_log_err(...)
Definition coap_debug.h:96
#define coap_log_crit(...)
Definition coap_debug.h:90
@ COAP_LOG_DEBUG
Definition coap_debug.h:58
int coap_netif_dgrm_listen(coap_endpoint_t *endpoint, const coap_address_t *listen_addr)
Layer function interface for Netif datagram listem (udp).
void coap_netif_close_ep(coap_endpoint_t *endpoint)
Layer function interface for Netif close for a endpoint.
int coap_netif_strm_connect1(coap_session_t *session, const coap_address_t *local_if, const coap_address_t *server, int default_port)
Layer function interface for Netif stream connect (tcp).
int coap_netif_strm_accept(coap_endpoint_t *endpoint, coap_session_t *session, void *extra)
Layer function interface for Netif stream accept.
int coap_netif_strm_listen(coap_endpoint_t *endpoint, const coap_address_t *listen_addr)
Layer function interface for Netif stream listem (tcp).
int coap_netif_dgrm_connect(coap_session_t *session, const coap_address_t *local_if, const coap_address_t *server, int default_port)
Layer function interface for Netif datagram connect (udp).
int coap_netif_available(coap_session_t *session)
Function interface to check whether netif for session is still available.
Definition coap_netif.c:25
int coap_netif_available_ep(coap_endpoint_t *endpoint)
Function interface to check whether netif for endpoint is still available.
void coap_delete_oscore_associations(coap_session_t *session)
Cleanup all allocated OSCORE association information.
int coap_update_token(coap_pdu_t *pdu, size_t len, const uint8_t *data)
Updates token in pdu with length len and data.
Definition coap_pdu.c:406
#define COAP_PDU_MAX_UDP_HEADER_SIZE
#define COAP_PDU_DELAYED
#define COAP_PDU_MAX_TCP_HEADER_SIZE
#define COAP_MAX_MESSAGE_SIZE_TCP8
#define COAP_MAX_MESSAGE_SIZE_TCP0
size_t coap_pdu_encode_header(coap_pdu_t *pdu, coap_proto_t proto)
Compose the protocol specific header for the specified PDU.
Definition coap_pdu.c:1478
#define COAP_MAX_MESSAGE_SIZE_TCP16
size_t coap_add_option_internal(coap_pdu_t *pdu, coap_option_num_t number, size_t len, const uint8_t *data)
Adds option of given number to pdu that is passed as first parameter.
Definition coap_pdu.c:769
#define COAP_DEFAULT_PORT
Definition coap_pdu.h:37
void coap_delete_pdu(coap_pdu_t *pdu)
Dispose of an CoAP PDU and frees associated storage.
Definition coap_pdu.c:183
int coap_mid_t
coap_mid_t is used to store the CoAP Message ID of a CoAP PDU.
Definition coap_pdu.h:263
#define COAP_TOKEN_DEFAULT_MAX
Definition coap_pdu.h:56
#define COAP_SIGNALING_OPTION_EXTENDED_TOKEN_LENGTH
Definition coap_pdu.h:199
coap_proto_t
CoAP protocol types.
Definition coap_pdu.h:312
#define COAP_SIGNALING_OPTION_BLOCK_WISE_TRANSFER
Definition coap_pdu.h:198
#define COAPS_DEFAULT_PORT
Definition coap_pdu.h:38
coap_pdu_t * coap_pdu_init(coap_pdu_type_t type, coap_pdu_code_t code, coap_mid_t mid, size_t size)
Creates a new CoAP PDU with at least enough storage space for the given size maximum message size.
Definition coap_pdu.c:99
#define COAP_INVALID_MID
Indicates an invalid message id.
Definition coap_pdu.h:266
#define COAP_DEFAULT_MTU
Definition coap_pdu.h:41
#define COAP_BERT_BASE
Definition coap_pdu.h:44
#define COAP_SIGNALING_OPTION_MAX_MESSAGE_SIZE
Definition coap_pdu.h:197
@ COAP_PROTO_WS
Definition coap_pdu.h:318
@ COAP_PROTO_DTLS
Definition coap_pdu.h:315
@ COAP_PROTO_UDP
Definition coap_pdu.h:314
@ COAP_PROTO_NONE
Definition coap_pdu.h:313
@ COAP_PROTO_TLS
Definition coap_pdu.h:317
@ COAP_PROTO_WSS
Definition coap_pdu.h:319
@ COAP_PROTO_TCP
Definition coap_pdu.h:316
@ COAP_PROTO_LAST
Definition coap_pdu.h:320
@ COAP_SIGNALING_CODE_CSM
Definition coap_pdu.h:365
@ COAP_SIGNALING_CODE_PING
Definition coap_pdu.h:366
@ COAP_MESSAGE_NON
Definition coap_pdu.h:70
@ COAP_MESSAGE_CON
Definition coap_pdu.h:69
#define COAP_NON_PROBING_WAIT_BASE(s)
ssize_t coap_session_delay_pdu(coap_session_t *session, coap_pdu_t *pdu, coap_queue_t *node)
int coap_session_refresh_psk_hint(coap_session_t *session, const coap_bin_const_t *psk_hint)
Refresh the session's current Identity Hint (PSK).
