Benjamin Valentin
b6fac2b2c7
nanocoap_sock: consitfy remote
2022-09-14 10:29:57 +02:00
benpicco
b117171fcf
Merge pull request #18519 from benpicco/coap_request_ctx_get_remote
...
gcoap: add remote sock_udp_ep_t to coap_request_ctx_t
2022-09-12 20:30:19 +02:00
Benjamin Valentin
02aeab750a
gcoap_forward_proxy: const arg to gcoap_forward_proxy_request_process()
2022-09-12 17:52:54 +02:00
Benjamin Valentin
1552267d19
gcoap: drop duplicate context field from coap_request_ctx_t
2022-09-12 17:51:26 +02:00
Benjamin Valentin
f068fbccb6
gcoap_forward_proxy: make use of coap_request_ctx_get_remote_udp()
2022-09-12 17:51:26 +02:00
Benjamin Valentin
2376343547
gcoap: add remote sock_udp_ep_t to coap_request_ctx_t
2022-09-12 17:51:26 +02:00
Teufelchen1
df8fe4476d
sys/uri_parser: Adding the port as uint16
2022-09-08 11:32:49 +02:00
Benjamin Valentin
37dceb6c80
nanocoap_sock: use correct error code in nanocoap_get_blockwise_url_to_buf()
...
It should return -ENOBUFS like the other nanocoap_…() functions, not -1
2022-09-05 07:40:59 +02:00
benpicco
0e2eb919a4
Merge pull request #18536 from fabian18/bugfix_gcoap_fileserver_recursive_delete
...
gcoap_fileserver: bugfix recursive delete
2022-08-31 08:35:27 +02:00
Fabian Hüßler
43caeb8cb5
gcoap_fileserver: bugfix add missing return
2022-08-30 17:47:51 +02:00
Benjamin Valentin
514f039c30
nanocoap_sock: add nanocoap_sock_{put, post}()
2022-08-25 17:52:43 +02:00
Martine Lenders
f15fbb3c15
Merge pull request #18441 from miri64/dns_cache/fix/ttl0
...
dns_cache: handle TTL=0 properly
2022-08-23 02:58:13 +02:00
Martine Lenders
1135cc0f7e
gcoap: fix swap-out of option length for ETag
2022-08-18 14:38:37 +02:00
Martine Lenders
9bc0454d99
gcoap_forward_proxy: copy Max-Age from forwarded Valid if it exists
2022-08-18 12:19:31 +02:00
benpicco
0713e0d9a1
Merge pull request #18313 from benpicco/coap_request_ctx_get_tl_type
...
gcoap: move tl_type to coap_request_ctx_t
2022-08-17 16:51:50 +02:00
Martine Lenders
6f18132e98
gcoap_dns: implement Max-Age-based TTL calculation
2022-08-11 15:00:19 +02:00
Martine Lenders
883c3fdffa
dns_cache: handle TTL=0 properly
...
Existing entries should be expired, new entries should not be created.
2022-08-11 14:04:16 +02:00
benpicco
a93ba1ef80
Merge pull request #18434 from nmeum/pr/asymcute-ack-typecheck
...
asymcute: Compare request message type when matching acknowledgement
2022-08-11 12:10:04 +02:00
Martine Lenders
60bd3ca07a
Merge pull request #18429 from miri64/gcoap/fix/empty-ack
...
gcoap: fixes around empty ACKs
2022-08-10 23:05:53 +02:00
Martine S. Lenders
f11c9e837d
gcoap: expire memo and stop retransmissions on RESET reception
2022-08-10 16:09:43 +02:00
Martine S. Lenders
b616c17e46
gcoap: expire memo if there is nothing to wait for
2022-08-10 16:09:43 +02:00
chrysn
9ca149f30c
Merge pull request #17978 from chrysn-pull-requests/gcoap-match-response-from-multicast
...
gcoap: Forego IP address comparison in memo finding of multicasts
2022-08-10 15:19:11 +02:00
Sören Tempel
06d572c2fc
asymcute: fix one byte out-of-bounds access in _len_get
...
As per Section 5.2.1 of the MQTT-SN specification, the MQTT-SN length
header is either 1- or 3-octet long. If it is 3-octet long then the
first octet is 0x01. The asymcute implementation currently only checks
that the incoming packet is at least 2-octet long before attempting to
parse it (MIN_PKT_LEN). However, if the first octet is 0x01 the packet
must be more than 3 octet long in order to be valid. Since asymcute
does not check this it reads one octet beyond the packet data for a
2-octet packet where the first octet has the value 0x01. This commit
fixes this issue by adding an additional sanity check to _len_get.
2022-08-10 05:41:10 +02:00
Sören Tempel
fb660dbec6
asymcute: Compare request message type when matching acknowledgement
...
