mirror of
https://github.com/RIOT-OS/RIOT.git
synced 2024-12-29 04:50:03 +01:00
sock_dodtls: Initial import of a DNS over DTLS client
This commit is contained in:
parent
bafb7d53c5
commit
f575292e20
@ -146,6 +146,9 @@ endif
|
|||||||
ifneq (,$(filter sock_dns_mock,$(USEMODULE)))
|
ifneq (,$(filter sock_dns_mock,$(USEMODULE)))
|
||||||
DIRS += net/application_layer/sock_dns_mock
|
DIRS += net/application_layer/sock_dns_mock
|
||||||
endif
|
endif
|
||||||
|
ifneq (,$(filter sock_dodtls,$(USEMODULE)))
|
||||||
|
DIRS += net/application_layer/sock_dodtls
|
||||||
|
endif
|
||||||
ifneq (,$(filter sock_util,$(USEMODULE)))
|
ifneq (,$(filter sock_util,$(USEMODULE)))
|
||||||
DIRS += net/sock
|
DIRS += net/sock
|
||||||
endif
|
endif
|
||||||
|
@ -602,6 +602,15 @@ ifneq (,$(filter sock_dns,$(USEMODULE)))
|
|||||||
USEMODULE += posix_headers
|
USEMODULE += posix_headers
|
||||||
endif
|
endif
|
||||||
|
|
||||||
|
ifneq (,$(filter sock_dodtls,$(USEMODULE)))
|
||||||
|
USEMODULE += dns_msg
|
||||||
|
USEMODULE += sock_dtls
|
||||||
|
USEMODULE += sock_udp
|
||||||
|
USEMODULE += sock_util
|
||||||
|
USEMODULE += posix_headers
|
||||||
|
USEMODULE += ztimer_msec
|
||||||
|
endif
|
||||||
|
|
||||||
ifneq (,$(filter dns_cache,$(USEMODULE)))
|
ifneq (,$(filter dns_cache,$(USEMODULE)))
|
||||||
USEMODULE += ztimer_msec
|
USEMODULE += ztimer_msec
|
||||||
USEMODULE += checksum
|
USEMODULE += checksum
|
||||||
|
132
sys/include/net/sock/dodtls.h
Normal file
132
sys/include/net/sock/dodtls.h
Normal file
@ -0,0 +1,132 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2021 Freie Universität Berlin
|
||||||
|
*
|
||||||
|
* This file is subject to the terms and conditions of the GNU Lesser
|
||||||
|
* General Public License v2.1. See the file LICENSE in the top level
|
||||||
|
* directory for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @defgroup net_sock_dodtls DNS over DTLS sock API
|
||||||
|
* @ingroup net_sock
|
||||||
|
*
|
||||||
|
* @brief Sock DNS over DTLS client
|
||||||
|
*
|
||||||
|
* @see [RFC 8094](https://datatracker.ietf.org/doc/html/rfc8094)
|
||||||
|
*
|
||||||
|
* @experimental This implementation is in an experimental state.
|
||||||
|
* RFC 8094 requires DNS over TLS (DoT) as a fall-back for the
|
||||||
|
* [PMTU issues](https://datatracker.ietf.org/doc/html/rfc8094#section-5)).
|
||||||
|
* This fallback is not in place in this implementation.
|
||||||
|
* Consequently, [EDNS(0)](https://datatracker.ietf.org/doc/html/rfc6891)
|
||||||
|
* to negotiate maximum response size is also not in place.
