David J. Fiddes
0d6d8922f2
Implement RFC4075 Receive SNTP servers via DHCPv6
...
This adds support for RFC4075 SNTP server configuration via DHCPv6.
The DHCPv6 options transmitted are now conditional on how LwIP is
configured.
A new SNTP application option SNTP_GET_SERVERS_FROM_DHCPV6 is used
to enable. For simplicity this is configured to use the global
LWIP_DHCP6_GET_NTP_SRV configuration setting.
Tests:
- Check the global options now control the DHCPv6 request sent
in Wireshark
- Check against 0, 1 and 3 SNTP servers configured on an odhcpd
server configured to support RFC 4075 SNTP server lists.
Verify that the SNTP server list is updated on connection
establishment on an ESP8266 WeMOS D1.
- Verify that SNTP packets are sent and recieved from a
configured server and that system time is updated.
Signed-off-by: David J. Fiddes <D.J@fiddes.net>
(cherry picked from commit 8f2f43f093
)
2019-02-18 13:02:48 +01:00
David Girault
67350e3c01
mqtt: remove bad assert in mqtt_message_received()
...
- client->msg_idx can be > MQTT_VAR_HEADER_BUFFER_LEN in long message splitted in multiple pbufs
- renamed fixed_hdr_idx to fixed_hdr_len because it is length of fixed header in rx_buffer, not an index to it
- removed the cpy_start as data always copied right after the fixed header
(cherry picked from commit 2cc420e434
)
2019-02-18 13:01:37 +01:00
Simon Goldschmidt
1a6455bc25
tcp: improve debug message a little
...
(cherry picked from commit ed561a578b
)
2019-02-18 13:00:17 +01:00
Dirk Ziegelmeier
e1528e084d
Fix bug #55537 : Crash in SYN_SENT state when TCP_INPUT_DEBUG logs are ON
...
(cherry picked from commit 4c19a909c2
)
2019-02-18 13:00:16 +01:00
Dirk Ziegelmeier
1892f445e2
Apply patch #9737 : Fix DHCPv6 DNS server assignment
...
(cherry picked from commit 941300c21c
)
2019-02-18 12:59:10 +01:00
Dirk Ziegelmeier
484f0fbafa
Fix bug #55536 : lwIP 2.1.2: netconn_delete() called twice from lwip_accept()
...
netconn is deleted in free_socket() call
(cherry picked from commit 3efc43531b
)
2019-02-18 12:58:55 +01:00
Dirk Ziegelmeier
5378fd84df
Add documentation on how to debug memory pool sizes
...
(cherry picked from commit a215eba50e
)
2019-02-18 12:58:27 +01:00
Dirk Ziegelmeier
9d8b8d9c69
TCP/UDP documentation: Add reference to PCB mempool #defines
...
(cherry picked from commit 8bf2e21b4d
)
2019-02-18 12:58:19 +01:00
Dirk Ziegelmeier
cd91647999
Fix bug #55513 : Uninitialized variable in struct netconn
...
using patch from Karol Domagalski
(cherry picked from commit 926e399355
)
2019-02-18 12:56:51 +01:00
Simon Goldschmidt
5cc46d7989
nd6: fix copying more than one DNS server
...
See bug #55163
(cherry picked from commit dcb29c591f
)
2019-02-18 12:55:33 +01:00
Dirk Ziegelmeier
fe4395336a
Fix bug #55078 : Add custom data to pbuf struct
...
Add a #define that users can use to store custom data on a pbuf
(cherry picked from commit 92a18bf638
)
2019-02-18 12:55:05 +01:00
Dirk Ziegelmeier
9d97a467ca
netbiosns_name_decode: Take CONST char* as first argument
...
(cherry picked from commit 10e0130a4a
)
2019-02-18 12:51:05 +01:00
Simon Goldschmidt
039056370d
next release in this branch will be 2.1.3
2018-11-22 21:02:32 +01:00
Simon Goldschmidt
159e31b689
Prepare 2.1.2 release
2018-11-22 20:57:02 +01:00
Simon Goldschmidt
17c60d2728
Fix CHANGELOG for 2.1.2
2018-11-22 20:56:33 +01:00
Jens Nielsen
52e75369c1
Fix netbiosns expecting too large packet
...
