aboutsummaryrefslogtreecommitdiff
path: root/src/sp/transport/dtls
Commit message (Collapse)AuthorAge
* dtls: add multi pub sub test (does not pass reliably)Garrett D'Amore2025-10-25
| | | | This test lets us observe failures in the transport, which we need resolve.
* fixes #2173 New TLS cert API - replaces the properties for CN and ALTNAMES.Garrett D'Amore2025-10-05
| | | | | | This will replace the NNG_OPT_TLS_PEER_ALTNAMES and NNG_OPT_TLS_PEER_CN properties, and gives a bit more access to the certificate, as well as direct access to the raw DER form, which should allow use in other APIs.
* Various header file fixes... also fix compilation errors when HTTP is disabled.v2.0.0-alpha.6Garrett D'Amore2025-10-05
| | | | | | Also, some instances nni_aio are changed to nng_aio. We think we want to harmonize some of these types going forward as it will reduce the need to include headers hopefully letting us get away with just "defs.h" in more places.
* dtls: Add a test for "large" (1K) messagesGarrett D'Amore2025-09-28
|
* Fix dtls reconnect attempts.Garrett D'Amore2025-09-14
| | | | | | Once a DTLS client is started and has reasonably resolved things, it will restart message connections; this way we can restart after a failed connection attempt (e.g. if the CERT was bad or something.)
* dtls - additional test casesGarrett D'Amore2025-09-14
|
* dtls: use nng_err instead of int everywhereGarrett D'Amore2025-09-14
|
* dtls: only run the completion if we actually cancelledv2.0.0-alpha.5Garrett D'Amore2025-07-13
|
* DTLS: hold tls configurationGarrett D'Amore2025-07-13
|
* Hold the pipe across for the DTLS rx cb.Garrett D'Amore2025-06-22
|
* dtls: stop the pipe to solve use after freeGarrett D'Amore2025-06-21
|
* Introduce DTLS transport for NNG.Garrett D'Amore2025-06-01
This introduces a new experimental transport for DTLS, that provides encryption over UDP. It has a simpler protocol than the current UDP SP protocol (but we intend to fix that by making the UDP transport simpler in a follow up!) There are a few other fixes in the TLS layer itself, and in the build, that were needed to accomplish this work. Also there was an endianness bug in the UDP protocol handling, which is fixed here.