|
||||||
|
*
|
||||||
|
* @{
|
||||||
|
*
|
||||||
|
* @file
|
||||||
|
* @brief DNS over DTLS sock definitions
|
||||||
|
*
|
||||||
|
* @author Martine S. Lenders <m.lenders@fu-berlin.de>
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef NET_SOCK_DODTLS_H
|
||||||
|
#define NET_SOCK_DODTLS_H
|
||||||
|
|
||||||
|
#include "net/sock/udp.h"
|
||||||
|
|
||||||
|
#ifdef __cplusplus
|
||||||
|
extern "C" {
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @name DNS over DTLS defines
|
||||||
|
* @{
|
||||||
|
*/
|
||||||
|
#define SOCK_DODTLS_PORT (853) /**< Default DNS over DTLS server port */
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @defgroup net_sock_dodtls_conf DNS over DTLS compile-time configuration
|
||||||
|
* @ingroup config
|
||||||
|
* @{
|
||||||
|
*/
|
||||||
|
#ifndef CONFIG_SOCK_DODTLS_RETRIES
|
||||||
|
#define CONFIG_SOCK_DODTLS_RETRIES (2) /**< Number of DNS over DTLS query retries */
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @brief Timeout for DNS over DTLS queries in milliseconds
|
||||||
|
*/
|
||||||
|
#ifndef CONFIG_SOCK_DODTLS_TIMEOUT_MS
|
||||||
|
#define CONFIG_SOCK_DODTLS_TIMEOUT_MS (1000U)
|
||||||
|
#endif
|
||||||
|
/** @} */
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @brief Maximum name length for a DNS over DTLS query
|
||||||
|
*/
|
||||||
|
#define SOCK_DODTLS_MAX_NAME_LEN (CONFIG_DNS_MSG_LEN - sizeof(dns_hdr_t) - 4)
|
||||||
|
/** @} */
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @brief Get IP address for DNS name
|
||||||
|
*
|
||||||
|
* This function will synchronously try to resolve a DNS A or AAAA record by contacting
|
||||||
|
* the DNS server specified in the global variable @ref sock_dns_server.
|
||||||
|
*
|
||||||
|
* By supplying AF_INET, AF_INET6 or AF_UNSPEC in @p family requesting of A
|
||||||
|
* records (IPv4), AAAA records (IPv6) or both can be selected.
|
||||||
|
*
|
||||||
|
* This function will return the first DNS record it receives. IF both A and
|
||||||
|
* AAAA are requested, AAAA will be preferred.
|
||||||
|
*
|
||||||
|
* @note @p addr_out needs to provide space for any possible result!
|
||||||
|
* (4byte when family==AF_INET, 16byte otherwise)
|
||||||
|
*
|
||||||
|
* @param[in] domain_name DNS name to resolve into address
|
||||||
|
* @param[out] addr_out buffer to write result into
|
||||||
|
* @param[in] family Either AF_INET, AF_INET6 or AF_UNSPEC
|
||||||
|
*
|
||||||
|
* @return the size of the resolved address on success
|
||||||
|
* @return -ECONNREFUSED, when a DNS over DTLS server is not configured.
|
||||||
|
* @return -ENOSPC, when the length of @p domain_name is greater than @ref
|
||||||
|
* SOCK_DODTLS_MAX_NAME_LEN.
|
||||||
|
* @return -EBADSG, when the DNS reply is not parseable.
|
||||||
|
*/
|
||||||
|
int sock_dodtls_query(const char *domain_name, void *addr_out, int family);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @brief Get currently configured DNS over DTLS server endpoint
|
||||||
|
*
|
||||||
|
* @param[out] server The currently configured DNS over DTLS server endpoint.
|
||||||
|
* May not be NULL on input.
|
||||||
|
*
|
||||||
|
* @return 0 if @p server was set.
|
||||||
|
* @return -ENOTCONN, when currently no server is configured.
|
||||||
|
*/
|
||||||
|
int sock_dodtls_get_server(sock_udp_ep_t *server);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @brief Configure and establish session with DNS over DTLS server
|
||||||
|
*
|
||||||
|
* @param[in] server A DNS over DTLS server endpoint. May be NULL to
|
||||||
|
* destroy the session with and unset the currently
|
||||||
|
* configured server.
|
||||||
|
* @param[in] creds DTLS credentials for the server (see @ref net_credman).
|
||||||
|
* May be NULL, when @p server is also NULL.
|
||||||
|
*
|
||||||
|
* @return 0 on success.
|
||||||
|
* @return -EINVAL, if @p cred contains invalid values.