void coap_session_send_csm(coap_session_t *session)
Notify session transport has just connected and CSM exchange can now start.
coap_session_t * coap_new_client_session_psk2_lkd(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto, coap_dtls_cpsk_t *setup_data)
Creates a new client session to the designated server with PSK credentials.
coap_fixed_point_t coap_add_fixed_uint(coap_fixed_point_t fp1, uint32_t u2)
void coap_handle_nack(coap_session_t *session, coap_pdu_t *sent, const coap_nack_reason_t reason, const coap_mid_t mid)
size_t coap_session_max_pdu_rcv_size(const coap_session_t *session)
Get maximum acceptable receive PDU size.
coap_fixed_point_t coap_sub_fixed_uint(coap_fixed_point_t fp1, uint32_t u2)
coap_session_t * coap_endpoint_get_session(coap_endpoint_t *endpoint, const coap_packet_t *packet, coap_tick_t now)
Lookup the server session for the packet received on an endpoint, or create a new one.
#define COAP_ACK_RANDOM_FACTOR(s)
void coap_free_endpoint_lkd(coap_endpoint_t *endpoint)
Release an endpoint and all the structures associated with it.
coap_session_t * coap_new_client_session_psk_lkd(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto, const char *identity, const uint8_t *key, unsigned key_len)
Creates a new client session to the designated server with PSK credentials.
void coap_session_establish(coap_session_t *session)
Layer function interface for layer below session accept/connect being established.
coap_session_t * coap_new_client_session_pki_lkd(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto, coap_dtls_pki_t *setup_data)
Creates a new client session to the designated server with PKI credentials.
coap_session_t * coap_new_client_session_lkd(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto)
Creates a new client session to the designated server.
coap_fixed_point_t coap_add_fixed_fixed(coap_fixed_point_t fp1, coap_fixed_point_t fp2)
coap_tick_t coap_get_non_timeout_random_ticks(coap_session_t *session)
#define COAP_NSTART(s)
int coap_session_refresh_psk_key(coap_session_t *session, const coap_bin_const_t *psk_key)
Refresh the session's current pre-shared key (PSK).
void coap_session_connected(coap_session_t *session)
Notify session that it has just connected or reconnected.
coap_fixed_point_t coap_multi_fixed_fixed(coap_fixed_point_t fp1, coap_fixed_point_t fp2)
ssize_t coap_session_send_pdu(coap_session_t *session, coap_pdu_t *pdu)
Send a pdu according to the session's protocol.
Definition coap_net.c:1001
size_t coap_session_max_pdu_size_lkd(const coap_session_t *session)
Get maximum acceptable PDU size.
coap_mid_t coap_session_send_ping_lkd(coap_session_t *session)
Send a ping message for the session.
coap_fixed_point_t coap_div_fixed_uint(coap_fixed_point_t fp1, uint32_t u2)
void coap_session_free(coap_session_t *session)
void coap_session_mfree(coap_session_t *session)
void coap_session_release_lkd(coap_session_t *session)
Decrement reference counter on a session.
int coap_session_refresh_psk_identity(coap_session_t *session, const coap_bin_const_t *psk_identity)
Refresh the session's current pre-shared identity (PSK).
coap_fixed_point_t coap_get_non_timeout_random(coap_session_t *session)
#define COAP_NON_MAX_RETRANSMIT(s)
coap_session_t * coap_session_reference_lkd(coap_session_t *session)
Increment reference counter on a session.
#define COAP_NON_TIMEOUT(s)
coap_fixed_point_t coap_multi_fixed_uint(coap_fixed_point_t fp1, uint32_t u2)
#define COAP_NON_PARTIAL_TIMEOUT(s)
void coap_session_disconnected_lkd(coap_session_t *session, coap_nack_reason_t reason)
Notify session that it has failed.
coap_endpoint_t * coap_new_endpoint_lkd(coap_context_t *context, const coap_address_t *listen_addr, coap_proto_t proto)
Create a new endpoint for communicating with peers.
coap_session_t * coap_new_server_session(coap_context_t *ctx, coap_endpoint_t *ep, void *extra)
Creates a new server session for the specified endpoint.
