libcoap 4.3.5-develop-490e4e0
Loading...
Searching...
No Matches
coap_session.c
Go to the documentation of this file.
1/* coap_session.c -- Session management for libcoap
2 *
3 * Copyright (C) 2017 Jean-Claue Michelou <jcm@spinetix.com>
4 * Copyright (C) 2022-2025 Jon Shallow <supjps-libcoap@jpshallow.com>
5 *
6 * SPDX-License-Identifier: BSD-2-Clause
7 *
8 * This file is part of the CoAP library libcoap. Please see
9 * README for terms of use.
10 */
11
18
19#ifndef COAP_SESSION_C_
20#define COAP_SESSION_C_
21
22#include <stdio.h>
23
24#ifdef COAP_EPOLL_SUPPORT
25#include <sys/epoll.h>
26#include <sys/timerfd.h>
27#endif /* COAP_EPOLL_SUPPORT */
28
32 uint32_t fr = fp1.fractional_part * fp2.fractional_part;
33
34 res.integer_part = fp1.integer_part * fp2.integer_part + fr/1000;
35 res.fractional_part = fr % 1000;
36 return res;
37}
38
42 uint32_t fr = fp1.fractional_part * u2;
43
44 res.integer_part = fp1.integer_part * u2 + fr/1000;
45 res.fractional_part = fr % 1000;
46 return res;
47}
48
52 uint32_t fr = fp1.fractional_part + fp2.fractional_part;
53
54 res.integer_part = fp1.integer_part + fp2.integer_part + fr/1000;
55 res.fractional_part = fr % 1000;
56 return res;
57}
58
61 coap_fixed_point_t res = fp1;
62
63 res.integer_part += u2;
64 return res;
65}
66
69 coap_fixed_point_t res = fp1;
70
71 res.integer_part -= u2;
72 return res;
73}
74
78 uint32_t num = (fp1.integer_part * 1000 + fp1.fractional_part) / u2;
79
80 res.integer_part = num / 1000;
81 res.fractional_part = num % 1000;
82 return res;
83}
84
85#if COAP_Q_BLOCK_SUPPORT
89 uint8_t ran;
90
91 coap_prng_lkd(&ran, sizeof(ran));
93 res = coap_multi_fixed_uint(res, ran);
94 res = coap_div_fixed_uint(res, 0xff);
95 res = coap_add_fixed_fixed(COAP_NON_TIMEOUT(session), res);
96 return res;
97}
98
104
105 return ticks;
106}
107
108/*
109 * Save away derived Congestion Control parameters for speed of access.
110 * They will get updated whenever a component variable is updated.
111 */
112
113/*
114 * NON_PROBING_WAIT = NON_TIMEOUT * ((2 ** NON_MAX_RETRANSMIT) - 1) *
115 * ACK_RANDOM_FACTOR + (2 * MAX_LATENCY) + NON_TIMEOUT_RANDOM
116 *
117 * Do not include NON_TIMEOUT_RANDOM as that changes
118 */
119static void
120coap_session_fix_non_probing_wait_base(coap_session_t *s) {
122
124 ((1 << (COAP_NON_MAX_RETRANSMIT(s) + 1)) -1));
128}
129
130/*
131 * NON_PARTIAL_TIMEOUT = NON_TIMEOUT * ((2 ** NON_MAX_RETRANSMIT) - 1) *
132 * ACK_RANDOM_FACTOR + (2 * MAX_LATENCY) + NON_TIMEOUT
133 */
134static void
135coap_session_fix_non_partial_timeout(coap_session_t *s) {
137
139 ((1 << (COAP_NON_MAX_RETRANSMIT(s) + 1)) -1));
144}
145#endif /* COAP_Q_BLOCK_SUPPORT */
146
147void
149 if (value.integer_part > 0 && value.fractional_part < 1000) {
150 session->ack_timeout = value;
151 coap_log_debug("***%s: session ack_timeout set to %u.%03u\n",
152 coap_session_str(session), session->ack_timeout.integer_part,
154 }
155}
156
157void
159 coap_fixed_point_t value) {
160 if (value.integer_part > 0 && value.fractional_part < 1000) {
161 session->ack_random_factor = value;
162 coap_log_debug("***%s: session ack_random_factor set to %u.%03u\n",
165#if COAP_Q_BLOCK_SUPPORT
166 coap_session_fix_non_probing_wait_base(session);
167 coap_session_fix_non_partial_timeout(session);
168#endif /* COAP_Q_BLOCK_SUPPORT */
169 }
170 return;
171}
172
173void
175 if (value > 0) {
176 session->max_retransmit = value;
177 coap_log_debug("***%s: session max_retransmit set to %u\n",
178 coap_session_str(session), session->max_retransmit);
179 }
180}
181
182void
183coap_session_set_nstart(coap_session_t *session, uint16_t value) {
184 if (value > 0) {
185 session->nstart = value;
186 coap_log_debug("***%s: session nstart set to %u\n",
187 coap_session_str(session), session->nstart);
188 }
189}
190
191void
193 coap_fixed_point_t value) {
194 if (value.integer_part > 0 && value.fractional_part < 1000) {
195 session->default_leisure = value;
196 coap_log_debug("***%s: session default_leisure set to %u.%03u\n",
199 }
200}
201
202void
204 if (value > 0) {
205 session->probing_rate = value;
206 coap_log_debug("***%s: session probing_rate set to %" PRIu32 "\n",
207 coap_session_str(session), session->probing_rate);
208 }
209}
210
211void
213#if COAP_Q_BLOCK_SUPPORT
214 if (value > 0) {
215 session->max_payloads = value;
216 coap_log_debug("***%s: session max_payloads set to %u\n",
217 coap_session_str(session), session->max_payloads);
218 coap_session_fix_non_probing_wait_base(session);
219 coap_session_fix_non_partial_timeout(session);
220 }
221#else /* ! COAP_Q_BLOCK_SUPPORT */
222 (void)session;
223 (void)value;
224#endif /* ! COAP_Q_BLOCK_SUPPORT */
225}
226
227void
229#if COAP_Q_BLOCK_SUPPORT
230 if (value > 0) {
231 session->non_max_retransmit = value;
232 coap_log_debug("***%s: session non_max_retransmit set to %u\n",
233 coap_session_str(session), session->non_max_retransmit);
234 coap_session_fix_non_probing_wait_base(session);
235 coap_session_fix_non_partial_timeout(session);
236 }
237#else /* ! COAP_Q_BLOCK_SUPPORT */
238 (void)session;
239 (void)value;
240#endif /* ! COAP_Q_BLOCK_SUPPORT */
241}
242
243void
245 coap_fixed_point_t value) {
246#if COAP_Q_BLOCK_SUPPORT
247 if (value.integer_part > 0 && value.fractional_part < 1000) {
248 session->non_timeout = value;
249 coap_log_debug("***%s: session non_timeout set to %u.%03u\n",
250 coap_session_str(session), session->non_timeout.integer_part,
251 session->non_timeout.fractional_part);
252 coap_session_fix_non_probing_wait_base(session);
253 coap_session_fix_non_partial_timeout(session);
254 }
255#else /* ! COAP_Q_BLOCK_SUPPORT */
256 (void)session;
257 (void)value;
258#endif /* ! COAP_Q_BLOCK_SUPPORT */
259}
260
261void
263 coap_fixed_point_t value) {
264#if COAP_Q_BLOCK_SUPPORT
265 if (value.integer_part > 0 && value.fractional_part < 1000)
266 session->non_receive_timeout = value;
267 coap_log_debug("***%s: session non_receive_timeout set to %u.%03u\n",
268 coap_session_str(session),
269 session->non_receive_timeout.integer_part,
270 session->non_receive_timeout.fractional_part);
271#else /* ! COAP_Q_BLOCK_SUPPORT */
272 (void)session;
273 (void)value;
274#endif /* ! COAP_Q_BLOCK_SUPPORT */
275}
276
279 return session->ack_timeout;
280}
281
284 return session->ack_random_factor;
285}
286
287uint16_t
289 return session->max_retransmit;
290}
291
292uint16_t
294 return session->nstart;
295}
296
299 return session->default_leisure;
300}
301
302uint32_t
304 return session->probing_rate;
305}
306
307uint16_t
309#if COAP_Q_BLOCK_SUPPORT
310 return session->max_payloads;
311#else /* ! COAP_Q_BLOCK_SUPPORT */
312 (void)session;
314#endif /* ! COAP_Q_BLOCK_SUPPORT */
315}
316
317uint16_t
319#if COAP_Q_BLOCK_SUPPORT
320 return session->non_max_retransmit;
321#else /* ! COAP_Q_BLOCK_SUPPORT */
322 (void)session;
324#endif /* ! COAP_Q_BLOCK_SUPPORT */
325}
326
329#if COAP_Q_BLOCK_SUPPORT
330 return session->non_timeout;
331#else /* ! COAP_Q_BLOCK_SUPPORT */
332 (void)session;
334#endif /* ! COAP_Q_BLOCK_SUPPORT */
335}
336
339#if COAP_Q_BLOCK_SUPPORT
340 return session->non_receive_timeout;
341#else /* ! COAP_Q_BLOCK_SUPPORT */
342 (void)session;
344#endif /* ! COAP_Q_BLOCK_SUPPORT */
345}
346
349 coap_lock_lock(return NULL);
352 return session;
353}
354
357 ++session->ref;
358 return session;
359}
360
361COAP_API void
363 if (session) {
364#if COAP_THREAD_SAFE
365 coap_context_t *context = session->context;
366 (void)context;
367#endif /* COAP_THREAD_SAFE */
368
369 coap_lock_lock(return);
372 }
373}
374
375void
377 if (session) {
379#ifndef __COVERITY__
380 assert(session->ref > 0);
381 if (session->ref > 0)
382 --session->ref;
383 if (session->ref == 0 && session->type == COAP_SESSION_TYPE_CLIENT)
384 coap_session_free(session);
385#else /* __COVERITY__ */
386 /* Coverity scan is fooled by the reference counter leading to
387 * false positives for USE_AFTER_FREE. */
388 --session->ref;
389 __coverity_negative_sink__(session->ref);
390 /* Indicate that resources are released properly. */
391 if (session->ref == 0 && session->type == COAP_SESSION_TYPE_CLIENT) {
392 __coverity_free__(session);
393 }
394#endif /* __COVERITY__ */
395 }
396}
397
398COAP_API void
399coap_session_set_app_data(coap_session_t *session, void *app_data) {
400 assert(session);
401 coap_lock_lock(return);
402 coap_session_set_app_data2_lkd(session, app_data, NULL);
404}
405
406void *
408 assert(session);
409 return session->app_data;
410}
411
412COAP_API void *
415 void *old_data;
416
417 coap_lock_lock(return NULL);
418 old_data = coap_session_set_app_data2_lkd(session, app_data, callback);
420 return old_data;
421}
422
423void *
426 void *old_data = session->app_data;
427
428 session->app_data = app_data;
429 session->app_cb = app_data ? callback : NULL;
430 return old_data;
431}
432
433static coap_session_t *
435 const coap_addr_hash_t *addr_hash,
436 const coap_address_t *local_addr,
437 const coap_address_t *remote_addr, int ifindex,
438 coap_context_t *context, coap_endpoint_t *endpoint) {
440 sizeof(coap_session_t));
441#if ! COAP_SERVER_SUPPORT
442 (void)endpoint;
443#endif /* ! COAP_SERVER_SUPPORT */
444 if (!session)
445 return NULL;
446 memset(session, 0, sizeof(*session));
447 session->proto = proto;
448 session->type = type;
449 if (addr_hash)
450 memcpy(&session->addr_hash, addr_hash, sizeof(session->addr_hash));
451 else
452 memset(&session->addr_hash, 0, sizeof(session->addr_hash));
453 if (local_addr) {
454 coap_address_copy(&session->addr_info.local, local_addr);
455#if COAP_CLIENT_SUPPORT
456 coap_address_copy(&session->local_reconnect, local_addr);
457#endif /* COAP_CLIENT_SUPPORT */
458 } else {
460#if COAP_CLIENT_SUPPORT
462#endif /* COAP_CLIENT_SUPPORT */
463 }
464 if (remote_addr)
465 coap_address_copy(&session->addr_info.remote, remote_addr);
466 else
468 session->ifindex = ifindex;
469 session->context = context;
470#if COAP_SERVER_SUPPORT
471 session->endpoint = endpoint;
472 if (endpoint)
473 session->mtu = endpoint->default_mtu;
474 else
475#endif /* COAP_SERVER_SUPPORT */
477 session->block_mode = context->block_mode;
478#if COAP_Q_BLOCK_SUPPORT
479 if (session->block_mode & COAP_BLOCK_FORCE_Q_BLOCK) {
480 set_block_mode_has_q(session->block_mode);
481 }
482#endif
483 if (proto == COAP_PROTO_DTLS) {
484 session->tls_overhead = 29;
485 if (session->tls_overhead >= session->mtu) {
486 session->tls_overhead = session->mtu;
487 coap_log_err("DTLS overhead exceeds MTU\n");
488 }
489 }
493 session->nstart = COAP_DEFAULT_NSTART;
496#if COAP_Q_BLOCK_SUPPORT
497 session->max_payloads = COAP_DEFAULT_MAX_PAYLOADS;
498 session->non_max_retransmit = COAP_DEFAULT_NON_MAX_RETRANSMIT;
499 session->non_timeout = COAP_DEFAULT_NON_TIMEOUT;
500 session->non_receive_timeout = COAP_DEFAULT_NON_RECEIVE_TIMEOUT;
501 coap_session_fix_non_probing_wait_base(session);
502 coap_session_fix_non_partial_timeout(session);
503#endif /* COAP_Q_BLOCK_SUPPORT */
504 session->dtls_event = -1;
509 session->max_token_size = context->max_token_size; /* RFC8974 */
510 if (session->type != COAP_SESSION_TYPE_CLIENT)
512
513 /* Randomly initialize */
514 /* TCP/TLS have no notion of mid */
515 if (COAP_PROTO_NOT_RELIABLE(session->proto))
516 coap_prng_lkd((unsigned char *)&session->tx_mid, sizeof(session->tx_mid));
517 coap_prng_lkd((unsigned char *)&session->tx_rtag, sizeof(session->tx_rtag));
518
519 return session;
520}
521
522void
524 coap_queue_t *q, *tmp;
525 coap_lg_xmit_t *lq, *ltmp;
526
527#if COAP_PROXY_SUPPORT
528 if (session->ref_proxy_subs)
529 coap_delete_proxy_subscriber(session, NULL, 0, COAP_PROXY_SUBS_ALL);
530#endif /* COAP_PROXY_SUPPORT */
531#if COAP_CLIENT_SUPPORT
532 coap_lg_crcv_t *lg_crcv, *etmp;
533
534 /* Need to do this before (D)TLS and socket is closed down */
535 LL_FOREACH_SAFE(session->lg_crcv, lg_crcv, etmp) {
536 if (lg_crcv->observe_set && session->no_observe_cancel == 0) {
537 /* Need to close down observe */
538 if (coap_cancel_observe_lkd(session, lg_crcv->app_token, COAP_MESSAGE_NON)) {
539 /* Need to delete node we set up for NON */
540 coap_queue_t *queue = session->context->sendqueue;
541
542 while (queue) {
543 if (queue->session == session) {
545 break;
546 }
547 queue = queue->next;
548 }
549 }
550 }
551 /* In case coap_cancel_observe_lkd() failure, which could clear down lg_crcv */
552 if (!session->lg_crcv)
553 break;
554 LL_DELETE(session->lg_crcv, lg_crcv);
555 coap_block_delete_lg_crcv(session, lg_crcv);
556 }
557#endif /* COAP_CLIENT_SUPPORT */
558
559 LL_FOREACH_SAFE(session->delayqueue, q, tmp) {
560 if (q->pdu->type==COAP_MESSAGE_CON) {
561 coap_handle_nack(session, q->pdu,
562 session->proto == COAP_PROTO_DTLS ?