(cherry picked from commit b0c753da96
)
2018-11-22 11:38:31 +01:00
Dirk Ziegelmeier
66706f469d
Fix bug #55034 : apps/smtp.c fails to compile with strict C compatibility because of strnlen
...
by replacing strnlen with strlen. It's a user-supplied string, so we can assume it is correctly \0 terminated (as done several times elsewhere in the code)
(cherry picked from commit aa83bdf490
)
2018-11-19 14:48:54 +01:00
Simon Goldschmidt
98d1cb1c00
tcp_recved: fix overflow check
...
Improved fix instead of patch #9699 .
Signed-off-by: Simon Goldschmidt <goldsimon@gmx.de>
2018-11-12 20:55:23 +01:00
Simon Goldschmidt
1940cae827
Revert "tcp_recved: check for overflow and warn about too big values"
...
This reverts commit ebb0dc14a7
.
It changes the behaviour to assert for applications running good so far.
Signed-off-by: Simon Goldschmidt <goldsimon@gmx.de>
2018-11-12 20:47:01 +01:00
Simon Goldschmidt
d184463e2a
next release in this branch will be 2.1.2
2018-11-08 22:36:01 +01:00
Simon Goldschmidt
3b53b6e481
Prepare 2.1.1 release
2018-11-08 22:15:01 +01:00
Simon Goldschmidt
78ee1ee2cf
Update CHANGELOG for 2.1.1
2018-11-08 22:07:58 +01:00
Simon Goldschmidt
422623a87b
altcp_tls_mbedtls: implement mbedTLS debug output, comment fixes
2018-11-08 20:48:31 +01:00
Axel Lin
4aa6df7633
sockets: Fix missing err_to_errno conversion for ERR_VAL in lwip_recvmsg
...
Signed-off-by: Axel Lin <axel.lin@ingics.com>
(cherry picked from commit 7bcf0d3334
)
2018-11-08 16:53:40 +01:00
Joan Lledó
2d2336014c
Remove assertion about the end of pollfd array
...
See bug #54933 .
Signed-off-by: Simon Goldschmidt <goldsimon@gmx.de>
(cherry picked from commit 284659156d
)
2018-11-06 13:15:04 +01:00
Dirk Ziegelmeier
def427bcaf
Fix bug #54670 : 127.0.0.1 sent out to netif_default?
...
(cherry picked from commit 7c2267b966
)
2018-11-06 13:14:22 +01:00
Axel Lin
ba3a39957d
Fix mqtt unit test broken ebb0dc14a7
...
Fixes: ebb0dc14a7
("tcp_recved: check for overflow and warn about too big values")
Signed-off-by: Axel Lin <axel.lin@ingics.com>
Acked-by: Simon Goldschmidt <goldsimon@gmx.de>
2018-10-30 21:21:08 +08:00
Simon Goldschmidt
f58324b576
altcp_tls_mbedtls: update list of todos
...
Signed-off-by: Simon Goldschmidt <goldsimon@gmx.de>
2018-10-26 20:43:12 +02:00
David GIRAULT
205cd7c1f6
bug #54744 : if altcp_close() called from recv() callback, there is some write to freed memory
...
Signed-off-by: Simon Goldschmidt <goldsimon@gmx.de>
(cherry picked from commit 6e994f9df2
)
2018-10-26 19:59:33 +02:00
Simon Goldschmidt
398333da9a
snmp: avoid NULL pointer dereference, fix return values
2018-10-24 20:39:08 +02:00
Simon Goldschmidt
e678219bdf
snmp: fix coding style in last commit
2018-10-23 20:00:16 +02:00
Dirk Ziegelmeier
830217ac78
SNMP: Avoid NULL pointer dereference in snmp_scalar.c
2018-10-23 19:57:44 +02:00
Simon Goldschmidt
e4db22d9f5
fix missing standard includes
...
These were a problem only if arch.h does not include them.