Currently, asymcute only matches an MQTT-SN request to its
acknowledgement using the MsgId header. However, I strongly believe
this to be insufficient as asymcute would thus also match a SUBACK
to a prior PUBLISH message (for example) as long as the message ID
matches. To address this issue, this commit modifies _req_preprocess
to also compare the request message type in addition to the message id.
2022-08-10 00:49:37 +02:00
chrysn
ab6bec6f0e
gcoap: Forego IP address comparison in memo finding of multicasts
...
Co-Authored-By: Benjamin Valentin <benjamin.valentin@ml-pa.com>
2022-08-09 19:09:39 +02:00
Martine S. Lenders
2cd785791d
gcoap: send empty RST on unknown CON response
2022-08-09 17:09:50 +02:00
Benjamin Valentin
199e31ef43
gcoap/fileserver: ignore URI HOST option
2022-08-04 12:04:59 +02:00
Fabian Hüßler
9333970b77
gcoap/fileserver: make PUT and DELETE pseudomodules
2022-08-03 22:10:30 +02:00
Fabian Hüßler
f357d99396
gcoap/fileserver: recursive directory deletion as default
2022-08-03 22:10:30 +02:00
Fabian Hüßler
688acff5bc
gcoap/fileserver: implement PUT/POST/DELETE functionality
2022-08-03 22:09:21 +02:00
Martine Lenders
8ad68dbb21
Merge pull request #16861 from miri64/sock_dodtls/feat/initial
...
sock_dodtls: Initial import of a DNS over DTLS client
2022-07-27 13:17:23 +02:00
Martine Lenders
1b6c9a8334
sock_dodtls: provide getters for sock and session
...
To be able to implement the DNS message exchange outside the module.
2022-07-27 00:46:43 +02:00
Martine Lenders
96b1d9c59e
tests/gnrc_sock_dodtls: provide DNS over DTLS test application
2022-07-27 00:46:43 +02:00
Martine Lenders
f575292e20
sock_dodtls: Initial import of a DNS over DTLS client
2022-07-26 19:37:12 +02:00
Martine Lenders
875411fd3a
gcoap_dns: fix block-wise transfer
2022-07-25 20:17:00 +02:00
Martine Lenders
349a89c9fa
gcoap_dns: replace printfs with DEBUG
2022-07-25 19:51:47 +02:00
Martine Lenders
2e5a66e7d2
gcoap_dns: Add DNS cache support
2022-07-20 10:45:08 +02:00
Martine Lenders
fe4deff522
dns_cache: synchronize access with mutex
2022-07-20 06:30:14 +02:00
Martine Lenders
8bec9c1115
sock_dns_cache: move to dns_cache
...
Also piggy-back some fixes to the unittests and submodule handling
2022-07-18 15:27:58 +02:00
Martine Lenders
1761726024
net/dns: provide Kconfig
2022-07-18 11:43:35 +02:00
Benjamin Valentin
d7bb42296a
gcoap: move tl_type to coap_request_ctx_t
2022-07-17 18:05:07 +02:00
Benjamin Valentin
3806f7d532
nanocoap: make coap_request_ctx_t members internal
2022-07-17 14:32:16 +02:00
Benjamin Valentin
e8829d5591
gcoap_fileserver: make use of coap_request_ctx_t
2022-07-17 14:32:16 +02:00
Benjamin Valentin
a6c617a221
gcoap: make use of coap_request_ctx_t
2022-07-17 14:29:39 +02:00
Benjamin Valentin
acfab72296
nanocoap: make use of coap_request_ctx_t
2022-07-17 14:29:39 +02:00
Benjamin Valentin
d09d29a581
tests/unittests: add tests sock_dns_cache
2022-07-15 00:03:49 +02:00
Benjamin Valentin
077a41a719
sock_dns: implement DNS cache
2022-07-13 23:23:52 +02:00
Martine Lenders
a8254d52b8
Merge pull request #16705 from miri64/gcoap_dns/feat/initial
...
gcoap_dns: initial import of a DNS over CoAP (DoC) client
2022-07-13 02:27:17 +02:00
Sören Tempel
f073dcdb3d
gnrc_dhcpv6_client: Fix out-of-bounds access during option parsing
...
The _parse_reply function iterates over the DHCPv6 message options
twice but only performs sanity checks on the option length in the
first iteration. As such, both loop iterations need to be identical.
Unfortunately, there aren't without this commit as (1) they use
different maximum length values and (2) the first iteration stops
parsing as soon as it encounters a zero option while the second
doesn't. As such, it is possible for out-of-bounds read to be
performed by the second loop iteration. This commit fixes this.
2022-07-11 22:55:33 +02:00
Martine Lenders
107a2a0753
gcoap_dns: initial import of a DNS over CoAP client
2022-07-01 18:44:02 +02:00