564 q->id);
565 }
567 }
568 if (session->partial_pdu)
570 if (session->sock.lfunc[COAP_LAYER_SESSION].l_close)
571 session->sock.lfunc[COAP_LAYER_SESSION].l_close(session);
572 if (session->psk_identity)
574 if (session->psk_key)
576 if (session->psk_hint)
578
579#if COAP_SERVER_SUPPORT
580 coap_cache_entry_t *cp, *ctmp;
581 HASH_ITER(hh, session->context->cache, cp, ctmp) {
582 /* cp->session is NULL if not session based */
583 if (cp->session == session) {
584 coap_delete_cache_entry(session->context, cp);
585 }
586 }
587#endif /* COAP_PROXY_SUPPORT */
588 LL_FOREACH_SAFE(session->lg_xmit, lq, ltmp) {
589 LL_DELETE(session->lg_xmit, lq);
590 coap_block_delete_lg_xmit(session, lq);
591 }
592#if COAP_SERVER_SUPPORT
593 coap_lg_srcv_t *sq, *stmp;
594
595 LL_FOREACH_SAFE(session->lg_srcv, sq, stmp) {
596 LL_DELETE(session->lg_srcv, sq);
597 coap_block_delete_lg_srcv(session, sq);
598 }
599#endif /* COAP_SERVER_SUPPORT */
600#if COAP_OSCORE_SUPPORT
602#endif /* COAP_OSCORE_SUPPORT */
603#if COAP_WS_SUPPORT
604 coap_free_type(COAP_STRING, session->ws);
605 coap_delete_str_const(session->ws_host);
606#endif /* COAP_WS_SUPPORT */
607}
608
609void
611 if (!session)
612 return;
614 assert(session->ref == 0);
615 if (session->ref)
616 return;
617 /* Make sure nothing gets deleted under our feet */
619 coap_session_mfree(session);
620#if COAP_SERVER_SUPPORT
622 if (session->endpoint) {
623 if (session->endpoint->sessions)
624 SESSIONS_DELETE(session->endpoint->sessions, session);
625 } else
626#endif /* COAP_SERVER_SUPPORT */
627#if COAP_CLIENT_SUPPORT
628 if (session->context) {
629 if (session->context->sessions)
630 SESSIONS_DELETE(session->context->sessions, session);
631 }
633#endif /* COAP_CLIENT_SUPPORT */
635 coap_delete_bin_const(session->echo);
636#if COAP_SERVER_SUPPORT
638#endif /* COAP_SERVER_SUPPORT */
639
640 if (session->app_cb) {
641 session->app_cb(session->app_data);
642 }
643 coap_log_debug("***%s: session %p: closed\n", coap_session_str(session),
644 (void *)session);
645 assert(session->ref == 1);
647}
648
649#if COAP_SERVER_SUPPORT
650void
652 int i;
653
656 coap_cancel_all_messages(session->context, session, NULL);
657 RESOURCES_ITER(session->context->resources, r) {
658 /* In case code is broken somewhere */
659 for (i = 0; i < 1000; i++) {
660 if (!coap_delete_observer(r, session, NULL))
661 break;
662 }
663 }
664 if (session->context->unknown_resource) {
665 /* In case code is broken somewhere */
666 for (i = 0; i < 1000; i++) {
667 if (!coap_delete_observer(session->context->unknown_resource, session, NULL))
668 break;
669 }
670 }
671 if (session->context->proxy_uri_resource) {
672 /* In case code is broken somewhere */
673 for (i = 0; i < 1000; i++) {
674 if (!coap_delete_observer(session->context->proxy_uri_resource, session, NULL))
675 break;
676 }
677 }
678 while (session->delayqueue) {
679 coap_queue_t *q = session->delayqueue;
680
681 session->delayqueue = q->next;
683 }
684 /* Force session to go away */
687
689}
690#endif /* COAP_SERVER_SUPPORT */
691
692static size_t
694 size_t max_with_header) {
695#if COAP_DISABLE_TCP
696 (void)session;
697 return max_with_header > COAP_PDU_MAX_UDP_HEADER_SIZE
698 ? max_with_header - COAP_PDU_MAX_UDP_HEADER_SIZE
699 : 0;
700#else /* !COAP_DISABLE_TCP */
701 if (COAP_PROTO_NOT_RELIABLE(session->proto))
702 return max_with_header > COAP_PDU_MAX_UDP_HEADER_SIZE
703 ? max_with_header - COAP_PDU_MAX_UDP_HEADER_SIZE
704 : 0;
705 /* we must assume there is no token to be on the safe side */
706 if (max_with_header <= 2)
707 return 0;
708 else if (max_with_header <= COAP_MAX_MESSAGE_SIZE_TCP0 + 2)
709 return max_with_header - 2;
710 else if (max_with_header <= COAP_MAX_MESSAGE_SIZE_TCP8 + 3)
711 return max_with_header - 3;
712 else if (max_with_header <= COAP_MAX_MESSAGE_SIZE_TCP16 + 4)
713 return max_with_header - 4;
714 else
715 return max_with_header - COAP_PDU_MAX_TCP_HEADER_SIZE;
716#endif /* !COAP_DISABLE_TCP */
717}
718
719size_t
721 if (session->csm_rcv_mtu)
723 (size_t)(session->csm_rcv_mtu));
724
726 (size_t)(session->mtu - session->tls_overhead));
727}
728
729COAP_API size_t
731 size_t size;
732 coap_session_t *session_rw;
733
734 /*
735 * Need to do this to not get a compiler warning about const parameters
736 * but need to maintain source code backward compatibility
737 */
738 memcpy(&session_rw, &session, sizeof(session_rw));
739 coap_lock_lock(return 0);
740 size = coap_session_max_pdu_size_lkd(session_rw);
742 return size;
743}
744
745size_t
747 size_t max_with_header;
748
750#if COAP_CLIENT_SUPPORT
751 /*
752 * Delay if session->doing_first is set.
753 * E.g. Reliable and CSM not in yet for checking block support
754 */
755 coap_session_t *session_rw;
756
757 /*
758 * Need to do this to not get a compiler warning about const parameters
759 * but need to maintain source code backward compatibility
760 */
761 memcpy(&session_rw, &session, sizeof(session_rw));
762 if (coap_client_delay_first(session_rw) == 0) {
763 coap_log_debug("coap_client_delay_first: timeout\n");
764 /* Have to go with the defaults */
765 }
766#endif /* COAP_CLIENT_SUPPORT */
767
768 max_with_header = (size_t)(session->mtu - session->tls_overhead);
769
770 return coap_session_max_pdu_size_internal(session, max_with_header);
771}
772
773void
774coap_session_set_mtu(coap_session_t *session, unsigned mtu) {
775 if (mtu > COAP_DEFAULT_MAX_PDU_RX_SIZE) {
776 mtu = COAP_DEFAULT_MAX_PDU_RX_SIZE;
777 coap_log_debug("* %s: Restricting MTU size to %u\n",
778 coap_session_str(session), mtu);
779 }
780 if (mtu < 64)
781 mtu = 64;
782 session->mtu = mtu;
783 if (session->tls_overhead >= session->mtu) {
784 session->tls_overhead = session->mtu;
785 coap_log_err("DTLS overhead exceeds MTU\n");
786 }
787}
788
789ssize_t
791 coap_queue_t *node) {
792 if (node) {
793 coap_queue_t *removed = NULL;
794 coap_remove_from_queue(&session->context->sendqueue, session, node->id, &removed);
795 assert(removed == node);
797 node->session = NULL;
798 node->t = 0;
799 } else {
800 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
801 coap_queue_t *q = NULL;
802 /* Check same mid is not getting re-used in violation of RFC7252 */
803 LL_FOREACH(session->delayqueue, q) {
804 if (q->id == pdu->mid) {
805 coap_log_err("** %s: mid=0x%04x: already in-use - dropped\n",
806 coap_session_str(session), pdu->mid);
807 return COAP_INVALID_MID;
808 }
809 }
810 }
811 node = coap_new_node();
812 if (node == NULL)
813 return COAP_INVALID_MID;
814 node->id = pdu->mid;
815 node->pdu = pdu;
816 if (pdu->type == COAP_MESSAGE_CON && COAP_PROTO_NOT_RELIABLE(session->proto)) {
817 uint8_t r;
818 coap_prng_lkd(&r, sizeof(r));
819 /* add timeout in range [ACK_TIMEOUT...ACK_TIMEOUT * ACK_RANDOM_FACTOR] */
820 node->timeout = coap_calc_timeout(session, r);
821 }
822 coap_address_copy(&node->remote, &session->addr_info.remote);
823 }
824 LL_APPEND(session->delayqueue, node);
825 coap_log_debug("** %s: mid=0x%04x: delayed\n",
826 coap_session_str(session), node->id);
827 return COAP_PDU_DELAYED;
828}
829
830#if !COAP_DISABLE_TCP
831void
833 coap_pdu_t *pdu;
834 uint8_t buf[4];
835 assert(COAP_PROTO_RELIABLE(session->proto));
836 coap_log_debug("***%s: sending CSM\n", coap_session_str(session));
837 session->state = COAP_SESSION_STATE_CSM;
838 session->partial_write = 0;
839 if (session->mtu == 0)
840 coap_session_set_mtu(session, COAP_DEFAULT_MTU); /* base value */
842 if (pdu == NULL
844 coap_encode_var_safe(buf, sizeof(buf),
845 session->context->csm_max_message_size), buf) == 0
847 coap_encode_var_safe(buf, sizeof(buf),
848 0), buf) == 0
849 || (session->max_token_size > COAP_TOKEN_DEFAULT_MAX &&
852 coap_encode_var_safe(buf, sizeof(buf),
853 session->max_token_size),
854 buf) == 0)
855 || coap_pdu_encode_header(pdu, session->proto) == 0
856 ) {
858 } else {
859 ssize_t bytes_written;
860
861 pdu->session = session;
862 bytes_written = coap_session_send_pdu(session, pdu);
863 if (bytes_written != (ssize_t)pdu->used_size + pdu->hdr_size) {
865 } else {
866 session->csm_rcv_mtu = session->context->csm_max_message_size;
867 if (session->csm_rcv_mtu > COAP_BERT_BASE)
868 session->csm_bert_loc_support = 1;
869 else
870 session->csm_bert_loc_support = 0;
871 }
872 }
873 if (pdu)
875}
876#endif /* !COAP_DISABLE_TCP */
877
880 coap_mid_t mid;
881
883 mid = coap_session_send_ping_lkd(session);
884 if (mid != COAP_INVALID_MID) {
885 coap_tick_t now;
886
887 coap_ticks(&now);
888 session->last_ping_mid = mid;
889 session->last_rx_tx = now;
890 session->last_ping = now;
891 }
893 return mid;
894}
895
898 coap_pdu_t *ping = NULL;
899
901 if (session->state != COAP_SESSION_STATE_ESTABLISHED ||
902 session->con_active)
903 return COAP_INVALID_MID;
904 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
905 uint16_t mid = coap_new_message_id_lkd(session);
906 ping = coap_pdu_init(COAP_MESSAGE_CON, 0, mid, 0);
907 }
908#if !COAP_DISABLE_TCP
909 else {
911 }
912#endif /* !COAP_DISABLE_TCP */
913 if (!ping)
914 return COAP_INVALID_MID;
915 return coap_send_internal(session, ping, NULL);
916}
917
918void
920 if (session->state != COAP_SESSION_STATE_ESTABLISHED) {
921 coap_log_debug("***%s: session connected\n",
922 coap_session_str(session));
923 if (session->state == COAP_SESSION_STATE_CSM) {
925#if COAP_CLIENT_SUPPORT
927#endif /* COAP_CLIENT_SUPPORT */
928 if (session->doing_first)
929 session->doing_first = 0;
930 }
931 }
932
934 session->partial_write = 0;
935
936 if (session->proto==COAP_PROTO_DTLS) {
937 session->tls_overhead = coap_dtls_get_overhead(session);
938 if (session->tls_overhead >= session->mtu) {
939 session->tls_overhead = session->mtu;
940 coap_log_err("DTLS overhead exceeds MTU\n");
941 }
942 }
943
944 while (session->delayqueue && session->state == COAP_SESSION_STATE_ESTABLISHED) {
945 ssize_t bytes_written;
946 coap_queue_t *q = session->delayqueue;
947 coap_address_t remote;
948
949 if (q->pdu->type == COAP_MESSAGE_CON && COAP_PROTO_NOT_RELIABLE(session->proto)) {
950 if (session->con_active >= COAP_NSTART(session))
951 break;
952 session->con_active++;
953 }
954 /* Take entry off the queue */
955 session->delayqueue = q->next;
956 q->next = NULL;
957
958 coap_address_copy(&remote, &session->addr_info.remote);
960 coap_log_debug("** %s: mid=0x%04x: transmitted after delay (2)\n",
961 coap_session_str(session), (int)q->pdu->mid);
962 bytes_written = coap_session_send_pdu(session, q->pdu);
963 if (q->pdu->type == COAP_MESSAGE_CON && COAP_PROTO_NOT_RELIABLE(session->proto)) {
964 if (coap_wait_ack(session->context, session, q) >= 0)
965 q = NULL;
966 }
967 coap_address_copy(&session->addr_info.remote, &remote);
968 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
969 if (q)
971 if (bytes_written < 0)
972 break;
973 } else if (q) {
974 if (bytes_written <= 0 || (size_t)bytes_written < q->pdu->used_size + q->pdu->hdr_size) {
975 q->next = session->delayqueue;
976 session->delayqueue = q;
977 if (bytes_written > 0)
978 session->partial_write = (size_t)bytes_written;
979 break;
980 } else {
982 }
983 }
984 }
985}
986
987#if COAP_MAX_LOGGING_LEVEL >= _COAP_LOG_DEBUG
988static const char *
990 switch (reason) {
992 return "COAP_NACK_TOO_MANY_RETRIES";
994 return "COAP_NACK_NOT_DELIVERABLE";
995 case COAP_NACK_RST:
996 return "COAP_NACK_RST";
998 return "COAP_NACK_TLS_FAILED";
1000 return "COAP_NACK_ICMP_ISSUE";
1002 return "COAP_NACK_BAD_RESPONSE";
1004 return "COAP_NACK_TLS_LAYER_FAILED";
1006 return "COAP_NACK_WS_LAYER_FAILED";
1008 return "COAP_NACK_WS_FAILED";
1009 default:
1010 return "???";
1011 }
1012}
1013#endif /* COAP_MAX_LOGGING_LEVEL >= _COAP_LOG_DEBUG */
1014
1015void
1017 coap_pdu_t *sent,
1018 const coap_nack_reason_t reason,
1019 const coap_mid_t mid) {
1020 if (session->context->nack_handler) {
1021 coap_bin_const_t token = {0, NULL};
1022
1023 if (sent) {
1024 coap_check_update_token(session, sent);
1025 token = sent->actual_token;
1026 }
1027 coap_lock_callback(session->context->nack_handler(session, sent, reason, mid));
1028 if (sent) {
1029 coap_update_token(sent, token.length, token.s);
1030 }
1031 }
1032#if COAP_CLIENT_SUPPORT
1033 if (reason != COAP_NACK_ICMP_ISSUE) {
1034 session->doing_send_recv = 0;
1035 }
1036#endif /* COAP_CLIENT_SUPPORT */
1037}
1038
1039COAP_API void
1045
1046void
1048#if !COAP_DISABLE_TCP
1049 coap_session_state_t state = session->state;
1050#endif /* !COAP_DISABLE_TCP */
1051 coap_lg_xmit_t *lq, *ltmp;
1052#if COAP_SERVER_SUPPORT
1053 coap_lg_srcv_t *sq, *stmp;
1054#endif /* COAP_SERVER_SUPPORT */
1055#if COAP_CLIENT_SUPPORT
1056 coap_lg_crcv_t *cq, *etmp;
1057#endif /* COAP_CLIENT_SUPPORT */
1058 int sent_nack = 0;
1059 coap_queue_t *q;
1060
1062#if COAP_CLIENT_SUPPORT
1063 coap_session_failed(session);
1064#endif /* COAP_CLIENT_SUPPORT */
1065
1066 q = session->context->sendqueue;
1067 while (q) {
1068 if (q->session == session) {
1069 /* Take the first one */
1070 coap_handle_nack(session, q->pdu, reason, q->id);
1071 sent_nack = 1;
1072 break;
1073 }
1074 q = q->next;
1075 }
1076
1077 if (reason != COAP_NACK_ICMP_ISSUE) {
1078 while (session->delayqueue) {
1079 q = session->delayqueue;
1080 session->delayqueue = q->next;
1081 q->next = NULL;
1082 coap_log_debug("** %s: mid=0x%04x: not transmitted after disconnect\n",
1083 coap_session_str(session), q->id);
1084 if (q->pdu->type == COAP_MESSAGE_CON) {
1085 coap_handle_nack(session, q->pdu, reason, q->id);
1086 sent_nack = 1;
1087 }
1088
1089#if COAP_CLIENT_SUPPORT
1090 session->doing_send_recv = 0;
1091#endif /* COAP_CLIENT_SUPPORT */
1093 }
1094 }
1095#if COAP_CLIENT_SUPPORT
1096 if (!sent_nack && session->lg_crcv) {
