Dirk Ziegelmeier
8faf765632
Fix bug #52059 : httpd/makefsdata assumes UNICODE
...
Patch by Gisle Vanem
And fixup one variable name (currName -> curName)
2017-09-20 12:41:31 +02:00
Jisu Kim
6447a583e2
ipv6 ready: When there are more fragments(Mbit is not zero), payload_length field in IPV6 header must be the multiple of 8 (see patch #9455 )
...
Signed-off-by: goldsimon <goldsimon@gmx.de>
2017-09-19 14:29:27 +02:00
Jisu Kim
fa11461f84
ipv6 ready: Added exception handling to parse a routing header (see patch #9455 )
...
Signed-off-by: goldsimon <goldsimon@gmx.de>
2017-09-19 14:21:10 +02:00
Jisu Kim
675c6e4428
ipv6 ready: Hop-by-Hop and destination option header must be checked more detailed (see patch #9455 )
...
Hop-by-Hop, Destination option header structures consist of 2 unsigned char; next option type and header length field.
And TLV(Type-Length-Value) option headers come by the number in header length field.
If the option type in TLV option header is not recognized and 2 MSB is not 0, it is handled as an exception.
Signed-off-by: goldsimon <goldsimon@gmx.de>
2017-09-19 14:18:38 +02:00
Jisu Kim
72171c12b5
ipv6 ready: Hop-by-Hop and destination option header must be checked more detailed (see patch #9455 )
...
Hop-by-Hop, Destination option header structures consist of 2 unsigned char; next option type and header length field.
And TLV(Type-Length-Value) option headers come by the number in header length field.
If the option type in TLV option header is not recognized and 2 MSB is not 0, it is handled as an exception.
Signed-off-by: goldsimon <goldsimon@gmx.de>
2017-09-19 14:12:10 +02:00
Jisu Kim
acb4b60517
ipv6 ready: icmp6_param_problem() should send an exact offset to point to the error (see patch #9455 )
...
For this, convert 'u8_t nexth' to a pointer and change 'icmp6_param_problem()' to take a pointer, not an offset number
Signed-off-by: goldsimon <goldsimon@gmx.de>
2017-09-19 14:11:30 +02:00
Jisu Kim
7b27df1b83
ipv6 ready: clean up ipv6 header structs and add more header types & defines (see patch #9455 )
...
Signed-off-by: goldsimon <goldsimon@gmx.de>
2017-09-19 14:08:16 +02:00
goldsimon
6d1c067719
tabs -> spaces
2017-09-19 09:20:40 +02:00
Dirk Ziegelmeier
931b5e643c
Reformat core code using astylerc
2017-09-17 20:38:38 +02:00
Dirk Ziegelmeier
8c59be74c1
Reformat IPv4 code using astylerc
2017-09-17 20:33:27 +02:00
Dirk Ziegelmeier
3ed24085fa
Reformat SNMP code using astylerc
2017-09-17 20:29:18 +02:00
Dirk Ziegelmeier
6e7fe4520a
Reformat tftp_server.c using astylerc
2017-09-17 18:08:43 +02:00
Dirk Ziegelmeier
2ab73ad572
Reformat sntp.c using astylerc
2017-09-17 18:07:26 +02:00
Dirk Ziegelmeier
52d65ed1d0
Reformat netbiosns.c using astylerc
2017-09-17 18:05:07 +02:00
Dirk Ziegelmeier
be5bcc172d
Reformat mqtt.c using astylerc
2017-09-17 18:04:29 +02:00
Dirk Ziegelmeier
914a20728e
Reformat mdns.c using astylerc
2017-09-17 18:00:33 +02:00
Dirk Ziegelmeier
014420bfa0
Reformat lwiperf.c using astylerc
2017-09-17 18:00:23 +02:00
Dirk Ziegelmeier
6164f0cd34
Reformat httpd* using astylerc
2017-09-17 17:58:36 +02:00
Dirk Ziegelmeier
c35b1099a4
Reformat altcp_tls_mbedtls* using astylerc
2017-09-17 17:52:44 +02:00
Dirk Ziegelmeier
438cfd3f14
Reformat sockets.c using astylerc
2017-09-17 17:50:24 +02:00
Dirk Ziegelmeier
fa33db1448
Reformat tcpip.c using astylerc
2017-09-17 17:50:24 +02:00
Dirk Ziegelmeier
dc9115334e
Reformat netifapi.c using astylerc
2017-09-17 17:50:24 +02:00
Dirk Ziegelmeier
771ac7ac44
Reformat netdb.c using astylerc
2017-09-17 17:50:24 +02:00
Dirk Ziegelmeier
bfae233e3e
Reformat netbuf.c using astylerc
2017-09-17 17:50:24 +02:00
Dirk Ziegelmeier
3d60024f9b
Reformat if_api.c using astylerc
2017-09-17 17:50:24 +02:00
Dirk Ziegelmeier
75847c8b4d
Reformat err.c using astylerc
2017-09-17 17:50:24 +02:00
Dirk Ziegelmeier
2b977a4a6a
Reformat api_msg.c using astylerc
2017-09-17 17:50:24 +02:00
Dirk Ziegelmeier
30152cea78
Reformat api_lib.c using astylerc
2017-09-17 17:50:24 +02:00
dziegel
cdbba6e0d8
Make astylerc compatible to astyle 2.x
2017-09-17 17:50:24 +02:00
Jisu Kim
bd94297115
icmp6_send_response() sends the pointer in network byte order (see patch #9455 : IPv6 ready test on RFC2460)
...