Signed-off-by: Simon Goldschmidt <goldsimon@gmx.de>
2018-10-23 19:57:11 +02:00
Simon Goldschmidt
c8e9772cd0
This branch is for developing 2.1.x versions
2018-10-18 09:03:11 +02:00
Dirk Ziegelmeier
437b11f869
Fix bug #54850 : lwip definition of htonX and ntohX do not properly cast to unsigned when byte order is Big Endian
...
Changes suggested by Ivan Warren
2018-10-17 21:45:18 +02:00
Simon Goldschmidt
b7bee87fb5
Add a unit test for bug #54833 (tcp_abort with wrong ports)
...
Signed-off-by: Simon Goldschmidt <goldsimon@gmx.de>
2018-10-17 21:44:44 +02:00
Simon Goldschmidt
2f3ef94ad4
Fix bug #54806 (ppp: invalid LWIP_ASSERT_CORE_LOCKED() check)
...
pppos_input() is safe to call from outside tcpip_thread when
PPP_INPROC_IRQ_SAFE == 1, so only check if PPP_INPROC_IRQ_SAFE == 0
Signed-off-by: Simon Goldschmidt <goldsimon@gmx.de>
2018-10-17 21:44:30 +02:00
Simon Goldschmidt
7154e51ff2
Revert "tcp_abandon: no need to buffer pcb->local_port"
...
This reverts commit 1570dd8ad1
.
Buffering pcb->local_port is needed because TCP_PCB_REMOVE_ACTIVE()
sets it to 0 via tcp_pcb_remove() (comment: "reset the local port
to prevent the pcb from being 'bound'").
Signed-off-by: Simon Goldschmidt <goldsimon@gmx.de>
2018-10-17 21:44:20 +02:00
Jonas Rabenstein
db46863f75
err.h: move typedef of err_t after enum definition
...
This allows for 'typedef err_enum_t err_t' and thus strong type checking
of the enum in c++.
2018-10-17 21:44:04 +02:00
Jonas Rabenstein
ebb0dc14a7
tcp_recved: check for overflow and warn about too big values
2018-10-17 21:43:57 +02:00
Joan Lledó
368128a647
alloc_socket(): Check for LWIP_SOCKET_POLL when setting select-related variables
2018-10-17 21:43:34 +02:00
Dirk Ziegelmeier
bc25863d1b
Apply patch #9694 : Update prev pointer when skipping entries in tcp_slowtmr to prevent hitting assertion
2018-10-17 21:43:09 +02:00
Martine Lenders
130f947037
lowpan6.c: Fix IEEE 802.15.4 address setting
...
Reverts a regression introduced in
3a8af612b3
:
Use hardware address fetched from neighbor cache *not* the hardware
address of the interface as destination address.
Signed-off-by: Simon Goldschmidt <goldsimon@gmx.de>
2018-10-17 21:42:55 +02:00
Simon Goldschmidt
e6a8415df3
Prepare 2.1.0 release
...
Signed-off-by: Simon Goldschmidt <goldsimon@gmx.de>
2018-09-26 21:11:39 +02:00
Simon Goldschmidt
54a8112eb9
Documentation improvements for 2.1.0 (changelog, altcp)
2018-09-26 14:37:52 +02:00
Simon Goldschmidt
b9fc8cae68
Documentation improvements for 2.1.0 (mainly altcp/altcp_tls)
2018-09-24 22:44:32 +02:00
Simon Goldschmidt
a044c807f8
altcp_tls: rename altcp_tls_new -> altcp_tls_wrap, add altcp_tls_new
...
The new altcp_tls_new() is a type safe version of altcp_tls_alloc()
Signed-off-by: Simon Goldschmidt <goldsimon@gmx.de>
2018-09-24 22:29:54 +02:00
Simon Goldschmidt
6229f9ef71
icmp_send_response: fix parameter order for LWIP_HOOK_IP4_ROUTE_SRC
2018-09-17 21:28:50 +02:00
Simon Goldschmidt
66838a70f3
more documentation preparations for v2.1.0 release
2018-09-17 21:16:58 +02:00
Simon Goldschmidt
dea74a24aa
Fix CHANGELOG consistency from 2.0.3 branch to 2.1.0
2018-09-16 21:41:33 +02:00