|
||||||
|
* @return -ENOSPC, if @p cred does not fit into @ref net_credman.
|
||||||
|
* @return Any other negative errno potentially returned by @ref sock_udp_create(),
|
||||||
|
* @ref sock_dtls_create(), @ref sock_dtls_session_init() or
|
||||||
|
* @ref sock_dtls_recv().
|
||||||
|
*/
|
||||||
|
int sock_dodtls_set_server(const sock_udp_ep_t *server,
|
||||||
|
const credman_credential_t *creds);
|
||||||
|
|
||||||
|
#ifdef __cplusplus
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#endif /* NET_SOCK_DODTLS_H */
|
||||||
|
/** @} */
|
@ -15,6 +15,7 @@ endmenu # CoAP
|
|||||||
rsource "cord/Kconfig"
|
rsource "cord/Kconfig"
|
||||||
rsource "dhcpv6/Kconfig"
|
rsource "dhcpv6/Kconfig"
|
||||||
rsource "dns/Kconfig"
|
rsource "dns/Kconfig"
|
||||||
|
rsource "sock_dodtls/Kconfig"
|
||||||
|
|
||||||
menu "MQTT-SN"
|
menu "MQTT-SN"
|
||||||
|
|
||||||
|
24
sys/net/application_layer/sock_dodtls/Kconfig
Normal file
24
sys/net/application_layer/sock_dodtls/Kconfig
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
# Copyright (C) 2021 Freie Universität Berlin
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# This file is subject to the terms and conditions of the GNU Lesser
|
||||||
|
# General Public License v2.1. See the file LICENSE in the top level
|
||||||
|
# directory for more details.
|
||||||
|
#
|
||||||
|
menuconfig KCONFIG_USEMODULE_SOCK_DODTLS
|
||||||
|
bool "Configure DNS over DTLS"
|
||||||
|
depends on USEMODULE_SOCK_DODTLS
|
||||||
|
help
|
||||||
|
Configure DNS over DTLS using Kconfig.
|
||||||
|
|
||||||
|
if KCONFIG_USEMODULE_SOCK_DODTLS
|
||||||
|
|
||||||
|
config SOCK_DODTLS_RETRIES
|
||||||
|
int "Number of DNS over DTLS query retries"
|
||||||
|
default 2
|
||||||
|
|
||||||
|
config SOCK_DODTLS_TIMEOUT_MS
|
||||||
|
int "Timeout for DNS over DTLS queries in milliseconds"
|
||||||
|
default 1000
|
||||||
|
|
||||||
|
endif # KCONFIG_USEMODULE_SOCK_DODTLS
|
1
sys/net/application_layer/sock_dodtls/Makefile
Normal file
1
sys/net/application_layer/sock_dodtls/Makefile
Normal file
@ -0,0 +1 @@
|
|||||||
|
include $(RIOTBASE)/Makefile.base
|
274
sys/net/application_layer/sock_dodtls/sock_dodtls.c
Normal file
274
sys/net/application_layer/sock_dodtls/sock_dodtls.c
Normal file
@ -0,0 +1,274 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2017 Kaspar Schleiser <kaspar@schleiser.de>
|
||||||
|
* Copyright (C) 2021 Freie Universität Berlin
|
||||||
|
*
|
||||||
|
* This file is subject to the terms and conditions of the GNU Lesser
|
||||||
|
* General Public License v2.1. See the file LICENSE in the top level
|
||||||
|
* directory for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @ingroup net_sock_dodtls
|
||||||
|
* @{
|
||||||
|
* @file
|
||||||
|
* @brief sock DNS client implementation
|
||||||
|
* @author Kaspar Schleiser <kaspar@schleiser.de>
|
||||||
|
* @author Martine S. Lenders <m.lenders@fu-berlin.de>
|
||||||
|
* @}
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <assert.h>
|
||||||
|
#include <errno.h>
|
||||||
|
#include <stdbool.h>
|
||||||
|
|
||||||
|