1097 /* Take the first one */
1098 coap_handle_nack(session, session->lg_crcv->sent_pdu, reason,
1099 session->lg_crcv->sent_pdu->mid);
1100 sent_nack = 1;
1101 }
1102#endif /* COAP_CLIENT_SUPPORT */
1103 if (!sent_nack) {
1104 /* Unable to determine which request disconnection was for */
1105 coap_handle_nack(session, NULL, reason, 0);
1106 }
1107 if (reason == COAP_NACK_ICMP_ISSUE) {
1108 coap_log_debug("***%s: session ICMP issue (%s)\n",
1109 coap_session_str(session), coap_nack_name(reason));
1110 return;
1111 }
1112 coap_log_debug("***%s: session disconnected (%s)\n",
1113 coap_session_str(session), coap_nack_name(reason));
1114#if COAP_SERVER_SUPPORT
1115 coap_delete_observers(session->context, session);
1116#endif /* COAP_SERVER_SUPPORT */
1117
1118 if (session->proto == COAP_PROTO_UDP)
1120 else
1121 session->state = COAP_SESSION_STATE_NONE;
1122
1123 session->con_active = 0;
1124
1125 if (session->partial_pdu) {
1127 session->partial_pdu = NULL;
1128 }
1129 session->partial_read = 0;
1130
1131 /* Not done if nack handler called above */
1132 while (session->delayqueue) {
1133 q = session->delayqueue;
1134 session->delayqueue = q->next;
1135 q->next = NULL;
1136 coap_log_debug("** %s: mid=0x%04x: not transmitted after disconnect\n",
1137 coap_session_str(session), q->id);
1138#if COAP_CLIENT_SUPPORT
1139 session->doing_send_recv = 0;
1140#endif /* COAP_CLIENT_SUPPORT */
1142 }
1143
1144#if COAP_CLIENT_SUPPORT
1145 if (!session->session_failed) {
1146 /* Need to do this before (D)TLS and socket is closed down */
1147 LL_FOREACH_SAFE(session->lg_crcv, cq, etmp) {
1148 LL_DELETE(session->lg_crcv, cq);
1149 coap_block_delete_lg_crcv(session, cq);
1150 }
1151 }
1152#endif /* COAP_CLIENT_SUPPORT */
1153 LL_FOREACH_SAFE(session->lg_xmit, lq, ltmp) {
1154 LL_DELETE(session->lg_xmit, lq);
1155 coap_block_delete_lg_xmit(session, lq);
1156 }
1157#if COAP_SERVER_SUPPORT
1158 LL_FOREACH_SAFE(session->lg_srcv, sq, stmp) {
1159 LL_DELETE(session->lg_srcv, sq);
1160 coap_block_delete_lg_srcv(session, sq);
1161 }
1162#endif /* COAP_SERVER_SUPPORT */
1163 coap_cancel_session_messages(session->context, session, reason);
1164
1165#if !COAP_DISABLE_TCP
1166 if (COAP_PROTO_RELIABLE(session->proto)) {
1167 if (coap_netif_available(session)) {
1171 }
1172#if COAP_CLIENT_SUPPORT
1173 if (state != COAP_SESSION_STATE_NONE && !session->session_failed) {
1177 }
1178#endif /* COAP_CLIENT_SUPPORT */
1179 if (session->doing_first)
1180 session->doing_first = 0;
1181 }
1182#endif /* !COAP_DISABLE_TCP */
1183 if (session->sock.lfunc[COAP_LAYER_SESSION].l_close)
1184 session->sock.lfunc[COAP_LAYER_SESSION].l_close(session);
1185}
1186
1187#if COAP_CLIENT_SUPPORT
1188void
1190 if (session->context->reconnect_time &&
1192 session->type == COAP_SESSION_TYPE_CLIENT) {
1193 if (session->sock.lfunc[COAP_LAYER_SESSION].l_close)
1194 session->sock.lfunc[COAP_LAYER_SESSION].l_close(session);
1195 session->session_failed = 1;
1196 coap_ticks(&session->last_rx_tx);
1197 }
1198}
1199#endif /* COAP_CLIENT_SUPPORT */
1200
1201#if COAP_SERVER_SUPPORT
1202static void
1203coap_make_addr_hash(coap_addr_hash_t *addr_hash, coap_proto_t proto,
1204 const coap_addr_tuple_t *addr_info) {
1205 memset(addr_hash, 0, sizeof(coap_addr_hash_t));
1206 coap_address_copy(&addr_hash->remote, &addr_info->remote);
1207 addr_hash->lport = coap_address_get_port(&addr_info->local);
1208 addr_hash->proto = proto;
1209}
1210
1213 const coap_packet_t *packet, coap_tick_t now) {
1214 coap_session_t *session;
1215 coap_session_t *rtmp;
1216 unsigned int num_idle = 0;
1217 unsigned int num_hs = 0;
1218 coap_session_t *oldest = NULL;
1219 coap_session_t *oldest_hs = NULL;
1220 coap_addr_hash_t addr_hash;
1221
1222 coap_make_addr_hash(&addr_hash, endpoint->proto, &packet->addr_info);
1223 SESSIONS_FIND(endpoint->sessions, addr_hash, session);
1224 if (session) {
1225 /* Maybe mcast or unicast IP address which is not in the hash */
1226 coap_address_copy(&session->addr_info.local, &packet->addr_info.local);
1227 session->ifindex = packet->ifindex;
1228 session->last_rx_tx = now;
1229 return session;
1230 }
1231
1232#if COAP_CLIENT_SUPPORT
1233 SESSIONS_FIND(endpoint->context->sessions, addr_hash, session);
1234 if (session) {
1235 /* Maybe mcast or unicast IP address which is not in the hash */
1236 coap_address_copy(&session->addr_info.local, &packet->addr_info.local);
1237 session->ifindex = packet->ifindex;
1238 session->last_rx_tx = now;
1239 return session;
1240 }
1241
1242 if (coap_is_mcast(&packet->addr_info.local)) {
1243 /* Check if this a proxy client packet we sent on another socket */
1244 SESSIONS_ITER(endpoint->context->sessions, session, rtmp) {
1245 if (coap_address_equals(&session->addr_info.remote, &packet->addr_info.local) &&
1248 /* Drop looped back packet to stop recursion / confusion */
1249 return NULL;
1250 }
1251 }
1252 }
1253#endif /* COAP_CLIENT_SUPPORT */
1254 SESSIONS_ITER(endpoint->sessions, session, rtmp) {
1255 if (session->ref == 0 && session->delayqueue == NULL) {
1256 if (session->type == COAP_SESSION_TYPE_SERVER) {
1257 ++num_idle;
1258 if (oldest==NULL || session->last_rx_tx < oldest->last_rx_tx)
1259 oldest = session;
1260
1261 if (session->state == COAP_SESSION_STATE_HANDSHAKE) {
1262 ++num_hs;
1263 /* See if this is a partial (D)TLS session set up
1264 which needs to be cleared down to prevent DOS */
1265 if ((session->last_rx_tx + COAP_PARTIAL_SESSION_TIMEOUT_TICKS) < now) {
1266 if (oldest_hs == NULL ||
1267 session->last_rx_tx < oldest_hs->last_rx_tx)
1268 oldest_hs = session;
1269 }
1270 }
1271 } else if (session->type == COAP_SESSION_TYPE_HELLO) {
1272 ++num_hs;
1273 /* See if this is a partial (D)TLS session set up for Client Hello
1274 which needs to be cleared down to prevent DOS */
1275 if ((session->last_rx_tx + COAP_PARTIAL_SESSION_TIMEOUT_TICKS) < now) {
1276 if (oldest_hs == NULL ||
1277 session->last_rx_tx < oldest_hs->last_rx_tx)
1278 oldest_hs = session;
1279 }
1280 }
1281 }
1282 }
1283
1284 if (endpoint->context->max_idle_sessions > 0 &&
1285 num_idle >= endpoint->context->max_idle_sessions) {
1287 coap_session_free(oldest);
1288 } else if (oldest_hs) {
1289 coap_log_warn("***%s: Incomplete session timed out\n",
1290 coap_session_str(oldest_hs));
1292 coap_session_free(oldest_hs);
1293 }
1294
1295 if (num_hs > (endpoint->context->max_handshake_sessions ?
1296 endpoint->context->max_handshake_sessions :
1298 /* Maxed out on number of sessions in (D)TLS negotiation state */
1299 coap_log_debug("Oustanding sessions in COAP_SESSION_STATE_HANDSHAKE too "
1300 "large. New request ignored\n");
1301 return NULL;
1302 }
1303
1304 if (endpoint->proto == COAP_PROTO_DTLS) {
1305 /*
1306 * Need to check that this actually is a Client Hello before wasting
1307 * time allocating and then freeing off session.
1308 */
1309
1310 /*
1311 * Generic header structure of the DTLS record layer.
1312 * typedef struct __attribute__((__packed__)) {
1313 * uint8_t content_type; content type of the included message
1314 * uint16_t version; Protocol version
1315 * uint16_t epoch; counter for cipher state changes
1316 * uint8_t sequence_number[6]; sequence number
1317 * uint16_t length; length of the following fragment
1318 * uint8_t handshake; If content_type == DTLS_CT_HANDSHAKE
1319 * } dtls_record_handshake_t;
1320 */
1321#define OFF_CONTENT_TYPE 0 /* offset of content_type in dtls_record_handshake_t */
1322#define DTLS_CT_ALERT 21 /* Content Type Alert */
1323#define DTLS_CT_HANDSHAKE 22 /* Content Type Handshake */
1324#define OFF_HANDSHAKE_TYPE 13 /* offset of handshake in dtls_record_handshake_t */
1325#define DTLS_HT_CLIENT_HELLO 1 /* Client Hello handshake type */
1326#define DTLS_CT_CID 25 /* Content Type Connection ID */
1327#define OFF_CID 11 /* offset of CID in dtls_record_handshake_t */
1328#define OFF_CID_DTLS13 1 /* offset of CID in DTLS1.3 Unified Header */
1329
1330 const uint8_t *payload = (const uint8_t *)packet->payload;
1331 size_t length = packet->length;
1332 if (length < (OFF_HANDSHAKE_TYPE + 1)) {
1333 coap_log_debug("coap_dtls_hello: ContentType %d Short Packet (%zu < %d) dropped\n",
1334 payload[OFF_CONTENT_TYPE], length,
1335 OFF_HANDSHAKE_TYPE + 1);
1336 return NULL;
1337 }
1338 if ((payload[OFF_CONTENT_TYPE] & 0x30) == 0x30 ||
1339 payload[OFF_CONTENT_TYPE] == DTLS_CT_CID) {
1340 /* Client may have changed its IP address */
1341 int changed = 0;
1342
1343 SESSIONS_ITER(endpoint->sessions, session, rtmp) {
1344 if (session->client_cid) {
1345 if ((session->is_dtls13 && (payload[OFF_CONTENT_TYPE] & 0x30) == 0x30 &&
1346 length > (OFF_CID_DTLS13 + session->client_cid->length) &&
1347 memcmp(session->client_cid->s, &payload[OFF_CID_DTLS13],
1348 session->client_cid->length) == 0) ||
1349 (!session->is_dtls13 && payload[OFF_CONTENT_TYPE] == DTLS_CT_CID &&
1350 length > (OFF_CID + session->client_cid->length) &&
1351 memcmp(session->client_cid->s, &payload[OFF_CID],
1352 session->client_cid->length) == 0)) {
1353 /* Updating IP address */
1354 coap_log_info("***%s: CID: Old Client Session\n", coap_session_str(session));
1355 SESSIONS_DELETE(endpoint->sessions, session);
1356 session->addr_info = packet->addr_info;
1357 memcpy(&session->addr_hash, &addr_hash, sizeof(session->addr_hash));
1358 SESSIONS_ADD(endpoint->sessions, session);
1359 coap_log_info("***%s: CID: New Client Session\n", coap_session_str(session));
1360 return session;
1361 }
1362 }
1363 }
1364 if (!changed) {
1365 coap_log_debug("coap_dtls_hello: ContentType Connection-IS dropped\n");
1366 return NULL;
1367 }
1368 } else if (payload[OFF_CONTENT_TYPE] != DTLS_CT_HANDSHAKE ||
1369 payload[OFF_HANDSHAKE_TYPE] != DTLS_HT_CLIENT_HELLO) {
1370 /* only log if not a late alert */
1371 if (payload[OFF_CONTENT_TYPE] != DTLS_CT_ALERT)
1372 coap_log_debug("coap_dtls_hello: ContentType %d Handshake %d dropped\n",
1373 payload[OFF_CONTENT_TYPE],
1374 payload[OFF_HANDSHAKE_TYPE]);
1375 return NULL;
1376 }
1377 }
1378
1380 &addr_hash, &packet->addr_info.local,
1381 &packet->addr_info.remote,
1382 packet->ifindex, endpoint->context, endpoint);
1383 if (session) {
1384 session->last_rx_tx = now;
1385 memcpy(session->sock.lfunc, endpoint->sock.lfunc,
1386 sizeof(session->sock.lfunc));
1387 if (endpoint->proto == COAP_PROTO_UDP)
1389 else if (endpoint->proto == COAP_PROTO_DTLS) {
1390 session->type = COAP_SESSION_TYPE_HELLO;
1391 }
1392 SESSIONS_ADD(endpoint->sessions, session);
1393 coap_log_debug("***%s: session %p: new incoming session\n",
1394 coap_session_str(session), (void *)session);
1396 }
1397 return session;
1398}
1399
1402 coap_tick_t now) {
1403 if (session) {
1404 session->last_rx_tx = now;
1405 session->type = COAP_SESSION_TYPE_SERVER;
1406 coap_dtls_establish(session);
1407 }
1408 return session;
1409}
1410#endif /* COAP_SERVER_SUPPORT */
1411
1412#if COAP_CLIENT_SUPPORT
1413static coap_session_t *
1414coap_session_create_client(coap_context_t *ctx,
1415 const coap_address_t *local_if,
1416 const coap_address_t *server,
1417 coap_proto_t proto) {
1418 coap_session_t *session = NULL;
1419 int default_port = COAP_DEFAULT_PORT;
1420
1421 assert(server);
1422
1423 switch (proto) {
1424 case COAP_PROTO_UDP:
1425 default_port = COAP_DEFAULT_PORT;
1426 break;
1427 case COAP_PROTO_DTLS:
1428 if (!coap_dtls_is_supported()) {
1429 coap_log_crit("coap_new_client_session*: DTLS not supported\n");
1430 return NULL;
1431 }
1432 default_port = COAPS_DEFAULT_PORT;
1433 break;
1434 case COAP_PROTO_TCP:
1435 if (!coap_tcp_is_supported()) {
1436 coap_log_crit("coap_new_client_session*: TCP not supported\n");
1437 return NULL;
1438 }
1439 default_port = COAP_DEFAULT_PORT;
1440 break;
1441 case COAP_PROTO_TLS:
1442 if (!coap_tls_is_supported()) {
1443 coap_log_crit("coap_new_client_session*: TLS not supported\n");
1444 return NULL;
1445 }
1446 default_port = COAPS_DEFAULT_PORT;
1447 break;
1448 case COAP_PROTO_WS:
1449 if (!coap_ws_is_supported()) {
1450 coap_log_crit("coap_new_client_session*: WS not supported\n");
1451 return NULL;
1452 }
1453 default_port = 80;
1454 break;
1455 case COAP_PROTO_WSS:
1456 if (!coap_wss_is_supported()) {
1457 coap_log_crit("coap_new_client_session*: WSS not supported\n");
1458 return NULL;
1459 }
1460 default_port = 443;
1461 break;
1462 case COAP_PROTO_NONE:
1463 case COAP_PROTO_LAST:
1464 default:
1465 assert(0);
1466 return NULL;
1467 }
1468 session = coap_make_session(proto, COAP_SESSION_TYPE_CLIENT, NULL,
1469 local_if, server, 0, ctx, NULL);
1470 if (!session)
1471 goto error;
1472
1474 session->sock.session = session;
1475 memcpy(&session->sock.lfunc, coap_layers_coap[proto],
1476 sizeof(session->sock.lfunc));
1477
1478 if (COAP_PROTO_NOT_RELIABLE(proto)) {
1479 coap_session_t *s, *rtmp;
1480 if (!coap_netif_dgrm_connect(session, local_if, server, default_port)) {
1481 goto error;
1482 }
1483 /* Check that this is not a duplicate 4-tuple */
1484 SESSIONS_ITER_SAFE(ctx->sessions, s, rtmp) {
1487 &s->addr_info.local) &&
1489 &s->addr_info.remote)) {
1490 coap_log_warn("***%s: session %p: duplicate - already exists\n",
1491 coap_session_str(session), (void *)session);
1492 goto error;
1493 }
1494 }
1495#ifdef WITH_CONTIKI
1496 session->sock.context = ctx;
1497#endif /* WITH_CONTIKI */
1498#if !COAP_DISABLE_TCP
1499 } else if (COAP_PROTO_RELIABLE(proto)) {
1500 if (!coap_netif_strm_connect1(session, local_if, server, default_port)) {
1501 goto error;
1502 }
1503#endif /* !COAP_DISABLE_TCP */
1504 }
1505
1506 session->sock.session = session;
1507#ifdef COAP_EPOLL_SUPPORT
1508 coap_epoll_ctl_add(&session->sock,
1509 EPOLLIN |
1510 ((session->sock.flags & COAP_SOCKET_WANT_CONNECT) ?
