| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453 |
- /* CoAP client Example
- This example code is in the Public Domain (or CC0 licensed, at your option.)
- Unless required by applicable law or agreed to in writing, this
- software is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
- CONDITIONS OF ANY KIND, either express or implied.
- */
- /*
- * WARNING
- * libcoap is not multi-thread safe, so only this thread must make any coap_*()
- * calls. Any external (to this thread) data transmitted in/out via libcoap
- * therefore has to be passed in/out by xQueue*() via this thread.
- */
- #include <string.h>
- #include <sys/socket.h>
- #include <netdb.h>
- #include <sys/param.h>
- #include "freertos/FreeRTOS.h"
- #include "freertos/task.h"
- #include "freertos/event_groups.h"
- #include "esp_log.h"
- #include "esp_wifi.h"
- #include "esp_event.h"
- #include "nvs_flash.h"
- #include "protocol_examples_common.h"
- #if 1
- /* Needed until coap_dtls.h becomes a part of libcoap proper */
- #include "libcoap.h"
- #include "coap_dtls.h"
- #endif
- #include "coap.h"
- #define COAP_DEFAULT_TIME_SEC 5
- /* The examples use simple Pre-Shared-Key configuration that you can set via
- 'make menuconfig'.
- If you'd rather not, just change the below entries to strings with
- the config you want - ie #define EXAMPLE_COAP_PSK_KEY "some-agreed-preshared-key"
- Note: PSK will only be used if the URI is prefixed with coaps://
- instead of coap:// and the PSK must be one that the server supports
- (potentially associated with the IDENTITY)
- */
- #define EXAMPLE_COAP_PSK_KEY CONFIG_EXAMPLE_COAP_PSK_KEY
- #define EXAMPLE_COAP_PSK_IDENTITY CONFIG_EXAMPLE_COAP_PSK_IDENTITY
- /* The examples use uri Logging Level that
- you can set via 'make menuconfig'.
- If you'd rather not, just change the below entry to a value
- that is between 0 and 7 with
- the config you want - ie #define EXAMPLE_COAP_LOG_DEFAULT_LEVEL 7
- */
- #define EXAMPLE_COAP_LOG_DEFAULT_LEVEL CONFIG_COAP_LOG_DEFAULT_LEVEL
- /* The examples use uri "coap://californium.eclipse.org" that
- you can set via the project configuration (idf.py menuconfig)
- If you'd rather not, just change the below entries to strings with
- the config you want - ie #define COAP_DEFAULT_DEMO_URI "coaps://californium.eclipse.org"
- */
- #define COAP_DEFAULT_DEMO_URI CONFIG_EXAMPLE_TARGET_DOMAIN_URI
- const static char *TAG = "CoAP_client";
- static int resp_wait = 1;
- static coap_optlist_t *optlist = NULL;
- static int wait_ms;
- #ifdef CONFIG_COAP_MBEDTLS_PKI
- /* CA cert, taken from coap_ca.pem
- Client cert, taken from coap_client.crt
- Client key, taken from coap_client.key
- The PEM, CRT and KEY file are examples taken from the wpa2 enterprise
- example.
- To embed it in the app binary, the PEM, CRT and KEY file is named
- in the component.mk COMPONENT_EMBED_TXTFILES variable.