#include "mutex.h"
|
||||||
|
#include "net/credman.h"
|
||||||
|
#include "net/dns.h"
|
||||||
|
#include "net/dns/cache.h"
|
||||||
|
#include "net/dns/msg.h"
|
||||||
|
#include "net/iana/portrange.h"
|
||||||
|
#include "net/sock/dtls.h"
|
||||||
|
#include "net/sock/udp.h"
|
||||||
|
#include "net/sock/dodtls.h"
|
||||||
|
#include "random.h"
|
||||||
|
#include "ztimer.h"
|
||||||
|
|
||||||
|
#define ENABLE_DEBUG 0
|
||||||
|
#include "debug.h"
|
||||||
|
|
||||||
|
/* min domain name length is 1, so minimum record length is 7 */
|
||||||
|
#define SOCK_DODTLS_MIN_REPLY_LEN (unsigned)(sizeof(dns_hdr_t) + 7)
|
||||||
|
/* see https://datatracker.ietf.org/doc/html/rfc8094#section-3.1 */
|
||||||
|
#define SOCK_DODTLS_SESSION_TIMEOUT_MS (15U * MS_PER_SEC)
|
||||||
|
#define SOCK_DODTLS_SESSION_RECV_TIMEOUT_MS (1U * MS_PER_SEC)
|
||||||
|
|
||||||
|
/* Socks to the DNS over DTLS server */
|
||||||
|
static uint8_t _dns_buf[CONFIG_DNS_MSG_LEN];
|
||||||
|
static sock_udp_t _udp_sock;
|
||||||
|
static sock_dtls_t _dtls_sock;
|
||||||
|
static sock_dtls_session_t _server_session;
|
||||||
|
/* Mutex to access server sock */
|
||||||
|
static mutex_t _server_mutex = MUTEX_INIT;
|
||||||
|
/* Type of the server credentials, stored for eventual credential deletion */
|
||||||
|
static credman_type_t _cred_type = CREDMAN_TYPE_EMPTY;
|
||||||
|
/* Tag of the server credentials, stored for eventual credential deletion */
|
||||||
|
static credman_tag_t _cred_tag = CREDMAN_TAG_EMPTY;
|
||||||
|
static uint16_t _id = 0;
|
||||||
|
|
||||||
|
static inline bool _server_set(void);
|
||||||
|
static int _connect_server(const sock_udp_ep_t *server,
|
||||||
|
const credman_credential_t *creds);
|
||||||
|
static int _disconnect_server(void);
|
||||||
|
static uint32_t _now_ms(void);
|
||||||
|
static void _sleep_ms(uint32_t delay);
|
||||||
|
|
||||||
|
int sock_dodtls_query(const char *domain_name, void *addr_out, int family)
|
||||||
|
{
|
||||||
|
int res;
|
||||||
|
uint16_t id;
|
||||||
|
|
||||||
|
if (strlen(domain_name) > SOCK_DODTLS_MAX_NAME_LEN) {
|
||||||
|
return -ENOSPC;
|
||||||
|
}
|
||||||
|
res = dns_cache_query(domain_name, addr_out, family);
|
||||||
|
if (res) {
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
if (!_server_set()) {
|
||||||
|
return -ECONNREFUSED;
|
||||||
|
}
|
||||||
|
|
||||||
|
mutex_lock(&_server_mutex);
|
||||||
|
id = _id++;
|
||||||
|
for (int i = 0; i < CONFIG_SOCK_DODTLS_RETRIES; i++) {
|
||||||
|
uint32_t timeout = CONFIG_SOCK_DODTLS_TIMEOUT_MS * US_PER_MS;
|
||||||
|
uint32_t start, send_duration;
|
||||||
|
size_t buflen = dns_msg_compose_query(_dns_buf, domain_name, id,
|
||||||
|
family);
|
||||||
|
|
||||||
|
start = _now_ms();
|
||||||
|
res = sock_dtls_send(&_dtls_sock, &_server_session,
|
||||||
|
_dns_buf, buflen, timeout);
|
||||||
|
send_duration = _now_ms() - start;
|
||||||
|
if (send_duration > CONFIG_SOCK_DODTLS_TIMEOUT_MS) {
|
||||||
|
return -ETIMEDOUT;
|
||||||
|
}
|
||||||
|
timeout -= send_duration;
|
||||||
|
if (res <= 0) {
|
||||||
|
_sleep_ms(timeout);
|
||||||
|
}
|