1511 EPOLLOUT : 0),
1512 __func__);
1513#endif /* COAP_EPOLL_SUPPORT */
1514
1516 if (local_if)
1517 session->sock.flags |= COAP_SOCKET_BOUND;
1518#if COAP_SERVER_SUPPORT
1519 if (ctx->proxy_uri_resource)
1520 session->proxy_session = 1;
1521#endif /* COAP_SERVER_SUPPORT */
1522 SESSIONS_ADD(ctx->sessions, session);
1523 return session;
1524
1525error:
1526 /*
1527 * Need to add in the session as coap_session_release_lkd()
1528 * will call SESSIONS_DELETE in coap_session_free().
1529 */
1530 if (session)
1531 SESSIONS_ADD(ctx->sessions, session);
1532 coap_session_release_lkd(session);
1533 return NULL;
1534}
1535
1536static void
1537coap_session_check_connect(coap_session_t *session) {
1538 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
1539 session->sock.lfunc[COAP_LAYER_SESSION].l_establish(session);
1540 }
1541#if !COAP_DISABLE_TCP
1542 if (COAP_PROTO_RELIABLE(session->proto)) {
1543 if (session->sock.flags & COAP_SOCKET_WANT_CONNECT) {
1545 if (session->type == COAP_SESSION_TYPE_CLIENT) {
1546 session->doing_first = 1;
1547 }
1548 } else {
1549 /* Initial connect worked immediately */
1550 session->sock.lfunc[COAP_LAYER_SESSION].l_establish(session);
1551 }
1552 }
1553#endif /* !COAP_DISABLE_TCP */
1554 coap_ticks(&session->last_rx_tx);
1555}
1556#endif /* COAP_CLIENT_SUPPORT */
1557
1558void
1560 if (COAP_PROTO_NOT_RELIABLE(session->proto))
1561 coap_session_connected(session);
1562#if !COAP_DISABLE_TCP
1563 if (COAP_PROTO_RELIABLE(session->proto))
1564 coap_session_send_csm(session);
1565#endif /* !COAP_DISABLE_TCP */
1566}
1567
1568#if COAP_CLIENT_SUPPORT
1569int
1571 int default_port = COAP_DEFAULT_PORT;
1572
1573 if (session->sock.lfunc[COAP_LAYER_SESSION].l_close && !session->session_failed)
1574 session->sock.lfunc[COAP_LAYER_SESSION].l_close(session);
1575
1576 switch (session->proto) {
1577 case COAP_PROTO_UDP:
1578 default_port = COAP_DEFAULT_PORT;
1579 break;
1580 case COAP_PROTO_DTLS:
1581 default_port = COAPS_DEFAULT_PORT;
1582 break;
1583 case COAP_PROTO_TCP:
1584 default_port = COAP_DEFAULT_PORT;
1585 break;
1586 case COAP_PROTO_TLS:
1587 default_port = COAPS_DEFAULT_PORT;
1588 break;
1589 case COAP_PROTO_WS:
1590 default_port = 80;
1591 break;
1592 case COAP_PROTO_WSS:
1593 default_port = 443;
1594 break;
1595 case COAP_PROTO_NONE:
1596 case COAP_PROTO_LAST:
1597 default:
1598 assert(0);
1599 return 0;
1600 }
1601 session->sock.session = session;
1602 coap_log_debug("***%s: trying to reconnect\n", coap_session_str(session));
1603 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
1604 session->state = COAP_SESSION_STATE_NONE;
1605 if (!coap_netif_dgrm_connect(session, &session->local_reconnect, &session->addr_info.remote,
1606 default_port)) {
1607 goto error;
1608 }
1610#ifdef WITH_CONTIKI
1611 session->sock.context = session->context;
1612#endif /* WITH_CONTIKI */
1613#if !COAP_DISABLE_TCP
1614 } else if (COAP_PROTO_RELIABLE(session->proto)) {
1615 if (!coap_netif_strm_connect1(session, &session->local_reconnect, &session->addr_info.remote,
1616 default_port)) {
1617 goto error;
1618 }
1619#endif /* !COAP_DISABLE_TCP */
1620 } else {
1621 goto error;
1622 }
1623#ifdef COAP_EPOLL_SUPPORT
1624 coap_epoll_ctl_add(&session->sock,
1625 EPOLLIN |
1626 ((session->sock.flags & COAP_SOCKET_WANT_CONNECT) ?
1627 EPOLLOUT : 0),
1628 __func__);
1629#endif /* COAP_EPOLL_SUPPORT */
1630
1632 session->sock.flags |= COAP_SOCKET_BOUND;
1633 coap_session_check_connect(session);
1634 return 1;
1635error:
1636 return 0;
1637}
1638
1639void
1641 coap_lg_crcv_t *lg_crcv, *etmp;
1642
1643 if (!session->session_failed)
1644 return;
1645 coap_log_debug("***%s: session re-established\n",
1646 coap_session_str(session));
1647 session->session_failed = 0;
1648 LL_FOREACH_SAFE(session->lg_crcv, lg_crcv, etmp) {
1650 coap_send_internal(session, lg_crcv->sent_pdu, NULL);
1651 }
1652}
1653
1656 const coap_address_t *local_if,
1657 const coap_address_t *server,
1658 coap_proto_t proto) {
1659 coap_session_t *session;
1660
1661 coap_lock_lock(return NULL);
1662 session = coap_new_client_session_lkd(ctx, local_if, server, proto);
1664 return session;
1665}
1666
1669 const coap_address_t *local_if,
1670 const coap_address_t *server,
1671 coap_proto_t proto) {
1672 coap_session_t *session;
1673
1675 session = coap_session_create_client(ctx, local_if, server,
1676 proto);
1677 if (session) {
1678 coap_log_debug("***%s: session %p: created outgoing session\n",
1679 coap_session_str(session), (void *)session);
1680 coap_session_check_connect(session);
1681 }
1682 return session;
1683}
1684
1687 const coap_address_t *local_if,
1688 const coap_address_t *server,
1689 coap_proto_t proto, const char *identity,
1690 const uint8_t *key, unsigned key_len) {
1691 coap_session_t *session;
1692
1693 coap_lock_lock(return NULL);
1694 session = coap_new_client_session_psk_lkd(ctx, local_if, server, proto, identity, key, key_len);
1696 return session;
1697}
1698
1701 const coap_address_t *local_if,
1702 const coap_address_t *server,
1703 coap_proto_t proto, const char *identity,
1704 const uint8_t *key, unsigned key_len) {
1705 coap_dtls_cpsk_t setup_data;
1706
1708 memset(&setup_data, 0, sizeof(setup_data));
1710
1711 if (identity) {
1712 setup_data.psk_info.identity.s = (const uint8_t *)identity;
1713 setup_data.psk_info.identity.length = strlen(identity);
1714 }
1715
1716 if (key && key_len > 0) {
1717 setup_data.psk_info.key.s = key;
1718 setup_data.psk_info.key.length = key_len;
1719 }
1720
1721 return coap_new_client_session_psk2_lkd(ctx, local_if, server,
1722 proto, &setup_data);
1723}
1724
1725/*
1726 * Check the validity of the SNI to send to the server.
1727 *
1728 * https://datatracker.ietf.org/doc/html/rfc6066#section-3
1729 * Literal IPv4 and IPv6 addresses are not permitted in "HostName".
1730 */
1731static void
1732coap_sanitize_client_sni(char **client_sni) {
1733 char *cp;
1734
1735 if (*client_sni == NULL)
1736 return;
1737
1738 cp = *client_sni;
1739 switch (*cp) {
1740 case '0':
1741 case '1':
1742 case '2':
1743 case '3':
1744 case '4':
1745 case '5':
1746 case '6':
1747 case '7':
1748 case '8':
1749 case '9':
1750 case 'a':
1751 case 'b':
1752 case 'c':
1753 case 'd':
1754 case 'e':
1755 case 'f':
1756 case 'A':
1757 case 'B':
1758 case 'C':
1759 case 'D':
1760 case 'E':
1761 case 'F':
1762 case ':':
1763 break;
1764 case '\000':
1765 /* Empty entry invalid */
1766 *client_sni = NULL;
1767 return;
1768 default:
1769 /* Does not start with a hex digit or : - not literal IP. */
1770 return;
1771 }
1772 /* Check for IPv4 */
1773 while (*cp) {
1774 switch (*cp) {
1775 case '0':
1776 case '1':
1777 case '2':
1778 case '3':
1779 case '4':
1780 case '5':
1781 case '6':
1782 case '7':
1783 case '8':
1784 case '9':
1785 case '.':
1786 break;
1787 default:
1788 /* Not of format nnn.nnn.nnn.nnn. Could be IPv6 */
1789 goto check_ipv6;
1790 }
1791 cp++;
1792 }
1793 /* IPv4 address - not allowed. */
1794 *client_sni = NULL;
1795 return;
1796
1797check_ipv6:
1798 /* Check for IPv6 */
1799 cp = *client_sni;
1800 while (*cp) {
1801 switch (*cp) {
1802 case '0':
1803 case '1':
1804 case '2':
1805 case '3':
1806 case '4':
1807 case '5':
1808 case '6':
1809 case '7':
1810 case '8':
1811 case '9':
1812 case 'a':
1813 case 'b':
1814 case 'c':
1815 case 'd':
1816 case 'e':
1817 case 'f':
1818 case 'A':
1819 case 'B':
1820 case 'C':
1821 case 'D':
1822 case 'E':
1823 case 'F':
1824 case ':':
1825 break;
1826 case '%':
1827 /* Start of i/f specification, Previous is IPv6 */
1828 *client_sni = NULL;
1829 return;
1830 default:
1831 /* Not of format xx:xx::xx. */
1832 return;
1833 }
1834 cp++;
1835 }
1836 *client_sni = NULL;
1837 return;
1838}
1839
1842 const coap_address_t *local_if,
1843 const coap_address_t *server,
1844 coap_proto_t proto,
1845 coap_dtls_cpsk_t *setup_data) {
1846 coap_session_t *session;
1847
1848 coap_lock_lock(return NULL);
1849 session = coap_new_client_session_psk2_lkd(ctx, local_if, server, proto, setup_data);
1851 return session;
1852}
1853
1856 const coap_address_t *local_if,
1857 const coap_address_t *server,
1858 coap_proto_t proto,
1859 coap_dtls_cpsk_t *setup_data) {
1860 coap_session_t *session;
1861
1863 session = coap_session_create_client(ctx, local_if, server, proto);
1864
1865 if (!session || !setup_data)
1866 return NULL;
1867
1868 session->cpsk_setup_data = *setup_data;
1869 if (setup_data->psk_info.identity.s) {
1870 session->psk_identity =
1872 setup_data->psk_info.identity.length);
1873 if (!session->psk_identity) {
1874 coap_log_warn("Cannot store session Identity (PSK)\n");
1875 coap_session_release_lkd(session);
1876 return NULL;
1877 }
1879 coap_log_warn("Identity (PSK) not defined\n");
1880 coap_session_release_lkd(session);
1881 return NULL;
1882 }
1883
1884 if (setup_data->psk_info.key.s && setup_data->psk_info.key.length > 0) {
1885 session->psk_key = coap_new_bin_const(setup_data->psk_info.key.s,
1886 setup_data->psk_info.key.length);
1887 if (!session->psk_key) {
1888 coap_log_warn("Cannot store session pre-shared key (PSK)\n");
1889 coap_session_release_lkd(session);
1890 return NULL;
1891 }
1893 coap_log_warn("Pre-shared key (PSK) not defined\n");
1894 coap_session_release_lkd(session);
1895 return NULL;
1896 }
1897
1898 coap_sanitize_client_sni(&session->cpsk_setup_data.client_sni);
1899
1901 if (!coap_dtls_context_set_cpsk(ctx, &session->cpsk_setup_data)) {
1902 coap_session_release_lkd(session);
1903 return NULL;
1904 }
1905 }
1906 coap_log_debug("***%s: new outgoing session\n",
1907 coap_session_str(session));
1908 coap_session_check_connect(session);
1909 return session;
1910}
1911#endif /* COAP_CLIENT_SUPPORT */
1912
1913int
1915 const coap_bin_const_t *psk_hint
1916 ) {
1917 /* We may be refreshing the hint with the same hint */
1918 coap_bin_const_t *old_psk_hint = session->psk_hint;
1919
1920 if (psk_hint && psk_hint->s) {
1921 if (session->psk_hint) {
1922 if (coap_binary_equal(session->psk_hint, psk_hint))
1923 return 1;
1924 }
1925 session->psk_hint = coap_new_bin_const(psk_hint->s,
1926 psk_hint->length);
1927 if (!session->psk_hint) {
1928 coap_log_err("No memory to store identity hint (PSK)\n");
1929 if (old_psk_hint)
1930 coap_delete_bin_const(old_psk_hint);
1931 return 0;
1932 }
1933 } else {
1934 session->psk_hint = NULL;
1935 }
1936 if (old_psk_hint)
1937 coap_delete_bin_const(old_psk_hint);
1938
1939 return 1;
1940}
1941
1942int
1944 const coap_bin_const_t *psk_key
1945 ) {
1946 /* We may be refreshing the key with the same key */
1947 coap_bin_const_t *old_psk_key = session->psk_key;
1948
1949 if (psk_key && psk_key->s) {
1950 if (session->psk_key) {
1951 if (coap_binary_equal(session->psk_key, psk_key))
1952 return 1;
1953 }
1954 session->psk_key = coap_new_bin_const(psk_key->s, psk_key->length);
1955 if (!session->psk_key) {
1956 coap_log_err("No memory to store pre-shared key (PSK)\n");
1957 if (old_psk_key)
1958 coap_delete_bin_const(old_psk_key);
1959 return 0;
1960 }
1961 } else {
1962 session->psk_key = NULL;
1963 }
1964 if (old_psk_key)
1965 coap_delete_bin_const(old_psk_key);
1966
1967 return 1;
1968}
1969
1970int
1972 const coap_bin_const_t *psk_identity
1973 ) {
1974 /* We may be refreshing the identity with the same identity */
1975 coap_bin_const_t *old_psk_identity = session->psk_identity;
1976
1977 if (psk_identity && psk_identity->s) {
1978 if (session->psk_identity) {
1979 if (coap_binary_equal(session->psk_identity, psk_identity))
1980 return 1;
1981 }
1982 session->psk_identity = coap_new_bin_const(psk_identity->s,
1983 psk_identity->length);
1984 if (!session->psk_identity) {
1985 coap_log_err("No memory to store pre-shared key identity (PSK)\n");
1986 if (old_psk_identity)
1987 coap_delete_bin_const(old_psk_identity);
1988 return 0;
1989 }
1990 } else {
1991 session->psk_identity = NULL;
1992 }
1993 if (old_psk_identity)
1994 coap_delete_bin_const(old_psk_identity);
1995
1996 return 1;
1997}
1998
1999#if COAP_SERVER_SUPPORT
2000const coap_bin_const_t *
2002 if (session)
2003 return session->psk_hint;
2004 return NULL;
2005}
2006#endif /* COAP_SERVER_SUPPORT */
2007
2008const coap_bin_const_t *
2010 const coap_bin_const_t *psk_identity = NULL;
2011 if (session) {
2012 psk_identity = session->psk_identity;
2013 if (psk_identity == NULL) {
2014 psk_identity = &session->cpsk_setup_data.psk_info.identity;
2015 }
2016 }
2017 return psk_identity;
2018}
2019
2020const coap_bin_const_t *
2022 if (session)
2023 return session->psk_key;
2024 return NULL;
2025}
2026
2027#if COAP_CLIENT_SUPPORT
2030 const coap_address_t *local_if,
2031 const coap_address_t *server,
2032 coap_proto_t proto,
2033 coap_dtls_pki_t *setup_data) {
2034 coap_session_t *session;
2035
2036 coap_lock_lock(return NULL);
2037 session = coap_new_client_session_pki_lkd(ctx, local_if, server, proto, setup_data);
2039 return session;
2040}
2041
2044 const coap_address_t *local_if,
2045 const coap_address_t *server,
2046 coap_proto_t proto,
2047 coap_dtls_pki_t *setup_data) {
2048 coap_session_t *session;
2049 coap_dtls_pki_t l_setup_data;
2050
2051 if (!setup_data)
2052 return NULL;
2053 if (setup_data->version != COAP_DTLS_PKI_SETUP_VERSION) {
2054 coap_log_err("coap_new_client_session_pki: Wrong version of setup_data\n");
2055 return NULL;
2056 }
2057
2059 l_setup_data = *setup_data;
2060 coap_sanitize_client_sni(&l_setup_data.client_sni);
2061
2062 session = coap_session_create_client(ctx, local_if, server, proto);
2063
2064 if (!session) {
2065 return NULL;
2066 }
2067
2069 /* we know that setup_data is not NULL */
2070 if (!coap_dtls_context_set_pki(ctx, &l_setup_data, COAP_DTLS_ROLE_CLIENT)) {
2071 coap_session_release_lkd(session);
2072 return NULL;
2073 }
2074 }
2075 coap_log_debug("***%s: new outgoing session\n",
2076 coap_session_str(session));
2077 coap_session_check_connect(session);
2078 return session;
2079}
2080#endif /* ! COAP_CLIENT_SUPPORT */
2081
2082#if COAP_SERVER_SUPPORT
2083#if !COAP_DISABLE_TCP
2086 coap_session_t *session;
2087 coap_tick_t now;
2088
2090 NULL, NULL, NULL, 0, ctx, ep);
2091 if (!session)
2092 goto error;
2093
2094 memcpy(session->sock.lfunc, ep->sock.lfunc, sizeof(session->sock.lfunc));
2095 if (!coap_netif_strm_accept(ep, session, extra))
2096 goto error;
2097
2098 coap_make_addr_hash(&session->addr_hash, session->proto, &session->addr_info);
2099
2100#ifdef COAP_EPOLL_SUPPORT
2101 session->sock.session = session;
2102 coap_epoll_ctl_add(&session->sock,
2103 EPOLLIN,
2104 __func__);
2105#endif /* COAP_EPOLL_SUPPORT */
2106 SESSIONS_ADD(ep->sessions, session);
2107 if (session) {
2108 coap_ticks(&now);
2109 session->last_rx_tx = now;
2110 coap_log_debug("***%s: session %p: new incoming session\n",
2111 coap_session_str(session), (void *)session);
2115 session->sock.lfunc[COAP_LAYER_SESSION].l_establish(session);
2116 }
2117 return session;
2118
2119error:
2120 /*
2121 * Need to add in the session as coap_session_release_lkd()
2122 * will call SESSIONS_DELETE in coap_session_free().