@ COAP_EXT_T_CHECKED
Token size valid.
COAP_API coap_session_t * coap_session_reference(coap_session_t *session)
Increment reference counter on a session.
coap_session_type_t
coap_session_type_t values
COAP_API void coap_session_disconnected(coap_session_t *session, coap_nack_reason_t reason)
Notify session that it has failed.
void coap_session_set_mtu(coap_session_t *session, unsigned mtu)
Set the session MTU.
coap_context_t * coap_session_get_context(const coap_session_t *session)
Get the session context.
const coap_address_t * coap_session_get_addr_local(const coap_session_t *session)
Get the local IP address and port from the session.
coap_proto_t coap_session_get_proto(const coap_session_t *session)
Get the session protocol type.
const coap_bin_const_t * coap_session_get_psk_key(const coap_session_t *session)
Get the session's current pre-shared key (PSK).
void * coap_session_get_tls(const coap_session_t *session, coap_tls_library_t *tls_lib)
Get the session TLS security ptr (TLS type dependent)
coap_session_state_t coap_session_get_state(const coap_session_t *session)
Get the session state.
coap_session_state_t
coap_session_state_t values
#define COAP_PROTO_NOT_RELIABLE(p)
COAP_API coap_session_t * coap_new_client_session_pki(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto, coap_dtls_pki_t *setup_data)
Creates a new client session to the designated server with PKI credentials.
void coap_session_init_token(coap_session_t *session, size_t len, const uint8_t *data)
Initializes the token value to use as a starting point.
#define COAP_PROTO_RELIABLE(p)
void coap_session_new_token(coap_session_t *session, size_t *len, uint8_t *data)
Creates a new token for use.
COAP_API coap_session_t * coap_new_client_session(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto)
Creates a new client session to the designated server.
const coap_bin_const_t * coap_session_get_psk_identity(const coap_session_t *session)
Get the server session's current PSK identity (PSK).
void coap_session_set_app_data(coap_session_t *session, void *app_data)
Stores data with the given session.
coap_session_t * coap_session_get_by_peer(const coap_context_t *ctx, const coap_address_t *remote_addr, int ifindex)
Get the session associated with the specified remote_addr and index.
void coap_endpoint_set_default_mtu(coap_endpoint_t *endpoint, unsigned mtu)
Set the endpoint's default MTU.
const coap_bin_const_t * coap_session_get_psk_hint(const coap_session_t *session)
Get the server session's current Identity Hint (PSK).
COAP_API coap_endpoint_t * coap_new_endpoint(coap_context_t *context, const coap_address_t *listen_addr, coap_proto_t proto)
Create a new endpoint for communicating with peers.
const coap_address_t * coap_session_get_addr_remote(const coap_session_t *session)
Get the remote IP address and port from the session.
int coap_session_set_type_client(coap_session_t *session)
Set the session type to client.
COAP_API void coap_free_endpoint(coap_endpoint_t *endpoint)
Release an endpoint and all the structures associated with it.
COAP_API void coap_session_release(coap_session_t *session)
Decrement reference counter on a session.
COAP_API coap_session_t * coap_new_client_session_psk2(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto, coap_dtls_cpsk_t *setup_data)
Creates a new client session to the designated server with PSK credentials.
const coap_address_t * coap_session_get_addr_mcast(const coap_session_t *session)
Get the remote multicast IP address and port from the session if the original target IP was multicast...
COAP_API size_t coap_session_max_pdu_size(const coap_session_t *session)
Get maximum acceptable PDU size.
COAP_API coap_session_t * coap_new_client_session_psk(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto, const char *identity, const uint8_t *key, unsigned key_len)
Creates a new client session to the designated server with PSK credentials.
int coap_session_get_ifindex(const coap_session_t *session)
Get the session if index.
void * coap_session_get_app_data(const coap_session_t *session)
Returns any application-specific data that has been stored with session using the function coap_sessi...
coap_session_type_t coap_session_get_type(const coap_session_t *session)
Get the session type.
@ COAP_SESSION_TYPE_HELLO
server-side ephemeral session for responding to a client hello
@ COAP_SESSION_TYPE_SERVER
server-side
@ COAP_SESSION_TYPE_CLIENT
client-side
@ COAP_SESSION_STATE_HANDSHAKE
@ COAP_SESSION_STATE_CSM
@ COAP_SESSION_STATE_ESTABLISHED
@ COAP_SESSION_STATE_NONE
@ COAP_SESSION_STATE_CONNECTING
void coap_delete_bin_const(coap_bin_const_t *s)
Deletes the given const binary data and releases any memory allocated.