||||||
|
res = sock_dtls_recv(&_dtls_sock, &_server_session,
|
||||||
|
_dns_buf, sizeof(_dns_buf), timeout);
|
||||||
|
if (res > 0) {
|
||||||
|
if (res > (int)SOCK_DODTLS_MIN_REPLY_LEN) {
|
||||||
|
uint32_t ttl = 0;
|
||||||
|
|
||||||
|
if ((res = dns_msg_parse_reply(_dns_buf, res, family,
|
||||||
|
addr_out, &ttl)) > 0) {
|
||||||
|
dns_cache_add(domain_name, addr_out, res, ttl);
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
res = -EBADMSG;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
out:
|
||||||
|
memset(_dns_buf, 0, sizeof(_dns_buf)); /* flush-out unencrypted data */
|
||||||
|
mutex_unlock(&_server_mutex);
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
int sock_dodtls_get_server(sock_udp_ep_t *server)
|
||||||
|
{
|
||||||
|
int res = -ENOTCONN;
|
||||||
|
|
||||||
|
assert(server != NULL);
|
||||||
|
mutex_lock(&_server_mutex);
|
||||||
|
if (_server_set()) {
|
||||||
|
sock_udp_get_remote(&_udp_sock, server);
|
||||||
|
res = 0;
|
||||||
|
}
|
||||||
|
mutex_unlock(&_server_mutex);
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
int sock_dodtls_set_server(const sock_udp_ep_t *server,
|
||||||
|
const credman_credential_t *creds)
|
||||||
|
{
|
||||||
|
return (server == NULL)
|
||||||
|
? _disconnect_server()
|
||||||
|
: _connect_server(server, creds);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool _server_set(void)
|
||||||
|
{
|
||||||
|
return _cred_type != CREDMAN_TYPE_EMPTY;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void _close_session(credman_tag_t creds_tag, credman_type_t creds_type)
|
||||||
|
{
|
||||||
|
sock_dtls_session_destroy(&_dtls_sock, &_server_session);
|
||||||
|
sock_dtls_close(&_dtls_sock);
|
||||||
|
credman_delete(creds_tag, creds_type);
|
||||||
|
sock_udp_close(&_udp_sock);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int _connect_server(const sock_udp_ep_t *server,
|
||||||
|
const credman_credential_t *creds)
|
||||||
|
{
|
||||||
|
int res = -EADDRINUSE;
|
||||||
|
uint32_t start, try_start, timeout = SOCK_DODTLS_SESSION_RECV_TIMEOUT_MS;
|
||||||
|
sock_udp_ep_t local = SOCK_IPV6_EP_ANY;
|
||||||
|
|
||||||
|
/* server != NULL is checked in sock_dodtls_set_server() */
|
||||||
|
assert(creds != NULL);
|
||||||
|
mutex_lock(&_server_mutex);
|
||||||
|
while (res == -EADDRINUSE) {
|
||||||
|
/* choose random ephemeral port, since DTLS requires a local port */
|
||||||
|
local.port = IANA_DYNAMIC_PORTRANGE_MIN +
|
||||||
|
(random_uint32() % (IANA_SYSTEM_PORTRANGE_MAX - IANA_DYNAMIC_PORTRANGE_MIN));
|
||||||
|
if ((res = sock_udp_create(&_udp_sock, &local, server, 0)) < 0) {
|
||||||
|
if (res != -EADDRINUSE) {
|
||||||
|
DEBUG("Unable to create UDP sock\n");
|
||||||
|
goto exit;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
res = credman_add(creds);
|
||||||
|
if (res < 0 && res != CREDMAN_EXIST) {
|
||||||
|
DEBUG("Unable to add credential to credman\n");
|
||||||
|
_close_session(creds->tag, creds->type);
|
||||||
|
switch (res) {
|
||||||
|
case CREDMAN_NO_SPACE:
|
||||||
|
res = -ENOSPC;
|
||||||
|
break;
|
||||||
|