2123 */
2124 if (session) {
2125 SESSIONS_ADD(ep->sessions, session);
2126 coap_session_free(session);
2127 }
2128 return NULL;
2129}
2130#endif /* !COAP_DISABLE_TCP */
2131#endif /* COAP_SERVER_SUPPORT */
2132
2133void
2135 const uint8_t *data) {
2136 session->tx_token = coap_decode_var_bytes8(data, len);
2137 /*
2138 * Decrement as when first used by coap_session_new_token() it will
2139 * get incremented
2140 */
2141 session->tx_token--;
2142}
2143
2144void
2146 uint8_t *data) {
2147 *len = coap_encode_var_safe8(data,
2148 sizeof(session->tx_token), ++session->tx_token);
2149}
2150
2151COAP_API uint16_t
2153 uint16_t mid;
2154
2155 coap_lock_lock(return 0);
2156 mid = coap_new_message_id_lkd(session);
2158 return mid;
2159}
2160
2161uint16_t
2164 if (COAP_PROTO_NOT_RELIABLE(session->proto))
2165 return ++session->tx_mid;
2166 /* TCP/TLS have no notion of mid */
2167 return 0;
2168}
2169
2170const coap_address_t *
2172 if (session)
2173 return &session->addr_info.remote;
2174 return NULL;
2175}
2176
2177const coap_address_t *
2179 if (session)
2180 return &session->addr_info.local;
2181 return NULL;
2182}
2183
2184const coap_address_t *
2186#if COAP_CLIENT_SUPPORT
2187 if (session && session->type == COAP_SESSION_TYPE_CLIENT &&
2188 session->sock.flags & COAP_SOCKET_MULTICAST)
2189 return &session->sock.mcast_addr;
2190#else /* ! COAP_CLIENT_SUPPORT */
2191 (void)session;
2192#endif /* ! COAP_CLIENT_SUPPORT */
2193 return NULL;
2194}
2195
2198 if (session)
2199 return session->context;
2200 return NULL;
2201}
2202
2205 if (session)
2206 return session->proto;
2207 return 0;
2208}
2209
2212 if (session)
2213 return session->type;
2214 return 0;
2215}
2216
2217COAP_API int
2219 int ret;
2220
2221 coap_lock_lock(return 0);
2222 ret = coap_session_set_type_client_lkd(session, 1);
2224 return ret;
2225}
2226
2227int
2229#if COAP_CLIENT_SUPPORT && COAP_SERVER_SUPPORT
2230 if (session && session->type == COAP_SESSION_TYPE_SERVER) {
2232 session->type = COAP_SESSION_TYPE_CLIENT;
2233 if (session->endpoint) {
2234 SESSIONS_DELETE(session->endpoint->sessions, session);
2235 SESSIONS_ADD(session->context->sessions, session);
2236 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
2237 session->sock = session->endpoint->sock;
2238 session->sock.flags |= COAP_SOCKET_SLAVE;
2239 session->sock.flags &= ~COAP_SOCKET_CAN_READ;
2240 session->sock.flags &= ~COAP_SOCKET_WANT_READ;
2241 }
2242 session->endpoint = NULL;
2243 }
2244 if (report_changed) {
2245 coap_log_debug("***%s: session now is type Client\n",
2246 coap_session_str(session));
2247 }
2248 return 1;
2249 }
2250#else /* ! COAP_CLIENT_SUPPORT || ! COAP_SERVER_SUPPORT */
2251 (void)session;
2252 (void)report_changed;
2253#endif /* ! COAP_CLIENT_SUPPORT || ! COAP_SERVER_SUPPORT */
2254 return 0;
2255}
2256
2257COAP_API int
2259 int ret;
2260
2261 coap_lock_lock(return 0);
2262 ret = coap_session_set_type_server_lkd(session);
2264 return ret;
2265}
2266
2267int
2269#if COAP_CLIENT_SUPPORT && COAP_SERVER_SUPPORT
2270 if (session && session->type == COAP_SESSION_TYPE_CLIENT) {
2271 coap_endpoint_t *ep;
2272 coap_mid_t mid;
2273 coap_pdu_t *ping = NULL;
2274
2275 LL_FOREACH(session->context->endpoint, ep) {
2276 if (session->proto == ep->proto)
2277 break;
2278 }
2279 if (!ep) {
2280 /* Need a dummy endpoint to 'hang' off as this is now a server */
2281 ep = coap_malloc_endpoint();
2282 if (!ep) {
2283 coap_log_warn("coap_new_endpoint: malloc");
2284 return 0;
2285 }
2286
2287 memset(ep, 0, sizeof(coap_endpoint_t));
2288 ep->context = session->context;
2289 ep->proto = session->proto;
2290 ep->sock.endpoint = ep;
2291 memcpy(&ep->sock.lfunc, coap_layers_coap[session->proto], sizeof(ep->sock.lfunc));
2292
2294 LL_PREPEND(session->context->endpoint, ep);
2295 }
2296 /* Need to use coap_send_lkd() here to get traffic flowing */
2297 if (COAP_PROTO_NOT_RELIABLE(session->proto)) {
2299 }
2300#if !COAP_DISABLE_TCP
2301 else {
2303 }
2304#endif /* !COAP_DISABLE_TCP */
2305 if (!ping) {
2306 session->type = COAP_SESSION_TYPE_SERVER;
2307 return 0;
2308 }
2309 mid = coap_send_lkd(session, ping);
2310 if (mid != COAP_INVALID_MID) {
2311 coap_tick_t now;
2312
2313 coap_ticks(&now);
2314 session->last_ping_mid = mid;
2315 session->last_rx_tx = now;
2316 session->last_ping = now;
2317 }
2318 if (session->context) {
2319 if (session->context->sessions) {
2320 SESSIONS_DELETE(session->context->sessions, session);
2321 }
2322 }
2323 SESSIONS_ADD(ep->sessions, session);
2324 session->endpoint = ep;
2325 session->type = COAP_SESSION_TYPE_SERVER;
2326 coap_session_release_lkd(session);
2327 coap_log_debug("***%s: session now is type Server\n",
2328 coap_session_str(session));
2329 return 1;
2330 }
2331#else /* ! COAP_CLIENT_SUPPORT || ! COAP_SERVER_SUPPORT */
2332 (void)session;
2333#endif /* ! COAP_CLIENT_SUPPORT || ! COAP_SERVER_SUPPORT */
2334 return 0;
2335}
2336
2339 if (session)
2340 return session->state;
2341 return 0;
2342}
2343
2346#if COAP_SERVER_SUPPORT
2347 if (session)
2348 return session->endpoint;
2349#else /* ! COAP_SERVER_SUPPORT */
2350 (void)session;
2351#endif /* ! COAP_SERVER_SUPPORT */
2352 return 0;
2353}
2354
2355int
2357 if (session)
2358 return session->ifindex;
2359 return -1;
2360}
2361
2362void *
2364 coap_tls_library_t *tls_lib) {
2365 if (session)
2366 return coap_dtls_get_tls(session, tls_lib);
2367 return NULL;
2368}
2369
2370static const char *
2372 switch (proto) {
2373 case COAP_PROTO_UDP:
2374 return "UDP ";
2375 case COAP_PROTO_DTLS:
2376 return "DTLS";
2377 case COAP_PROTO_TCP:
2378 return "TCP ";
2379 case COAP_PROTO_TLS:
2380 return "TLS ";
2381 case COAP_PROTO_WS:
2382 return "WS ";
2383 case COAP_PROTO_WSS:
2384 return "WSS ";
2385 case COAP_PROTO_NONE:
2386 case COAP_PROTO_LAST:
2387 default:
2388 return "????" ;
2389 break;
2390 }
2391 return NULL;
2392}
2393
2394#if COAP_SERVER_SUPPORT
2396coap_new_endpoint(coap_context_t *context, const coap_address_t *listen_addr, coap_proto_t proto) {
2397 coap_endpoint_t *endpoint;
2398
2399 coap_lock_lock(return NULL);
2400 endpoint = coap_new_endpoint_lkd(context, listen_addr, proto);
2402 return endpoint;
2403}
2404
2406coap_new_endpoint_lkd(coap_context_t *context, const coap_address_t *listen_addr,
2407 coap_proto_t proto) {
2408 coap_endpoint_t *ep = NULL;
2409
2410 if (!context || !listen_addr) {
2411 coap_log_debug("coap_new_endpoint: Both context and listen_addr need to be defined\n");
2412 return NULL;
2413 }
2414
2416
2417 switch (proto) {
2418 case COAP_PROTO_UDP:
2419 break;
2420 case COAP_PROTO_DTLS:
2421 if (!coap_dtls_is_supported()) {
2422 coap_log_warn("coap_new_endpoint: DTLS not supported\n");
2423 return NULL;
2424 }
2425 break;
2426 case COAP_PROTO_TLS:
2427 if (!coap_tls_is_supported()) {
2428 coap_log_warn("coap_new_endpoint: TLS not supported\n");
2429 return NULL;
2430 }
2431 break;
2432 case COAP_PROTO_TCP:
2433 if (!coap_tcp_is_supported()) {
2434 coap_log_warn("coap_new_endpoint: TCP not supported\n");
2435 return NULL;
2436 }
2437 break;
2438 case COAP_PROTO_WS:
2439 if (!coap_ws_is_supported()) {
2440 coap_log_warn("coap_new_endpoint: WS not supported\n");
2441 return NULL;
2442 }
2443 break;
2444 case COAP_PROTO_WSS:
2445 if (!coap_wss_is_supported()) {
2446 coap_log_warn("coap_new_endpoint: WSS not supported\n");
2447 return NULL;
2448 }
2449 break;
2450 case COAP_PROTO_NONE:
2451 case COAP_PROTO_LAST:
2452 default:
2453 coap_log_crit("coap_new_endpoint: Unsupported protocol %d\n", proto);
2454 return NULL;
2455 }
2456
2457 if (proto == COAP_PROTO_DTLS || proto == COAP_PROTO_TLS ||
2458 proto == COAP_PROTO_WSS) {
2460 coap_log_info("coap_new_endpoint: one of coap_context_set_psk() or "
2461 "coap_context_set_pki() not called\n");
2462 return NULL;
2463 }
2464 }
2465 ep = coap_malloc_endpoint();
2466 if (!ep) {
2467 coap_log_warn("coap_new_endpoint: malloc");
2468 return NULL;
2469 }
2470
2471 memset(ep, 0, sizeof(coap_endpoint_t));
2472 ep->context = context;
2473 ep->proto = proto;
2474 ep->sock.endpoint = ep;
2475 memcpy(&ep->sock.lfunc, coap_layers_coap[proto], sizeof(ep->sock.lfunc));
2476
2477 if (COAP_PROTO_NOT_RELIABLE(proto)) {
2478 if (!coap_netif_dgrm_listen(ep, listen_addr))
2479 goto error;
2480#ifdef WITH_CONTIKI
2481 ep->sock.context = context;
2482#endif /* WITH_CONTIKI */
2483#if !COAP_DISABLE_TCP
2484 } else if (COAP_PROTO_RELIABLE(proto)) {
2485 if (!coap_netif_strm_listen(ep, listen_addr))
2486 goto error;
2487#endif /* !COAP_DISABLE_TCP */
2488 } else {
2489 coap_log_crit("coap_new_endpoint: Protocol type not supported %d\n", proto);
2490 goto error;
2491 }
2492
2494#ifndef INET6_ADDRSTRLEN
2495#define INET6_ADDRSTRLEN 40
2496#endif
2497 unsigned char addr_str[INET6_ADDRSTRLEN + 8];
2498
2499 if (coap_print_addr(&ep->bind_addr, addr_str, INET6_ADDRSTRLEN + 8)) {
2500 coap_log_debug("created %s endpoint %s\n", coap_proto_name(ep->proto),
2501 addr_str);
2502 }
2503 }
2504
2506
2507#ifdef COAP_EPOLL_SUPPORT
2508 ep->sock.endpoint = ep;
2510 EPOLLIN,
2511 __func__);
2512#endif /* COAP_EPOLL_SUPPORT */
2513
2514 LL_PREPEND(context->endpoint, ep);
2515 return ep;
2516
2517error:
2519 return NULL;
2520}
2521
2522void
2524 ep->default_mtu = (uint16_t)mtu;
2525}
2526
2527COAP_API void
2529 if (ep) {
2530 coap_context_t *context = ep->context;
2531 if (context) {
2532 coap_lock_lock(return);
2533 }
2535 if (context) {
2537 }
2538 }
2539}
2540
2541void
2543 if (ep) {
2544 coap_session_t *session, *rtmp;
2545
2546 if (ep->context) {
2547 /* If fully allocated and inserted */
2549 SESSIONS_ITER_SAFE(ep->sessions, session, rtmp) {
2550 assert(session->ref == 0);
2551 if (session->ref == 0) {
2553 coap_session_free(session);
2554 }
2555 }
2556 if (coap_netif_available_ep(ep)) {
2557 /*
2558 * ep->sock.endpoint is set in coap_new_endpoint().