Signed-off-by: goldsimon <goldsimon@gmx.de>
2017-09-16 22:46:42 +02:00
goldsimon
ab1c9548e0
Increase IPv4 reassembly timeout according to RFC 791
2017-09-16 22:43:12 +02:00
Jisu Kim
27b7ed17fc
First step to passing IPV6 Ready test: time out IPv6 fragments after 60 seconds
...
(added IPV6_REASS_MAXAGE as an option that is independent of the IPv4 setting)
Signed-off-by: goldsimon <goldsimon@gmx.de>
2017-09-16 22:41:35 +02:00
Joel Cunningham
67bf0a6d0a
CHANGELOG: add bug #51990
2017-09-15 08:27:18 -05:00
goldsimon
c5c98cbb00
Fix UPGRADING: slipif change has been released with 2.0.2 already
2017-09-15 13:09:09 +02:00
goldsimon
14919e34a1
icmp_input: fix possibly unused variable (used for debug output only)
2017-09-15 11:44:22 +02:00
Joel Cunningham
5c0054d8ee
Remove double free on select_cb (bug #51990 )
...
This was left over after the refactoring in 92b6f83eb2
2017-09-13 16:51:03 -05:00
goldsimon
7ba479e482
Try to fix clang runtime errors during unit tests (see bug #51652 )
2017-09-12 21:51:50 +02:00
goldsimon
92b6f83eb2
Slightly rework the fix for bug #51990 : allocate select_cb only if we actually need to wait
2017-09-12 21:37:48 +02:00
David Lockyer
72a00ca79c
Fixed bug #51990 : Calling select() from different threads with MPU enabled triggers memory protection fault
...
Signed-off-by: goldsimon <goldsimon@gmx.de>
2017-09-12 21:19:54 +02:00
Joel Cunningham
445eef2b0e
sockets: add readv() implementation (task #14610 )
...
Adds an implementation of readv() that calls recvmsg()
See http://pubs.opengroup.org/onlinepubs/009695399/functions/readv.html
2017-09-11 14:48:33 -05:00
goldsimon
558480a5b9
add bug #51937 to CHANGELOG
2017-09-11 21:37:28 +02:00
goldsimon
630c4a3de3
try to fix building unit test on gcc/clang
2017-09-11 11:10:42 +02:00
Jakub Schmidtke
b7e5de389e
Fixed removing unneeded TCP SACKs
...
TCP SACKs were removed after some changes in the ooseq queue,
but before all unneeded packets were removed from it.
Because of that, we would sometimes include SACKs
for data already delivered in-order.
Signed-off-by: goldsimon <goldsimon@gmx.de>
2017-09-09 21:51:13 +02:00
goldsimon
86abfbe087
Fix bug #51937 by checking TF_CLOSED at the end of all pcb callbacks in tcp_input()
2017-09-09 21:46:41 +02:00
goldsimon
a8ac37f419
refactor tcp_input a bit in preparation of a fix for bug #51937
2017-09-09 21:41:06 +02:00
goldsimon
48c687ea84
tcp_remove_all() (used in tcp test setup/teardown): handle tcp_bound_pcbs, too
2017-09-05 22:20:44 +02:00
goldsimon
cf651e7e0f
add test case that shows what's wrong for bug #51937 (Leaking tcp_pcbs on passive close with unacked data)
2017-09-05 22:19:38 +02:00
goldsimon
fca38fda1a
remove unnecessary lines from last added test case
2017-09-05 22:18:52 +02:00
goldsimon
8c04009357
add unit test case for passive open & (invalid) bug #51941
2017-09-05 21:47:06 +02:00
Our Air Quality
dc7a9c8c37
tcp_in: correct some loops continuing without maintaining a prev pointer.
...
This problem would appear to have only affected systems with multiple
interfaces. It was noted causing tcp resets when the pcb was lost, and there
might have been other associated problems.
Signed-off-by: Dirk Ziegelmeier <dirk@ziegelmeier.net>
2017-09-04 07:48:37 +02:00