Definition coap_str.c:120
void coap_delete_str_const(coap_str_const_t *s)
Deletes the given const string and releases any memory allocated.
Definition coap_str.c:61
coap_bin_const_t * coap_new_bin_const(const uint8_t *data, size_t size)
Take the specified byte array (text) and create a coap_bin_const_t * Returns a new const binary objec...
Definition coap_str.c:110
#define coap_binary_equal(binary1, binary2)
Compares the two binary data for equality.
Definition coap_str.h:211
int coap_cancel_observe_lkd(coap_session_t *session, coap_binary_t *token, coap_pdu_type_t message_type)
Cancel an observe that is being tracked by the client large receive logic.
void coap_delete_observers(coap_context_t *context, coap_session_t *session)
Removes any subscription for session and releases the allocated storage.
int coap_tcp_is_supported(void)
Check whether TCP is available.
Definition coap_tcp.c:20
int coap_tls_is_supported(void)
Check whether TLS is available.
Definition coap_notls.c:41
int coap_ws_is_supported(void)
Check whether WebSockets is available.
Definition coap_ws.c:933
int coap_dtls_is_supported(void)
Check whether DTLS is available.
Definition coap_notls.c:36
int coap_wss_is_supported(void)
Check whether Secure WebSockets is available.
Definition coap_ws.c:938
Only used for servers for hashing incoming packets.
uint16_t lport
local port
coap_address_t remote
remote address and port
coap_proto_t proto
CoAP protocol.
coap_address_t remote
remote address and port
Definition coap_io.h:56
coap_address_t local
local address and port
Definition coap_io.h:57
Multi-purpose address abstraction.
CoAP binary data definition with const data.
Definition coap_str.h:64
size_t length
length of binary data
Definition coap_str.h:65
const uint8_t * s
read-only binary data
Definition coap_str.h:66
coap_session_t * session
The CoAP stack's global state is stored in a coap_context_t object.
coap_session_t * sessions
client sessions
coap_nack_handler_t nack_handler
Called when a response issue has occurred.
uint32_t csm_max_message_size
Value for CSM Max-Message-Size.
unsigned int max_handshake_sessions
Maximum number of simultaneous negotating sessions per endpoint.
coap_queue_t * sendqueue
uint32_t max_token_size
Largest token size supported RFC8974.
coap_cache_entry_t * cache
CoAP cache-entry cache.
coap_endpoint_t * endpoint
the endpoints used for listening
uint32_t block_mode
Zero or more COAP_BLOCK_ or'd options.
coap_resource_t * proxy_uri_resource
can be used for handling proxy URI resources
unsigned int max_idle_sessions
Maximum number of simultaneous unused sessions per endpoint.
coap_bin_const_t key
Definition coap_dtls.h:381
coap_bin_const_t identity
Definition coap_dtls.h:380
The structure used for defining the Client PSK setup data to be used.
Definition coap_dtls.h:410
char * client_sni
If not NULL, SNI to use in client TLS setup.
Definition coap_dtls.h:437
coap_dtls_cpsk_info_t psk_info
Client PSK definition.
Definition coap_dtls.h:443
The structure used for defining the PKI setup data to be used.
Definition coap_dtls.h:312
uint8_t version
Definition coap_dtls.h:313
char * client_sni
If not NULL, SNI to use in client TLS setup.
Definition coap_dtls.h:368
Abstraction of virtual endpoint that can be attached to coap_context_t.
coap_context_t * context
endpoint's context
uint16_t default_mtu
default mtu for this interface
coap_session_t * sessions
hash table or list of active sessions
coap_address_t bind_addr
local interface address
coap_socket_t sock
socket object for the interface, if any
coap_proto_t proto
protocol used on this interface
Abstraction of a fixed point number that can be used where necessary instead of a float.
uint16_t fractional_part
Fractional part of fixed point variable 1/1000 (3 points) precision.
uint16_t integer_part
Integer part of fixed point variable.
coap_layer_establish_t l_establish
coap_layer_close_t l_close
Structure to hold large body (many blocks) client receive information.
coap_pdu_t pdu
skeletal PDU
coap_binary_t * app_token
app requesting PDU token
uint8_t observe_set
Set if this is an observe receive PDU.
Structure to hold large body (many blocks) server receive information.