2559 * ep->sock.session is never set.
2560 *
2561 * session->sock.session is set for both clients and servers (when a
2562 * new session is accepted), but does not affect the endpoint.
2563 *
2564 * So, it is safe to call coap_netif_close_ep() after all the sessions
2565 * have been freed above as we are only working with the endpoint sock.
2566 */
2567#ifdef COAP_EPOLL_SUPPORT
2568 assert(ep->sock.session == NULL);
2569#endif /* COAP_EPOLL_SUPPORT */
2571 }
2572
2573 if (ep->context->endpoint) {
2574 LL_DELETE(ep->context->endpoint, ep);
2575 }
2576 }
2577
2578 if (ep->app_cb) {
2579 ep->app_cb(ep->app_data);
2580 }
2581
2583 }
2584}
2585
2586void *
2588 assert(endpoint);
2589 return endpoint->app_data;
2590}
2591
2592COAP_API void *
2593coap_endpoint_set_app_data(coap_endpoint_t *endpoint, void *app_data,
2595 void *old_data;
2596
2597 coap_lock_lock(return NULL);
2598 old_data = coap_endpoint_set_app_data_lkd(endpoint, app_data, callback);
2600 return old_data;
2601}
2602
2603void *
2604coap_endpoint_set_app_data_lkd(coap_endpoint_t *endpoint, void *app_data,
2606 void *old_data = endpoint->app_data;
2607
2608 endpoint->app_data = app_data;
2609 endpoint->app_cb = app_data ? callback : NULL;
2610 return old_data;
2611}
2612
2613#endif /* COAP_SERVER_SUPPORT */
2614
2617 const coap_address_t *remote_addr,
2618 int ifindex) {
2619 coap_session_t *s, *rtmp;
2620#if COAP_CLIENT_SUPPORT
2621 SESSIONS_ITER(ctx->sessions, s, rtmp) {
2622 if (s->ifindex == ifindex) {
2623 if (s->sock.flags & COAP_SOCKET_MULTICAST) {
2624 if (coap_address_equals(&s->sock.mcast_addr, remote_addr))
2625 return s;
2626 } else if (coap_address_equals(&s->addr_info.remote, remote_addr))
2627 return s;
2628 }
2629 }
2630#endif /* COAP_CLIENT_SUPPORT */
2631#if COAP_SERVER_SUPPORT
2632 coap_endpoint_t *ep;
2633
2634 LL_FOREACH(ctx->endpoint, ep) {
2635 SESSIONS_ITER(ep->sessions, s, rtmp) {
2636 if (s->ifindex == ifindex && coap_address_equals(&s->addr_info.remote,
2637 remote_addr))
2638 return s;
2639 }
2640 }
2641#endif /* COAP_SERVER_SUPPORT */
2642 return NULL;
2643}
2644
2645#ifndef INET6_ADDRSTRLEN
2646#define INET6_ADDRSTRLEN 46
2647#endif
2648const char *
2650 static char szSession[2 * (INET6_ADDRSTRLEN + 8) + 24];
2651 char *p = szSession, *end = szSession + sizeof(szSession);
2652
2653 if (!session) {
2654 return "Session not defined";
2655 }
2656 if (coap_print_addr(&session->addr_info.local,
2657 (unsigned char *)p, end - p) > 0)
2658 p += strlen(p);
2659 if (p + 6 < end) {
2660 strcpy(p, " <-> ");
2661 p += 5;
2662 }
2663 if (p + 1 < end) {
2664 if (coap_print_addr(&session->addr_info.remote,
2665 (unsigned char *)p, end - p) > 0)
2666 p += strlen(p);
2667 }
2668 if (session->ifindex > 0 && p + 1 < end)
2669 p += snprintf(p, end - p, " (if%d)", session->ifindex);
2670 if (p + 6 < end) {
2671 strcpy(p, " ");
2672 p++;
2673 strcpy(p, coap_proto_name(session->proto));
2674 }
2675
2676 return szSession;
2677}
2678
2679#if COAP_SERVER_SUPPORT
2680const char *
2681coap_endpoint_str(const coap_endpoint_t *endpoint) {
2682 static char szEndpoint[128];
2683 char *p = szEndpoint, *end = szEndpoint + sizeof(szEndpoint);
2684 if (coap_print_addr(&endpoint->bind_addr, (unsigned char *)p, end - p) > 0)
2685 p += strlen(p);
2686 if (p + 6 < end) {
2687 if (endpoint->proto == COAP_PROTO_UDP) {
2688 strcpy(p, " UDP");
2689 } else if (endpoint->proto == COAP_PROTO_DTLS) {
2690 strcpy(p, " DTLS");
2691 } else {
2692 strcpy(p, " NONE");
2693 }
2694 }
2695
2696 return szEndpoint;
2697}
2698#endif /* COAP_SERVER_SUPPORT */
2699#if COAP_CLIENT_SUPPORT
2700void
2702 session->no_observe_cancel = 1;
2703}
2704#endif /* COAP_CLIENT_SUPPORT */
2705#endif /* COAP_SESSION_C_ */
void coap_address_init(coap_address_t *addr)
Resets the given coap_address_t object addr to its default values.
int coap_is_mcast(const coap_address_t *a)
Checks if given address a denotes a multicast address.
uint16_t coap_address_get_port(const coap_address_t *addr)
Returns the port from addr in host byte order.
void coap_address_copy(coap_address_t *dst, const coap_address_t *src)
int coap_address_equals(const coap_address_t *a, const coap_address_t *b)
Compares given address objects a and b.
#define PRIu32
coap_nack_reason_t
Definition coap_io.h:66
@ COAP_NACK_NOT_DELIVERABLE
Definition coap_io.h:68
@ COAP_NACK_WS_FAILED
Definition coap_io.h:75
@ COAP_NACK_TOO_MANY_RETRIES
Definition coap_io.h:67
@ COAP_NACK_TLS_FAILED
Definition coap_io.h:70
@ COAP_NACK_TLS_LAYER_FAILED
Definition coap_io.h:73
@ COAP_NACK_ICMP_ISSUE
Definition coap_io.h:71
@ COAP_NACK_WS_LAYER_FAILED
Definition coap_io.h:74
@ COAP_NACK_RST
Definition coap_io.h:69
@ COAP_NACK_BAD_RESPONSE
Definition coap_io.h:72
#define COAP_SOCKET_MULTICAST
socket is used for multicast communication
void coap_epoll_ctl_add(coap_socket_t *sock, uint32_t events, const char *func)
Epoll specific function to add the state of events that epoll is to track for the appropriate file de...
#define COAP_SOCKET_NOT_EMPTY
the socket is not empty
#define COAP_SOCKET_BOUND
the socket is bound
#define COAP_SOCKET_SLAVE
socket is a slave socket - do not close
#define COAP_SOCKET_WANT_READ
non blocking socket is waiting for reading
coap_endpoint_t * coap_malloc_endpoint(void)
#define COAP_SOCKET_WANT_CONNECT
non blocking client socket is waiting for connect
void coap_mfree_endpoint(coap_endpoint_t *ep)
coap_layer_func_t coap_layers_coap[COAP_PROTO_LAST][COAP_LAYER_LAST]
Definition coap_layers.c:39
@ COAP_LAYER_SESSION
Library specific build wrapper for coap_internal.h.
#define COAP_API
@ COAP_SESSION
Definition coap_mem.h:46
@ COAP_STRING
Definition coap_mem.h:34
void * coap_malloc_type(coap_memory_tag_t type, size_t size)
Allocates a chunk of size bytes and returns a pointer to the newly allocated memory.
void coap_free_type(coap_memory_tag_t type, void *p)
Releases the memory that was allocated by coap_malloc_type().
int coap_dtls_context_set_pki(coap_context_t *ctx COAP_UNUSED, const coap_dtls_pki_t *setup_data COAP_UNUSED, const coap_dtls_role_t role COAP_UNUSED)
Definition coap_notls.c:108
void * coap_dtls_get_tls(const coap_session_t *c_session COAP_UNUSED, coap_tls_library_t *tls_lib)
Definition coap_notls.c:158
unsigned int coap_dtls_get_overhead(coap_session_t *session COAP_UNUSED)
Definition coap_notls.c:261
int coap_dtls_context_check_keys_enabled(coap_context_t *ctx COAP_UNUSED)
Definition coap_notls.c:147
static const char * coap_proto_name(coap_proto_t proto)
COAP_API coap_mid_t coap_session_send_ping(coap_session_t *session)
Send a ping message for the session.
static const char * coap_nack_name(coap_nack_reason_t reason)
static coap_session_t * coap_make_session(coap_proto_t proto, coap_session_type_t type, const coap_addr_hash_t *addr_hash, const coap_address_t *local_addr, const coap_address_t *remote_addr, int ifindex, coap_context_t *context, coap_endpoint_t *endpoint)
static size_t coap_session_max_pdu_size_internal(const coap_session_t *session, size_t max_with_header)
#define INET6_ADDRSTRLEN
void coap_session_set_no_observe_cancel(coap_session_t *session)
Disable client automatically sending observe cancel on session close.
#define SESSIONS_ADD(e, obj)
#define SESSIONS_ITER_SAFE(e, el, rtmp)
#define COAP_PARTIAL_SESSION_TIMEOUT_TICKS
#define SESSIONS_DELETE(e, obj)
#define COAP_DEFAULT_MAX_HANDSHAKE_SESSIONS
#define SESSIONS_ITER(e, el, rtmp)
#define SESSIONS_FIND(e, k, res)
coap_mid_t coap_send_lkd(coap_session_t *session, coap_pdu_t *pdu)
Sends a CoAP message to given peer.
Definition coap_net.c:1467
void coap_block_delete_lg_srcv(coap_session_t *session, coap_lg_srcv_t *lg_srcv)
void coap_block_delete_lg_crcv(coap_session_t *session, coap_lg_crcv_t *lg_crcv)
void coap_check_update_token(coap_session_t *session, coap_pdu_t *pdu)
The function checks if the token needs to be updated before PDU is presented to the application (only...
void coap_block_delete_lg_xmit(coap_session_t *session, coap_lg_xmit_t *lg_xmit)
#define COAP_BLOCK_FORCE_Q_BLOCK
Definition coap_block.h:74
void coap_delete_cache_entry(coap_context_t *context, coap_cache_entry_t *cache_entry)
Remove a cache-entry from the hash list and free off all the appropriate contents apart from app_data...
#define COAP_DEFAULT_NON_MAX_RETRANSMIT
The number of times for requests for re-transmission of missing Q-Block1 when no response has been re...
uint16_t coap_session_get_non_max_retransmit(const coap_session_t *session)
Get the CoAP NON maximum retransmit count of missing Q-Block1 or Q-Block2 requested before there is a...
coap_fixed_point_t coap_session_get_default_leisure(const coap_session_t *session)
Get the CoAP default leisure time RFC7252 DEFAULT_LEISURE.
void coap_session_set_max_retransmit(coap_session_t *session, uint16_t value)
Set the CoAP maximum retransmit count before failure.
#define COAP_DEFAULT_NON_TIMEOUT
The delay (+ ACK_RANDOM_FACTOR) to introduce once NON MAX_PAYLOADS Q-Block1 or Q-Block2 have been sen...
coap_fixed_point_t coap_session_get_non_timeout(const coap_session_t *session)
Get the CoAP MAX_PAYLOADS limit delay timeout.
void coap_session_set_ack_random_factor(coap_session_t *session, coap_fixed_point_t value)
Set the CoAP ack randomize factor.
#define COAP_DEFAULT_MAX_LATENCY
The MAX_LATENCY definition.
coap_fixed_point_t coap_session_get_ack_random_factor(const coap_session_t *session)
Get the CoAP ack randomize factor.
#define COAP_DEFAULT_ACK_RANDOM_FACTOR
A factor that is used to randomize the wait time before a message is retransmitted to prevent synchro...
uint16_t coap_session_get_max_retransmit(const coap_session_t *session)
Get the CoAP maximum retransmit before failure.
void coap_session_set_max_payloads(coap_session_t *session, uint16_t value)
Set the CoAP maximum payloads count of Q-Block1 or Q-Block2 before delay is introduced RFC9177 MAX_PA...
#define COAP_DEFAULT_MAX_RETRANSMIT
Number of message retransmissions before message sending is stopped.
uint32_t coap_session_get_probing_rate(const coap_session_t *session)
Get the CoAP probing rate when there is no response RFC7252 PROBING_RATE.
#define COAP_DEFAULT_ACK_TIMEOUT
Number of seconds when to expect an ACK or a response to an outstanding CON message.
#define COAP_DEFAULT_DEFAULT_LEISURE
The number of seconds to use as bounds for multicast traffic RFC 7252, Section 4.8 Default value of D...
void coap_session_set_ack_timeout(coap_session_t *session, coap_fixed_point_t value)
Set the CoAP initial ack response timeout before the next re-transmit.
#define COAP_DEFAULT_NSTART
The number of simultaneous outstanding interactions that a client maintains to a given server.
void coap_session_set_non_receive_timeout(coap_session_t *session, coap_fixed_point_t value)
Set the CoAP non receive timeout delay timeout.
void coap_session_set_nstart(coap_session_t *session, uint16_t value)
Set the CoAP maximum concurrent transmission count of Confirmable messages RFC7252 NSTART.
#define COAP_DEFAULT_PROBING_RATE
The number of bytes/second allowed when there is no response RFC 7252, Section 4.8 Default value of P...
void coap_session_set_non_max_retransmit(coap_session_t *session, uint16_t value)
Set the CoAP NON maximum retransmit count of missing Q-Block1 or Q-Block2 requested before there is a...
uint16_t coap_session_get_max_payloads(const coap_session_t *session)
Get the CoAP maximum payloads count of Q-Block1 or Q-Block2 before delay is introduced RFC9177 MAX_PA...
#define COAP_DEFAULT_NON_RECEIVE_TIMEOUT
The time to wait for any missing Q-Block1 or Q-Block2 packets before requesting re-transmission of mi...
void coap_session_set_probing_rate(coap_session_t *session, uint32_t value)
Set the CoAP probing rate when there is no response RFC7252 PROBING_RATE.
void coap_session_set_default_leisure(coap_session_t *session, coap_fixed_point_t value)
Set the CoAP default leisure time (for multicast) RFC7252 DEFAULT_LEISURE.
coap_fixed_point_t coap_session_get_non_receive_timeout(const coap_session_t *session)
Get the CoAP non receive timeout delay timeout.
uint16_t coap_session_get_nstart(const coap_session_t *session)
Get the CoAP maximum concurrent transmission count of Confirmable messages RFC7252 NSTART.