- */
- extern uint8_t ca_pem_start[] asm("_binary_coap_ca_pem_start");
- extern uint8_t ca_pem_end[] asm("_binary_coap_ca_pem_end");
- extern uint8_t client_crt_start[] asm("_binary_coap_client_crt_start");
- extern uint8_t client_crt_end[] asm("_binary_coap_client_crt_end");
- extern uint8_t client_key_start[] asm("_binary_coap_client_key_start");
- extern uint8_t client_key_end[] asm("_binary_coap_client_key_end");
- #endif /* CONFIG_COAP_MBEDTLS_PKI */
- static void message_handler(coap_context_t *ctx, coap_session_t *session,
- coap_pdu_t *sent, coap_pdu_t *received,
- const coap_tid_t id)
- {
- unsigned char *data = NULL;
- size_t data_len;
- coap_pdu_t *pdu = NULL;
- coap_opt_t *block_opt;
- coap_opt_iterator_t opt_iter;
- unsigned char buf[4];
- coap_optlist_t *option;
- coap_tid_t tid;
- if (COAP_RESPONSE_CLASS(received->code) == 2) {
- /* Need to see if blocked response */
- block_opt = coap_check_option(received, COAP_OPTION_BLOCK2, &opt_iter);
- if (block_opt) {
- uint16_t blktype = opt_iter.type;
- if (coap_opt_block_num(block_opt) == 0) {
- printf("Received:\n");
- }
- if (coap_get_data(received, &data_len, &data)) {
- printf("%.*s", (int)data_len, data);
- }
- if (COAP_OPT_BLOCK_MORE(block_opt)) {
- /* more bit is set */
- /* create pdu with request for next block */
- pdu = coap_new_pdu(session);
- if (!pdu) {
- ESP_LOGE(TAG, "coap_new_pdu() failed");
- goto clean_up;
- }
- pdu->type = COAP_MESSAGE_CON;
- pdu->tid = coap_new_message_id(session);
- pdu->code = COAP_REQUEST_GET;
- /* add URI components from optlist */
- for (option = optlist; option; option = option->next ) {
- switch (option->number) {
- case COAP_OPTION_URI_HOST :
- case COAP_OPTION_URI_PORT :
- case COAP_OPTION_URI_PATH :
- case COAP_OPTION_URI_QUERY :
- coap_add_option(pdu, option->number, option->length,
- option->data);
- break;
- default:
- ; /* skip other options */
- }
- }
- /* finally add updated block option from response, clear M bit */
- /* blocknr = (blocknr & 0xfffffff7) + 0x10; */
- coap_add_option(pdu,
- blktype,
- coap_encode_var_safe(buf, sizeof(buf),
- ((coap_opt_block_num(block_opt) + 1) << 4) |
- COAP_OPT_BLOCK_SZX(block_opt)), buf);
- tid = coap_send(session, pdu);
- if (tid != COAP_INVALID_TID) {
- resp_wait = 1;
- wait_ms = COAP_DEFAULT_TIME_SEC * 1000;
- return;
- }
- }
- printf("\n");
- } else {
- if (coap_get_data(received, &data_len, &data)) {
- printf("Received: %.*s\n", (int)data_len, data);
- }
- }
- }
- clean_up:
- resp_wait = 0;
- }
- #ifdef CONFIG_COAP_MBEDTLS_PKI
- static int
- verify_cn_callback(const char *cn,
- const uint8_t *asn1_public_cert,
- size_t asn1_length,
- coap_session_t *session,
- unsigned depth,
- int validated,
- void *arg
- )
- {
- coap_log(LOG_INFO, "CN '%s' presented by server (%s)\n",
- cn, depth ? "CA" : "Certificate");
- return 1;
- }
- #endif /* CONFIG_COAP_MBEDTLS_PKI */
- static void coap_example_client(void *p)
- {
- struct hostent *hp;
- coap_address_t dst_addr;
- static coap_uri_t uri;
- const char *server_uri = COAP_DEFAULT_DEMO_URI;
- char *phostname = NULL;
- coap_set_log_level(EXAMPLE_COAP_LOG_DEFAULT_LEVEL);
- while (1) {
- #define BUFSIZE 40
- unsigned char _buf[BUFSIZE];
- unsigned char *buf;
- size_t buflen;
- int res;
- coap_context_t *ctx = NULL;
- coap_session_t *session = NULL;
- coap_pdu_t *request = NULL;
- optlist = NULL;
- if (coap_split_uri((const uint8_t *)server_uri, strlen(server_uri), &uri) == -1) {
- ESP_LOGE(TAG, "CoAP server uri error");
- break;
- }
- if (uri.scheme == COAP_URI_SCHEME_COAPS && !coap_dtls_is_supported()) {