case CREDMAN_ERROR:
|
||||||
|
case CREDMAN_INVALID:
|
||||||
|
case CREDMAN_TYPE_UNKNOWN:
|
||||||
|
default:
|
||||||
|
res = -EINVAL;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
goto exit;
|
||||||
|
}
|
||||||
|
if ((res = sock_dtls_create(&_dtls_sock, &_udp_sock, creds->tag,
|
||||||
|
SOCK_DTLS_1_2, SOCK_DTLS_CLIENT)) < 0) {
|
||||||
|
puts("Unable to create DTLS sock\n");
|
||||||
|
_close_session(creds->tag, creds->type);
|
||||||
|
goto exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
start = _now_ms();
|
||||||
|
try_start = start;
|
||||||
|
while (((try_start = _now_ms()) - start) < SOCK_DODTLS_SESSION_TIMEOUT_MS) {
|
||||||
|
memset(&_server_session, 0, sizeof(_server_session));
|
||||||
|
if ((res = sock_dtls_session_init(&_dtls_sock, server,
|
||||||
|
&_server_session)) >= 0) {
|
||||||
|
uint32_t try_duration;
|
||||||
|
|
||||||
|
res = sock_dtls_recv(&_dtls_sock, &_server_session, _dns_buf,
|
||||||
|
sizeof(_dns_buf), timeout * US_PER_MS);
|
||||||
|
if (res == -SOCK_DTLS_HANDSHAKE) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
DEBUG("Unable to establish DTLS handshake: %d (timeout: %luus)\n",
|
||||||
|
-res, (long unsigned)timeout * US_PER_MS);
|
||||||
|
sock_dtls_session_destroy(&_dtls_sock, &_server_session);
|
||||||
|
try_duration = _now_ms() - try_start;
|
||||||
|
if (try_duration < timeout) {
|
||||||
|
_sleep_ms(timeout - try_duration);
|
||||||
|
}
|
||||||
|
/* see https://datatracker.ietf.org/doc/html/rfc6347#section-4.2.4.1 */
|
||||||
|
timeout *= 2U;
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
DEBUG("Unable to initialize DTLS session: %d\n", -res);
|
||||||
|
sock_dtls_session_destroy(&_dtls_sock, &_server_session);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (res != -SOCK_DTLS_HANDSHAKE) {
|
||||||
|
res = -ETIMEDOUT;
|
||||||
|
_close_session(creds->tag, creds->type);
|
||||||
|
goto exit;
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
res = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
_cred_type = creds->type;
|
||||||
|
_cred_tag = creds->tag;
|
||||||
|
_id = (uint16_t)(random_uint32() & 0xffff);
|
||||||
|
exit:
|
||||||
|
memset(_dns_buf, 0, sizeof(_dns_buf)); /* flush-out unencrypted data */
|
||||||
|
mutex_unlock(&_server_mutex);
|
||||||
|
return (res > 0) ? 0 : res;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int _disconnect_server(void)
|
||||||
|
{
|
||||||
|
int res = 0;
|
||||||
|
|
||||||
|
mutex_lock(&_server_mutex);
|
||||||
|
if (!_server_set()) {
|
||||||
|
goto exit;
|
||||||
|
}
|
||||||
|
_close_session(_cred_tag, _cred_type);
|
||||||
|
_cred_tag = CREDMAN_TAG_EMPTY;
|
||||||
|
_cred_type = CREDMAN_TYPE_EMPTY;
|
||||||
|
exit:
|
||||||
|
mutex_unlock(&_server_mutex);
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
static uint32_t _now_ms(void)
|
||||||
|
{
|
||||||
|
return ztimer_now(ZTIMER_MSEC);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void _sleep_ms(uint32_t delay)
|
||||||
|
{
|
||||||
|
ztimer_sleep(ZTIMER_MSEC, delay);
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user