#define COAP_DEFAULT_MAX_PAYLOADS
Number of Q-Block1 or Q-Block2 payloads that can be sent in a burst before a delay has to kick in.
coap_fixed_point_t coap_session_get_ack_timeout(const coap_session_t *session)
Get the CoAP initial ack response timeout before the next re-transmit.
void coap_session_set_non_timeout(coap_session_t *session, coap_fixed_point_t value)
Set the CoAP non timeout delay timeout.
uint64_t coap_tick_t
This data type represents internal timer ticks with COAP_TICKS_PER_SECOND resolution.
Definition coap_time.h:151
#define COAP_TICKS_PER_SECOND
Use ms resolution on POSIX systems.
Definition coap_time.h:166
int coap_prng_lkd(void *buf, size_t len)
Fills buf with len random bytes using the default pseudo random number generator.
Definition coap_prng.c:190
#define RESOURCES_ITER(r, tmp)
int coap_handle_event_lkd(coap_context_t *context, coap_event_t event, coap_session_t *session)
Invokes the event handler of context for the given event and data.
Definition coap_net.c:4904
uint16_t coap_new_message_id_lkd(coap_session_t *session)
Returns a new message id and updates session->tx_mid accordingly.
int coap_delete_node_lkd(coap_queue_t *node)
Destroys specified node.
Definition coap_net.c:214
int coap_remove_from_queue(coap_queue_t **queue, coap_session_t *session, coap_mid_t id, coap_queue_t **node)
This function removes the element with given id from the list given list.
Definition coap_net.c:2934
int coap_client_delay_first(coap_session_t *session)
Delay the sending of the first client request until some other negotiation has completed.
Definition coap_net.c:1335
unsigned int coap_calc_timeout(coap_session_t *session, unsigned char r)
Calculates the initial timeout based on the session CoAP transmission parameters 'ack_timeout',...
Definition coap_net.c:1219
coap_mid_t coap_send_internal(coap_session_t *session, coap_pdu_t *pdu, coap_pdu_t *request_pdu)
Sends a CoAP message to given peer.
Definition coap_net.c:1836
coap_mid_t coap_wait_ack(coap_context_t *context, coap_session_t *session, coap_queue_t *node)
Definition coap_net.c:1245
coap_queue_t * coap_new_node(void)
Creates a new node suitable for adding to the CoAP sendqueue.
Definition coap_net.c:243
void coap_cancel_session_messages(coap_context_t *context, coap_session_t *session, coap_nack_reason_t reason)
Cancels all outstanding messages for session session.
Definition coap_net.c:3038
void coap_cancel_all_messages(coap_context_t *context, coap_session_t *session, coap_bin_const_t *token)
Cancels all outstanding messages for session session that have the specified token.
Definition coap_net.c:3077
void coap_ticks(coap_tick_t *t)
Returns the current value of an internal tick counter.
Definition coap_time.c:90
COAP_API uint16_t coap_new_message_id(coap_session_t *session)
Returns a new message id and updates session->tx_mid accordingly.
@ COAP_RESPONSE_OK
Response is fine.
Definition coap_net.h:56
void coap_dtls_establish(coap_session_t *session)
Layer function interface for layer below DTLS connect being established.
Definition coap_dtls.c:266
coap_session_t * coap_session_new_dtls_session(coap_session_t *session, coap_tick_t now)
Create a new DTLS session for the session.
int coap_dtls_context_set_cpsk(coap_context_t *coap_context, coap_dtls_cpsk_t *setup_data)
Set the DTLS context's default client PSK information.
#define COAP_DTLS_PKI_SETUP_VERSION
Latest PKI setup version.
Definition coap_dtls.h:311
#define COAP_DTLS_CPSK_SETUP_VERSION
Latest CPSK setup version.
Definition coap_dtls.h:409
coap_tls_library_t
Definition coap_dtls.h:74
@ COAP_DTLS_ROLE_CLIENT
Internal function invoked for client.
Definition coap_dtls.h:49
unsigned int coap_encode_var_safe(uint8_t *buf, size_t length, unsigned int val)
Encodes multiple-length byte sequences.
Definition coap_encode.c:47
uint64_t coap_decode_var_bytes8(const uint8_t *buf, size_t len)
Decodes multiple-length byte sequences.
Definition coap_encode.c:67
unsigned int coap_encode_var_safe8(uint8_t *buf, size_t length, uint64_t val)
Encodes multiple-length byte sequences.
Definition coap_encode.c:77
@ COAP_EVENT_SESSION_CONNECTED
Triggered when TCP layer completes exchange of CSM information.
Definition coap_event.h:65
@ COAP_EVENT_TCP_FAILED
Triggered when TCP layer fails for some reason.
Definition coap_event.h:59
@ COAP_EVENT_SESSION_FAILED
Triggered when TCP layer fails following exchange of CSM information.
Definition coap_event.h:69
@ COAP_EVENT_SERVER_SESSION_NEW
Called in the CoAP IO loop if a new server-side session is created due to an incoming connection.
Definition coap_event.h:89
@ COAP_EVENT_SESSION_CLOSED
Triggered when TCP layer closes following exchange of CSM information.
Definition coap_event.h:67
@ COAP_EVENT_SERVER_SESSION_DEL
Called in the CoAP IO loop if a server session is deleted (e.g., due to inactivity or because the max...
Definition coap_event.h:98
@ COAP_EVENT_TCP_CLOSED
Triggered when TCP layer is closed.
Definition coap_event.h:57
@ COAP_EVENT_TCP_CONNECTED
Triggered when TCP layer connects.
Definition coap_event.h:55
@ COAP_EVENT_KEEPALIVE_FAILURE
Triggered when no response to a keep alive (ping) packet.
Definition coap_event.h:142
#define coap_lock_callback(func)
Dummy for no thread-safe code.
#define coap_lock_unlock()
Dummy for no thread-safe code.
#define coap_lock_check_locked()
Dummy for no thread-safe code.
#define coap_lock_lock(failed)
Dummy for no thread-safe code.
#define coap_log_debug(...)
Definition coap_debug.h:126
coap_log_t coap_get_log_level(void)
Get the current logging level.
Definition coap_debug.c:103
size_t coap_print_addr(const coap_address_t *addr, unsigned char *buf, size_t len)
Print the address into the defined buffer.
Definition coap_debug.c:241
const char * coap_endpoint_str(const coap_endpoint_t *endpoint)
Get endpoint description.
const char * coap_session_str(const coap_session_t *session)
Get session description.
#define coap_log_info(...)
Definition coap_debug.h:114
#define coap_log_warn(...)
Definition coap_debug.h:108
#define coap_log_err(...)
Definition coap_debug.h:102
#define coap_log_crit(...)
Definition coap_debug.h:96
@ COAP_LOG_DEBUG
Definition coap_debug.h:64
int coap_netif_dgrm_listen(coap_endpoint_t *endpoint, const coap_address_t *listen_addr)
Layer function interface for Netif datagram listem (udp).
void coap_netif_close_ep(coap_endpoint_t *endpoint)
Layer function interface for Netif close for a endpoint.
int coap_netif_strm_connect1(coap_session_t *session, const coap_address_t *local_if, const coap_address_t *server, int default_port)
Layer function interface for Netif stream connect (tcp).
int coap_netif_strm_accept(coap_endpoint_t *endpoint, coap_session_t *session, void *extra)
Layer function interface for Netif stream accept.
int coap_netif_strm_listen(coap_endpoint_t *endpoint, const coap_address_t *listen_addr)
Layer function interface for Netif stream listem (tcp).
int coap_netif_dgrm_connect(coap_session_t *session, const coap_address_t *local_if, const coap_address_t *server, int default_port)
Layer function interface for Netif datagram connect (udp).
int coap_netif_available(coap_session_t *session)
Function interface to check whether netif for session is still available.
Definition coap_netif.c:25
int coap_netif_available_ep(coap_endpoint_t *endpoint)
Function interface to check whether netif for endpoint is still available.
void coap_delete_oscore_associations(coap_session_t *session)
Cleanup all allocated OSCORE association information.
coap_pdu_t * coap_pdu_reference_lkd(coap_pdu_t *pdu)
Increment reference counter on a pdu to stop it prematurely getting freed off when coap_delete_pdu() ...
Definition coap_pdu.c:1655
void coap_delete_pdu_lkd(coap_pdu_t *pdu)
Dispose of an CoAP PDU and free off associated storage.
Definition coap_pdu.c:194
int coap_update_token(coap_pdu_t *pdu, size_t len, const uint8_t *data)
Updates token in pdu with length len and data.
Definition coap_pdu.c:417
#define COAP_PDU_MAX_UDP_HEADER_SIZE
coap_pdu_t * coap_new_pdu_lkd(coap_pdu_type_t type, coap_pdu_code_t code, coap_session_t *session)
Creates a new CoAP PDU.
Definition coap_pdu.c:173
#define COAP_PDU_DELAYED
#define COAP_PDU_MAX_TCP_HEADER_SIZE
#define COAP_MAX_MESSAGE_SIZE_TCP8
#define COAP_MAX_MESSAGE_SIZE_TCP0
size_t coap_pdu_encode_header(coap_pdu_t *pdu, coap_proto_t proto)
Compose the protocol specific header for the specified PDU.
Definition coap_pdu.c:1517
#define COAP_MAX_MESSAGE_SIZE_TCP16
size_t coap_add_option_internal(coap_pdu_t *pdu, coap_option_num_t number, size_t len, const uint8_t *data)
Adds option of given number to pdu that is passed as first parameter.
Definition coap_pdu.c:783
#define COAP_DEFAULT_PORT
Definition coap_pdu.h:41
int coap_mid_t
coap_mid_t is used to store the CoAP Message ID of a CoAP PDU.
Definition coap_pdu.h:268
#define COAP_TOKEN_DEFAULT_MAX
Definition coap_pdu.h:60
#define COAP_SIGNALING_OPTION_EXTENDED_TOKEN_LENGTH
Definition coap_pdu.h:204
coap_proto_t
CoAP protocol types.
Definition coap_pdu.h:317
#define COAP_SIGNALING_OPTION_BLOCK_WISE_TRANSFER
Definition coap_pdu.h:203
#define COAPS_DEFAULT_PORT
Definition coap_pdu.h:42
coap_pdu_t * coap_pdu_init(coap_pdu_type_t type, coap_pdu_code_t code, coap_mid_t mid, size_t size)
Creates a new CoAP PDU with at least enough storage space for the given size maximum message size.
Definition coap_pdu.c:102
#define COAP_INVALID_MID
Indicates an invalid message id.
Definition coap_pdu.h:271
#define COAP_DEFAULT_MTU
Definition coap_pdu.h:45
#define COAP_BERT_BASE
Definition coap_pdu.h:48
#define COAP_SIGNALING_OPTION_MAX_MESSAGE_SIZE
Definition coap_pdu.h:202
@ COAP_PROTO_WS
Definition coap_pdu.h:323
@ COAP_PROTO_DTLS
Definition coap_pdu.h:320
@ COAP_PROTO_UDP
Definition coap_pdu.h:319
@ COAP_PROTO_NONE
Definition coap_pdu.h:318
@ COAP_PROTO_TLS
Definition coap_pdu.h:322
@ COAP_PROTO_WSS
Definition coap_pdu.h:324
@ COAP_PROTO_TCP
Definition coap_pdu.h:321
@ COAP_PROTO_LAST
Definition coap_pdu.h:325
@ COAP_SIGNALING_CODE_CSM
Definition coap_pdu.h:370
@ COAP_SIGNALING_CODE_PING
Definition coap_pdu.h:371
@ COAP_EMPTY_CODE
Definition coap_pdu.h:332
@ COAP_MESSAGE_NON
Definition coap_pdu.h:74
@ COAP_MESSAGE_CON
Definition coap_pdu.h:73
#define COAP_NON_PROBING_WAIT_BASE(s)
void coap_session_reestablished(coap_session_t *session)
Session has been re-connected to server.
ssize_t coap_session_delay_pdu(coap_session_t *session, coap_pdu_t *pdu, coap_queue_t *node)
int coap_session_refresh_psk_hint(coap_session_t *session, const coap_bin_const_t *psk_hint)
Refresh the session's current Identity Hint (PSK).
void coap_session_send_csm(coap_session_t *session)
Notify session transport has just connected and CSM exchange can now start.
coap_session_t * coap_new_client_session_psk2_lkd(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto, coap_dtls_cpsk_t *setup_data)
Creates a new client session to the designated server with PSK credentials.
coap_fixed_point_t coap_add_fixed_uint(coap_fixed_point_t fp1, uint32_t u2)
void coap_handle_nack(coap_session_t *session, coap_pdu_t *sent, const coap_nack_reason_t reason, const coap_mid_t mid)
size_t coap_session_max_pdu_rcv_size(const coap_session_t *session)
Get maximum acceptable receive PDU size.
coap_fixed_point_t coap_sub_fixed_uint(coap_fixed_point_t fp1, uint32_t u2)
int coap_session_set_type_server_lkd(coap_session_t *session)
Set the session type to server.
coap_session_t * coap_endpoint_get_session(coap_endpoint_t *endpoint, const coap_packet_t *packet, coap_tick_t now)
Lookup the server session for the packet received on an endpoint, or create a new one.
#define COAP_ACK_RANDOM_FACTOR(s)
void coap_free_endpoint_lkd(coap_endpoint_t *endpoint)
Release an endpoint and all the structures associated with it.
coap_session_t * coap_new_client_session_psk_lkd(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto, const char *identity, const uint8_t *key, unsigned key_len)
Creates a new client session to the designated server with PSK credentials.
int coap_session_reconnect(coap_session_t *session)
Close the current session (if not already closed) and reconnect to server (client session only).
void coap_session_server_keepalive_failed(coap_session_t *session)
Clear down a session following a keepalive failure.
void * coap_endpoint_set_app_data_lkd(coap_endpoint_t *endpoint, void *data, coap_app_data_free_callback_t callback)
Stores data with the given endpoint, returning the previously stored value or NULL.
void coap_session_establish(coap_session_t *session)
Layer function interface for layer below session accept/connect being established.
coap_session_t * coap_new_client_session_pki_lkd(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto, coap_dtls_pki_t *setup_data)
Creates a new client session to the designated server with PKI credentials.
coap_session_t * coap_new_client_session_lkd(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto)
Creates a new client session to the designated server.
coap_fixed_point_t coap_add_fixed_fixed(coap_fixed_point_t fp1, coap_fixed_point_t fp2)
coap_tick_t coap_get_non_timeout_random_ticks(coap_session_t *session)
#define COAP_NSTART(s)
int coap_session_refresh_psk_key(coap_session_t *session, const coap_bin_const_t *psk_key)
Refresh the session's current pre-shared key (PSK).
void coap_session_connected(coap_session_t *session)
Notify session that it has just connected or reconnected.
void coap_session_failed(coap_session_t *session)
Session has failed due to a socket error.
coap_fixed_point_t coap_multi_fixed_fixed(coap_fixed_point_t fp1, coap_fixed_point_t fp2)
ssize_t coap_session_send_pdu(coap_session_t *session, coap_pdu_t *pdu)
Send a pdu according to the session's protocol.
Definition coap_net.c:1097
size_t coap_session_max_pdu_size_lkd(const coap_session_t *session)
Get maximum acceptable PDU size.
coap_mid_t coap_session_send_ping_lkd(coap_session_t *session)
Send a ping message for the session.
coap_fixed_point_t coap_div_fixed_uint(coap_fixed_point_t fp1, uint32_t u2)
void coap_session_free(coap_session_t *session)
void coap_session_mfree(coap_session_t *session)
void coap_session_release_lkd(coap_session_t *session)
Decrement reference counter on a session.
int coap_session_refresh_psk_identity(coap_session_t *session, const coap_bin_const_t *psk_identity)
Refresh the session's current pre-shared identity (PSK).
int coap_session_set_type_client_lkd(coap_session_t *session, int report_changed)
Set the session type to client.
coap_fixed_point_t coap_get_non_timeout_random(coap_session_t *session)
#define COAP_NON_MAX_RETRANSMIT(s)
coap_session_t * coap_session_reference_lkd(coap_session_t *session)
Increment reference counter on a session.