- ESP_LOGE(TAG, "MbedTLS (D)TLS Client Mode not configured");
- break;
- }
- if (uri.scheme == COAP_URI_SCHEME_COAPS_TCP && !coap_tls_is_supported()) {
- ESP_LOGE(TAG, "CoAP server uri coaps+tcp:// scheme is not supported");
- break;
- }
- phostname = (char *)calloc(1, uri.host.length + 1);
- if (phostname == NULL) {
- ESP_LOGE(TAG, "calloc failed");
- break;
- }
- memcpy(phostname, uri.host.s, uri.host.length);
- hp = gethostbyname(phostname);
- free(phostname);
- if (hp == NULL) {
- ESP_LOGE(TAG, "DNS lookup failed");
- vTaskDelay(1000 / portTICK_PERIOD_MS);
- free(phostname);
- continue;
- }
- char tmpbuf[INET6_ADDRSTRLEN];
- coap_address_init(&dst_addr);
- switch (hp->h_addrtype) {
- case AF_INET:
- dst_addr.addr.sin.sin_family = AF_INET;
- dst_addr.addr.sin.sin_port = htons(uri.port);
- memcpy(&dst_addr.addr.sin.sin_addr, hp->h_addr, sizeof(dst_addr.addr.sin.sin_addr));
- inet_ntop(AF_INET, &dst_addr.addr.sin.sin_addr, tmpbuf, sizeof(tmpbuf));
- ESP_LOGI(TAG, "DNS lookup succeeded. IP=%s", tmpbuf);
- break;
- case AF_INET6:
- dst_addr.addr.sin6.sin6_family = AF_INET6;
- dst_addr.addr.sin6.sin6_port = htons(uri.port);
- memcpy(&dst_addr.addr.sin6.sin6_addr, hp->h_addr, sizeof(dst_addr.addr.sin6.sin6_addr));
- inet_ntop(AF_INET6, &dst_addr.addr.sin6.sin6_addr, tmpbuf, sizeof(tmpbuf));
- ESP_LOGI(TAG, "DNS lookup succeeded. IP=%s", tmpbuf);
- break;
- default:
- ESP_LOGE(TAG, "DNS lookup response failed");
- goto clean_up;
- }
- if (uri.path.length) {
- buflen = BUFSIZE;
- buf = _buf;
- res = coap_split_path(uri.path.s, uri.path.length, buf, &buflen);
- while (res--) {
- coap_insert_optlist(&optlist,
- coap_new_optlist(COAP_OPTION_URI_PATH,
- coap_opt_length(buf),
- coap_opt_value(buf)));
- buf += coap_opt_size(buf);
- }
- }
- if (uri.query.length) {
- buflen = BUFSIZE;
- buf = _buf;
- res = coap_split_query(uri.query.s, uri.query.length, buf, &buflen);
- while (res--) {
- coap_insert_optlist(&optlist,
- coap_new_optlist(COAP_OPTION_URI_QUERY,
- coap_opt_length(buf),
- coap_opt_value(buf)));
- buf += coap_opt_size(buf);
- }
- }
- ctx = coap_new_context(NULL);
- if (!ctx) {
- ESP_LOGE(TAG, "coap_new_context() failed");
- goto clean_up;
- }
- /*
- * Note that if the URI starts with just coap:// (not coaps://) the
- * session will still be plain text.
- *
- * coaps+tcp:// is NOT supported by the libcoap->mbedtls interface
- * so COAP_URI_SCHEME_COAPS_TCP will have failed in a test above,
- * but the code is left in for completeness.
- */
- if (uri.scheme == COAP_URI_SCHEME_COAPS || uri.scheme == COAP_URI_SCHEME_COAPS_TCP) {
- #ifndef CONFIG_MBEDTLS_TLS_CLIENT
- ESP_LOGE(TAG, "MbedTLS (D)TLS Client Mode not configured");
- goto clean_up;
- #endif /* CONFIG_MBEDTLS_TLS_CLIENT */
- #ifdef CONFIG_COAP_MBEDTLS_PSK
- session = coap_new_client_session_psk(ctx, NULL, &dst_addr,
- uri.scheme == COAP_URI_SCHEME_COAPS ? COAP_PROTO_DTLS : COAP_PROTO_TLS,
- EXAMPLE_COAP_PSK_IDENTITY,
- (const uint8_t *)EXAMPLE_COAP_PSK_KEY,
- sizeof(EXAMPLE_COAP_PSK_KEY) - 1);
- #endif /* CONFIG_COAP_MBEDTLS_PSK */
- #ifdef CONFIG_COAP_MBEDTLS_PKI
- unsigned int ca_pem_bytes = ca_pem_end - ca_pem_start;
- unsigned int client_crt_bytes = client_crt_end - client_crt_start;
- unsigned int client_key_bytes = client_key_end - client_key_start;
- coap_dtls_pki_t dtls_pki;
- static char client_sni[256];
- memset (&dtls_pki, 0, sizeof(dtls_pki));
- dtls_pki.version = COAP_DTLS_PKI_SETUP_VERSION;
- if (ca_pem_bytes) {
- /*
- * Add in additional certificate checking.
- * This list of enabled can be tuned for the specific
- * requirements - see 'man coap_encryption'.