Structure to hold large body (many blocks) transmission information.
size_t length
length of payload
coap_addr_tuple_t addr_info
local and remote addresses
unsigned char * payload
payload
int ifindex
the interface index
structure for CoAP PDUs
uint8_t hdr_size
actual size used for protocol-specific header (0 until header is encoded)
coap_bin_const_t actual_token
Actual token in pdu.
coap_mid_t mid
message id, if any, in regular host byte order
size_t used_size
used bytes of storage for token, options and payload
coap_session_t * session
Session responsible for PDU or NULL.
coap_pdu_type_t type
message type
Queue entry.
coap_session_t * session
the CoAP session
coap_pdu_t * pdu
the CoAP PDU to send
unsigned int timeout
the randomized timeout value
struct coap_queue_t * next
coap_mid_t id
CoAP message id.
coap_tick_t t
when to send PDU for the next time
Abstraction of virtual session that can be attached to coap_context_t (client) or coap_endpoint_t (se...
coap_lg_xmit_t * lg_xmit
list of large transmissions
volatile uint8_t max_token_checked
Check for max token size coap_ext_token_check_t.
coap_bin_const_t * psk_key
If client, this field contains the current pre-shared key for server; When this field is NULL,...
coap_endpoint_t * endpoint
session's endpoint
uint32_t block_mode
Zero or more COAP_BLOCK_ or'd options.
uint8_t doing_first
Set if doing client's first request.
coap_socket_t sock
socket object for the session, if any
coap_pdu_t * partial_pdu
incomplete incoming pdu
uint32_t max_token_size
Largest token size supported RFC8974.
uint16_t nstart
maximum concurrent confirmable xmits (default 1)
coap_bin_const_t * psk_identity
If client, this field contains the current identity for server; When this field is NULL,...
coap_session_state_t state
current state of relationship with peer
uint64_t tx_token
Next token number to use.
coap_bin_const_t * client_cid
Contains client CID or NULL.
uint8_t csm_bert_loc_support
CSM TCP BERT blocks supported (local)
coap_addr_tuple_t addr_info
remote/local address info
coap_proto_t proto
protocol used
uint16_t tx_mid
the last message id that was used in this session
uint8_t is_dtls13
Set if session is DTLS1.3.
unsigned ref
reference count from queues
size_t csm_rcv_mtu
CSM mtu (rcv)
coap_response_t last_con_handler_res
The result of calling the response handler of the last CON.
coap_bin_const_t * psk_hint
If client, this field contains the server provided identity hint.
coap_bin_const_t * last_token
uint8_t doing_send_recv
Set if coap_send_recv() active.
coap_dtls_cpsk_t cpsk_setup_data
client provided PSK initial setup data
size_t mtu
path or CSM mtu (xmt)
uint8_t no_observe_cancel
Set if do not cancel observe on session close.
size_t partial_read
if > 0 indicates number of bytes already read for an incoming message
int dtls_event
Tracking any (D)TLS events on this session.
uint16_t max_retransmit
maximum re-transmit count (default 4)
coap_fixed_point_t ack_random_factor
ack random factor backoff (default 1.5)
uint8_t proxy_session
Set if this is an ongoing proxy session.
uint8_t con_active
Active CON request sent.
coap_queue_t * delayqueue
list of delayed messages waiting to be sent
size_t tls_overhead
overhead of TLS layer
void * app
application-specific data
uint32_t tx_rtag
Next Request-Tag number to use.
coap_mid_t last_ping_mid
the last keepalive message id that was used in this session
coap_lg_srcv_t * lg_srcv
Server list of expected large receives.
coap_bin_const_t * req_token
Token in request pdu of coap_send_recv()
coap_lg_crcv_t * lg_crcv
Client list of expected large receives.
coap_fixed_point_t ack_timeout
timeout waiting for ack (default 2.0 secs)
coap_fixed_point_t default_leisure
Mcast leisure time (default 5.0 secs)
coap_mid_t last_con_mid
The last CON mid that has been been processed.
coap_session_type_t type
client or server side socket
uint32_t probing_rate
Max transfer wait when remote is not respoding (default 1 byte/sec)
coap_mid_t last_ack_mid
The last ACK mid that has been been processed.
coap_context_t * context
session's context
size_t partial_write
if > 0 indicates number of bytes already written from the pdu at the head of sendqueue
coap_addr_hash_t addr_hash
Address hash for server incoming packets.
int ifindex
interface index
coap_bin_const_t * echo
last token used to make a request
coap_layer_func_t lfunc[COAP_LAYER_LAST]
Layer functions to use.
coap_session_t * session
Used to determine session owner.
coap_endpoint_t * endpoint
Used by the epoll logic for a listening endpoint.
coap_address_t mcast_addr
remote address and port (multicast track)
coap_socket_flags_t flags
1 or more of COAP_SOCKET* flag values