#define COAP_NON_TIMEOUT(s)
void * coap_session_set_app_data2_lkd(coap_session_t *session, void *app_data, coap_app_data_free_callback_t callback)
Stores data with the given session, returning the previously stored value or NULL.
coap_fixed_point_t coap_multi_fixed_uint(coap_fixed_point_t fp1, uint32_t u2)
#define COAP_NON_PARTIAL_TIMEOUT(s)
void coap_session_disconnected_lkd(coap_session_t *session, coap_nack_reason_t reason)
Notify session that it has failed.
coap_endpoint_t * coap_new_endpoint_lkd(coap_context_t *context, const coap_address_t *listen_addr, coap_proto_t proto)
Create a new endpoint for communicating with peers.
coap_session_t * coap_new_server_session(coap_context_t *ctx, coap_endpoint_t *ep, void *extra)
Creates a new server session for the specified endpoint.
@ COAP_EXT_T_CHECKED
Token size valid.
COAP_API void coap_session_set_app_data(coap_session_t *session, void *app_data)
Stores data with the given session.
COAP_API coap_session_t * coap_session_reference(coap_session_t *session)
Increment reference counter on a session.
coap_session_type_t
coap_session_type_t values
COAP_API void coap_session_disconnected(coap_session_t *session, coap_nack_reason_t reason)
Notify session that it has failed.
COAP_API void * coap_endpoint_set_app_data(coap_endpoint_t *endpoint, void *data, coap_app_data_free_callback_t callback)
Stores data with the given endpoint, returning the previously stored value or NULL.
void coap_session_set_mtu(coap_session_t *session, unsigned mtu)
Set the session MTU.
coap_context_t * coap_session_get_context(const coap_session_t *session)
Get the session context.
const coap_address_t * coap_session_get_addr_local(const coap_session_t *session)
Get the local IP address and port from the session.
coap_proto_t coap_session_get_proto(const coap_session_t *session)
Get the session protocol type.
COAP_API int coap_session_set_type_client(coap_session_t *session)
Set the session type to client.
const coap_bin_const_t * coap_session_get_psk_key(const coap_session_t *session)
Get the session's current pre-shared key (PSK).
void * coap_session_get_tls(const coap_session_t *session, coap_tls_library_t *tls_lib)
Get the session TLS security ptr (TLS type dependent)
coap_session_state_t coap_session_get_state(const coap_session_t *session)
Get the session state.
coap_session_state_t
coap_session_state_t values
void * coap_endpoint_get_app_data(const coap_endpoint_t *endpoint)
Returns any application-specific data that has been stored with endpoint using the function coap_endp...
coap_endpoint_t * coap_session_get_endpoint(const coap_session_t *session)
Get the endpoint of a session.
#define COAP_PROTO_NOT_RELIABLE(p)
COAP_API coap_session_t * coap_new_client_session_pki(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto, coap_dtls_pki_t *setup_data)
Creates a new client session to the designated server with PKI credentials.
void coap_session_init_token(coap_session_t *session, size_t len, const uint8_t *data)
Initializes the token value to use as a starting point.
#define COAP_PROTO_RELIABLE(p)
void coap_session_new_token(coap_session_t *session, size_t *len, uint8_t *data)
Creates a new token for use.
COAP_API coap_session_t * coap_new_client_session(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto)
Creates a new client session to the designated server.
const coap_bin_const_t * coap_session_get_psk_identity(const coap_session_t *session)
Get the server session's current PSK identity (PSK).
coap_session_t * coap_session_get_by_peer(const coap_context_t *ctx, const coap_address_t *remote_addr, int ifindex)
Get the session associated with the specified remote_addr and index.
void coap_endpoint_set_default_mtu(coap_endpoint_t *endpoint, unsigned mtu)
Set the endpoint's default MTU.
const coap_bin_const_t * coap_session_get_psk_hint(const coap_session_t *session)
Get the server session's current Identity Hint (PSK).
COAP_API coap_endpoint_t * coap_new_endpoint(coap_context_t *context, const coap_address_t *listen_addr, coap_proto_t proto)
Create a new endpoint for communicating with peers.
const coap_address_t * coap_session_get_addr_remote(const coap_session_t *session)
Get the remote IP address and port from the session.
COAP_API void coap_free_endpoint(coap_endpoint_t *endpoint)
Release an endpoint and all the structures associated with it.
COAP_API void coap_session_release(coap_session_t *session)
Decrement reference counter on a session.
COAP_API coap_session_t * coap_new_client_session_psk2(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto, coap_dtls_cpsk_t *setup_data)
Creates a new client session to the designated server with PSK credentials.
const coap_address_t * coap_session_get_addr_mcast(const coap_session_t *session)
Get the remote multicast IP address and port from the session if the original target IP was multicast...
COAP_API size_t coap_session_max_pdu_size(const coap_session_t *session)
Get maximum acceptable PDU size.
COAP_API int coap_session_set_type_server(coap_session_t *session)
Set the session type to server.
COAP_API coap_session_t * coap_new_client_session_psk(coap_context_t *ctx, const coap_address_t *local_if, const coap_address_t *server, coap_proto_t proto, const char *identity, const uint8_t *key, unsigned key_len)
Creates a new client session to the designated server with PSK credentials.
int coap_session_get_ifindex(const coap_session_t *session)
Get the session if index.
void(* coap_app_data_free_callback_t)(void *data)
Callback to free off the app data when the entry is being deleted / freed off.
COAP_API void * coap_session_set_app_data2(coap_session_t *session, void *app_data, coap_app_data_free_callback_t callback)
Stores data with the given session, returning the previously stored value or NULL.
void * coap_session_get_app_data(const coap_session_t *session)
Returns any application-specific data that has been stored with session using the function coap_sessi...
coap_session_type_t coap_session_get_type(const coap_session_t *session)
Get the session type.
@ COAP_SESSION_TYPE_HELLO
server-side ephemeral session for responding to a client hello
@ COAP_SESSION_TYPE_SERVER
server-side
@ COAP_SESSION_TYPE_CLIENT
client-side
@ COAP_SESSION_STATE_HANDSHAKE
@ COAP_SESSION_STATE_CSM
@ COAP_SESSION_STATE_ESTABLISHED
@ COAP_SESSION_STATE_NONE
@ COAP_SESSION_STATE_CONNECTING
void coap_delete_bin_const(coap_bin_const_t *s)
Deletes the given const binary data and releases any memory allocated.
Definition coap_str.c:120
void coap_delete_str_const(coap_str_const_t *s)
Deletes the given const string and releases any memory allocated.
Definition coap_str.c:61
coap_bin_const_t * coap_new_bin_const(const uint8_t *data, size_t size)
Take the specified byte array (text) and create a coap_bin_const_t * Returns a new const binary objec...
Definition coap_str.c:110
#define coap_binary_equal(binary1, binary2)
Compares the two binary data for equality.
Definition coap_str.h:214
int coap_delete_observer(coap_resource_t *resource, coap_session_t *session, const coap_bin_const_t *token)
Removes any subscription for session observer from resource and releases the allocated storage.
int coap_cancel_observe_lkd(coap_session_t *session, coap_binary_t *token, coap_pdu_type_t message_type)
Cancel an observe that is being tracked by the client large receive logic.
void coap_delete_observers(coap_context_t *context, coap_session_t *session)
Removes any subscription for session and releases the allocated storage.
int coap_tcp_is_supported(void)
Check whether TCP is available.
int coap_tls_is_supported(void)
Check whether TLS is available.
Definition coap_notls.c:41
int coap_ws_is_supported(void)
Check whether WebSockets is available.
Definition coap_ws.c:933
int coap_dtls_is_supported(void)
Check whether DTLS is available.
Definition coap_notls.c:36
int coap_wss_is_supported(void)
Check whether Secure WebSockets is available.
Definition coap_ws.c:938
Only used for servers for hashing incoming packets.
uint16_t lport
local port
coap_address_t remote
remote address and port
coap_proto_t proto
CoAP protocol.
coap_address_t remote
remote address and port
Definition coap_io.h:60
coap_address_t local
local address and port
Definition coap_io.h:61
Multi-purpose address abstraction.
CoAP binary data definition with const data.
Definition coap_str.h:67
size_t length
length of binary data
Definition coap_str.h:68
const uint8_t * s
read-only binary data
Definition coap_str.h:69
coap_session_t * session
The CoAP stack's global state is stored in a coap_context_t object.
unsigned int reconnect_time
Time to wait before reconnecting a failed client session.
coap_session_t * sessions
client sessions
coap_nack_handler_t nack_handler
Called when a response issue has occurred.
coap_resource_t * resources
hash table or list of known resources
uint32_t csm_max_message_size
Value for CSM Max-Message-Size.
unsigned int max_handshake_sessions
Maximum number of simultaneous negotating sessions per endpoint.
coap_queue_t * sendqueue
uint32_t max_token_size
Largest token size supported RFC8974.
coap_cache_entry_t * cache
CoAP cache-entry cache.
coap_endpoint_t * endpoint
the endpoints used for listening
uint32_t block_mode
Zero or more COAP_BLOCK_ or'd options.
coap_resource_t * proxy_uri_resource
can be used for handling proxy URI resources
coap_resource_t * unknown_resource
can be used for handling unknown resources
unsigned int max_idle_sessions
Maximum number of simultaneous unused sessions per endpoint.
coap_bin_const_t key
Definition coap_dtls.h:385
coap_bin_const_t identity
Definition coap_dtls.h:384
The structure used for defining the Client PSK setup data to be used.
Definition coap_dtls.h:414
char * client_sni
If not NULL, SNI to use in client TLS setup.
Definition coap_dtls.h:441
coap_dtls_cpsk_info_t psk_info
Client PSK definition.
Definition coap_dtls.h:447
The structure used for defining the PKI setup data to be used.
Definition coap_dtls.h:316
uint8_t version
Definition coap_dtls.h:317
char * client_sni
If not NULL, SNI to use in client TLS setup.
Definition coap_dtls.h:372
Abstraction of virtual endpoint that can be attached to coap_context_t.
void * app_data
application-specific data
coap_context_t * context
endpoint's context
uint16_t default_mtu
default mtu for this interface
coap_session_t * sessions
hash table or list of active sessions
coap_app_data_free_callback_t app_cb
call-back to release app_data
coap_address_t bind_addr
local interface address
coap_socket_t sock
socket object for the interface, if any
coap_proto_t proto
protocol used on this interface
Abstraction of a fixed point number that can be used where necessary instead of a float.
uint16_t fractional_part
Fractional part of fixed point variable 1/1000 (3 points) precision.
uint16_t integer_part
Integer part of fixed point variable.
coap_layer_establish_t l_establish
coap_layer_close_t l_close
Structure to hold large body (many blocks) client receive information.
coap_binary_t * app_token
app requesting PDU token
coap_pdu_t * sent_pdu
The sent pdu with all the data.
uint8_t observe_set
Set if this is an observe receive PDU.
Structure to hold large body (many blocks) server receive information.
Structure to hold large body (many blocks) transmission information.
size_t length
length of payload
coap_addr_tuple_t addr_info
local and remote addresses
unsigned char * payload
payload
int ifindex
the interface index
structure for CoAP PDUs
uint8_t hdr_size
actual size used for protocol-specific header (0 until header is encoded)
coap_bin_const_t actual_token
Actual token in pdu.
coap_mid_t mid
message id, if any, in regular host byte order
size_t used_size
used bytes of storage for token, options and payload
coap_session_t * session
Session responsible for PDU or NULL.
coap_pdu_type_t type
message type
Queue entry.
coap_address_t remote
For re-transmission - where the node is going.
coap_session_t * session
the CoAP session
coap_pdu_t * pdu
the CoAP PDU to send
unsigned int timeout
the randomized timeout value
struct coap_queue_t * next
coap_mid_t id
CoAP message id.
coap_tick_t t
when to send PDU for the next time
Abstraction of virtual session that can be attached to coap_context_t (client) or coap_endpoint_t (se...
coap_lg_xmit_t * lg_xmit
list of large transmissions
volatile uint8_t max_token_checked
Check for max token size coap_ext_token_check_t.
coap_bin_const_t * psk_key
If client, this field contains the current pre-shared key for server; When this field is NULL,...
coap_endpoint_t * endpoint
session's endpoint
uint32_t block_mode
Zero or more COAP_BLOCK_ or'd options.
coap_app_data_free_callback_t app_cb
call-back to release app_data
uint8_t doing_first
Set if doing client's first request.
coap_socket_t sock
socket object for the session, if any
coap_pdu_t * partial_pdu
incomplete incoming pdu
uint32_t max_token_size
Largest token size supported RFC8974.
uint16_t nstart
maximum concurrent confirmable xmits (default 1)
coap_bin_const_t * psk_identity
If client, this field contains the current identity for server; When this field is NULL,...
coap_session_state_t state
current state of relationship with peer
uint64_t tx_token
Next token number to use.
coap_bin_const_t * client_cid
Contains client CID or NULL.
coap_address_t local_reconnect
local address to initiate reconnect from
uint8_t csm_bert_loc_support
CSM TCP BERT blocks supported (local)
unsigned ref_proxy_subs
reference count of current proxy subscriptions
coap_addr_tuple_t addr_info
remote/local address info
coap_proto_t proto
protocol used
uint16_t tx_mid
the last message id that was used in this session
uint8_t is_dtls13
Set if session is DTLS1.3.
unsigned ref
reference count from queues
size_t csm_rcv_mtu
CSM mtu (rcv)
coap_response_t last_con_handler_res
The result of calling the response handler of the last CON.
coap_bin_const_t * psk_hint
If client, this field contains the server provided identity hint.
coap_bin_const_t * last_token
uint8_t doing_send_recv
Set if coap_send_recv() active.
coap_dtls_cpsk_t cpsk_setup_data
client provided PSK initial setup data
size_t mtu
path or CSM mtu (xmt)
uint8_t no_observe_cancel
Set if do not cancel observe on session close.
size_t partial_read
if > 0 indicates number of bytes already read for an incoming message
int dtls_event
Tracking any (D)TLS events on this session.
uint16_t max_retransmit
maximum re-transmit count (default 4)
coap_fixed_point_t ack_random_factor
ack random factor backoff (default 1.5)
uint8_t proxy_session
Set if this is an ongoing proxy session.
uint8_t con_active
Active CON request sent.
coap_queue_t * delayqueue
list of delayed messages waiting to be sent
size_t tls_overhead
overhead of TLS layer
void * app_data
application-specific data
uint32_t tx_rtag
Next Request-Tag number to use.
coap_mid_t last_ping_mid
the last keepalive message id that was used in this session
coap_lg_srcv_t * lg_srcv
Server list of expected large receives.
coap_bin_const_t * req_token
Token in request pdu of coap_send_recv()
coap_lg_crcv_t * lg_crcv
Client list of expected large receives.
coap_fixed_point_t ack_timeout
timeout waiting for ack (default 2.0 secs)
coap_fixed_point_t default_leisure
Mcast leisure time (default 5.0 secs)
coap_mid_t last_con_mid
The last CON mid that has been been processed.
coap_session_type_t type
client or server side socket
uint32_t probing_rate
Max transfer wait when remote is not respoding (default 1 byte/sec)
coap_mid_t last_ack_mid
The last ACK mid that has been been processed.
coap_context_t * context
session's context
uint8_t session_failed
Set if session failed and can try re-connect.
size_t partial_write
if > 0 indicates number of bytes already written from the pdu at the head of sendqueue
coap_addr_hash_t addr_hash
Address hash for server incoming packets.
coap_pdu_t * cached_pdu
Cached copy of last ACK response PDU.
int ifindex
interface index
coap_bin_const_t * echo
last token used to make a request
coap_layer_func_t lfunc[COAP_LAYER_LAST]
Layer functions to use.
coap_session_t * session
Used to determine session owner.
coap_endpoint_t * endpoint
Used by the epoll logic for a listening endpoint.
coap_address_t mcast_addr
remote address and port (multicast track)
coap_socket_flags_t flags
1 or more of COAP_SOCKET* flag values