- *
- * Note: A list of root ca file can be setup separately using
- * coap_context_set_pki_root_cas(), but the below is used to
- * define what checking actually takes place.
- */
- dtls_pki.verify_peer_cert = 1;
- dtls_pki.require_peer_cert = 1;
- dtls_pki.allow_self_signed = 1;
- dtls_pki.allow_expired_certs = 1;
- dtls_pki.cert_chain_validation = 1;
- dtls_pki.cert_chain_verify_depth = 2;
- dtls_pki.check_cert_revocation = 1;
- dtls_pki.allow_no_crl = 1;
- dtls_pki.allow_expired_crl = 1;
- dtls_pki.allow_bad_md_hash = 1;
- dtls_pki.allow_short_rsa_length = 1;
- dtls_pki.validate_cn_call_back = verify_cn_callback;
- dtls_pki.cn_call_back_arg = NULL;
- dtls_pki.validate_sni_call_back = NULL;
- dtls_pki.sni_call_back_arg = NULL;
- memset(client_sni, 0, sizeof(client_sni));
- if (uri.host.length) {
- memcpy(client_sni, uri.host.s, MIN(uri.host.length, sizeof(client_sni)));
- } else {
- memcpy(client_sni, "localhost", 9);
- }
- dtls_pki.client_sni = client_sni;
- }
- dtls_pki.pki_key.key_type = COAP_PKI_KEY_PEM_BUF;
- dtls_pki.pki_key.key.pem_buf.public_cert = client_crt_start;
- dtls_pki.pki_key.key.pem_buf.public_cert_len = client_crt_bytes;
- dtls_pki.pki_key.key.pem_buf.private_key = client_key_start;
- dtls_pki.pki_key.key.pem_buf.private_key_len = client_key_bytes;
- dtls_pki.pki_key.key.pem_buf.ca_cert = ca_pem_start;
- dtls_pki.pki_key.key.pem_buf.ca_cert_len = ca_pem_bytes;
- session = coap_new_client_session_pki(ctx, NULL, &dst_addr,
- uri.scheme == COAP_URI_SCHEME_COAPS ? COAP_PROTO_DTLS : COAP_PROTO_TLS,
- &dtls_pki);
- #endif /* CONFIG_COAP_MBEDTLS_PKI */
- } else {
- session = coap_new_client_session(ctx, NULL, &dst_addr,
- uri.scheme == COAP_URI_SCHEME_COAP_TCP ? COAP_PROTO_TCP :
- COAP_PROTO_UDP);
- }
- if (!session) {
- ESP_LOGE(TAG, "coap_new_client_session() failed");
- goto clean_up;
- }
- coap_register_response_handler(ctx, message_handler);
- request = coap_new_pdu(session);
- if (!request) {
- ESP_LOGE(TAG, "coap_new_pdu() failed");
- goto clean_up;
- }
- request->type = COAP_MESSAGE_CON;
- request->tid = coap_new_message_id(session);
- request->code = COAP_REQUEST_GET;
- coap_add_optlist_pdu(request, &optlist);
- resp_wait = 1;
- coap_send(session, request);
- wait_ms = COAP_DEFAULT_TIME_SEC * 1000;
- while (resp_wait) {
- int result = coap_run_once(ctx, wait_ms > 1000 ? 1000 : wait_ms);
- if (result >= 0) {
- if (result >= wait_ms) {
- ESP_LOGE(TAG, "select timeout");
- break;
- } else {
- wait_ms -= result;
- }
- }
- }
- clean_up:
- if (optlist) {
- coap_delete_optlist(optlist);
- optlist = NULL;
- }
- if (session) {
- coap_session_release(session);
- }
- if (ctx) {
- coap_free_context(ctx);
- }
- coap_cleanup();
- /*
- * change the following line to something like sleep(2)
- * if you want the request to continually be sent
- */
- break;
- }
- vTaskDelete(NULL);
- }
- void app_main(void)
- {
- ESP_ERROR_CHECK( nvs_flash_init() );
- ESP_ERROR_CHECK(esp_netif_init());
- ESP_ERROR_CHECK(esp_event_loop_create_default());
- /* This helper function configures Wi-Fi or Ethernet, as selected in menuconfig.
- * Read "Establishing Wi-Fi or Ethernet Connection" section in
- * examples/protocols/README.md for more information about this function.
- */
- ESP_ERROR_CHECK(example_connect());
- xTaskCreate(coap_example_client, "coap", 8 * 1024, NULL, 5, NULL);
- }
|