aboutsummaryrefslogtreecommitdiff
path: root/src
Commit message (Collapse)AuthorAge
* mbedtls: reduce logging for debug crypto to debug logGarrett D'Amore2025-09-14
| | | | Warning level was just too noisy.
* dtls - additional test casesGarrett D'Amore2025-09-14
|
* dtls: use nng_err instead of int everywhereGarrett D'Amore2025-09-14
|
* Bump socket common socket stats for PUBGarrett D'Amore2025-09-09
|
* fixes #2148 Old id_reg_map seems not be freedGarrett D'Amore2025-08-25
| | | | | This simplifies the code to just use a precompiled static list. This should be lighter weight, and provably free from leaks.
* MbedTLS: CLOSE NOTIFY is not not really an error.Garrett D'Amore2025-08-25
| | | | The ECONNREFUSED result was causing consternation for some consumers.
* fixes #2150 build error if HTTP support is disabled.Garrett D'Amore2025-08-24
|
* Disable illumos event ports until we can debug them.Garrett D'Amore2025-08-24
|
* Improve tests for SUNOS socketpair.Garrett D'Amore2025-08-24
|
* Add zone.h for illumos zones.Garrett D'Amore2025-08-24
|
* OmniOS fixes.Garrett D'Amore2025-08-24
| | | | | It is a bit of a mystery how we were passing CI/CD with all these problems. Probably we were falling back to select/poll instead of using ports.
* Fix build error on omnios.Garrett D'Amore2025-08-24
|
* Fix omnios clang-19 not foundGarrett D'Amore2025-08-24
|
* Minor spelling fixes.Garrett D'Amore2025-08-24
|
* fixes #2146 need statistics for PUB protocolGarrett D'Amore2025-08-24
|
* dtls: only run the completion if we actually cancelledv2.0.0-alpha.5Garrett D'Amore2025-07-13
|
* DTLS: hold tls configurationGarrett D'Amore2025-07-13
|
* TLS: eliminate more runtime ops vectorsGarrett D'Amore2025-06-30
|
* TLS: Configuration does not need to keep a reference to the engine.Garrett D'Amore2025-06-29
| | | | This may resolve a surprising NULL pointer dereference.
* posix tcp: use after free in listener (need to stop before free)Garrett D'Amore2025-06-22
|
* TLS: fixes for test coverage and improved identification logging.Garrett D'Amore2025-06-22
|
* Hold the pipe across for the DTLS rx cb.Garrett D'Amore2025-06-22
|
* dtls: stop the pipe to solve use after freeGarrett D'Amore2025-06-21
|
* TLS: Remove support for dynamic engine initialization.Garrett D'Amore2025-06-21
| | | | | This saves some atomic lookups, and avoids possible races when the engine is not yet initialized or being torn down.
* Drop mbedtls CTR_DRBG pseudo-random number generator.Garrett D'Amore2025-06-21
| | | | | We never use or test this code, and its better to not have it if nobody is using it.
* tls: false is not a numberGarrett D'Amore2025-06-21
|
* UDP: Signficant refactoring and simplification.Garrett D'Amore2025-06-08
| | | | | | | | | | | | | | This work is inspired by the DTLS work, and harmonizes the UDP implementation with DTLS somewhat. This should make it more resilient to failures, although there is no longer any attempt to guard against sequencing (reorders, dupes) errors. Applications that need such protection should either add it themselves, or use a transport which provides that guarantee (such as TCP). Note that with devices and and such in the way, such guarantees have never been perfect with SP anyway. The UDP transport header sizes for this are now just 8 bytes (beyond the UDP header itself.
* UDP: constify sockaddrs in some placesGarrett D'Amore2025-06-07
|
* fixes mbedtls 3.6.3 handshake with NULL server nameelijahr2025-06-02
| | | | | | | | | | | | | | | | An explicit call to `mbedtls_ssl_set_hostname(NULL)` is now required if the hostname should not be verified in handshake. From the mbedtls changelog: ``` = Mbed TLS 3.6.3 branch released 2025-03-24 Default behavior changes * In TLS clients, if mbedtls_ssl_set_hostname() has not been called, mbedtls_ssl_handshake() now fails with MBEDTLS_ERR_SSL_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME if certificate-based authentication of the server is attempted. This is because authenticating a server without knowing what name to expect is usually insecure. To restore the old behavior, either call mbedtls_ssl_set_hostname() with NULL as the hostname, or enable the new compile-time option MBEDTLS_SSL_CLI_ALLOW_WEAK_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME. ```
* Fix typos across docs, comments, and CMakemochalins2025-06-02
|
* Add test coverage for new sockaddr functions.Garrett D'Amore2025-06-01
|
* Introduce DTLS transport for NNG.Garrett D'Amore2025-06-01
| | | | | | | | | | | | | This introduces a new experimental transport for DTLS, that provides encryption over UDP. It has a simpler protocol than the current UDP SP protocol (but we intend to fix that by making the UDP transport simpler in a follow up!) There are a few other fixes in the TLS layer itself, and in the build, that were needed to accomplish this work. Also there was an endianness bug in the UDP protocol handling, which is fixed here.
* Add new nng_sockaddr_equal and nng_sockaddr_hash functions.Garrett D'Amore2025-05-26
| | | | | These are intended for new transports. Right now they are not documented, but that will be addressed soon.
* Fix possible overrun in url test.Garrett D'Amore2025-05-26
|
* Fix valgrind uninitialized complaint in UDP test.Garrett D'Amore2025-05-26
|
* Converted rest of transports to nng_err.Garrett D'Amore2025-04-27
|
* Converted property functions to use nng_err.Garrett D'Amore2025-04-27
|
* Transport listen: use nng_errGarrett D'Amore2025-04-27
|
* nng_device should use nng_errGarrett D'Amore2025-04-27
|
* More nng_err -- this time for dialer and listener allocations.Garrett D'Amore2025-04-27
|
* AIO: Use nng_err for cancellation callback instead of int.Garrett D'Amore2025-04-27
| | | | | | This is part of our work to improve type safety/awareness, and also improve debugger support, for NNG error codes. There are still quite a few more but this should help.
* Tests: remove the legacy wss transport test and framework support for Convey ↵Garrett D'Amore2025-04-27
| | | | | | | transport tests This has been needed for some time; the convey framework is not reliable or debuggable, and will ultimately be removed. Only the http client test remains using it.
* tests: Add wss_test following pattern of TLS test.Garrett D'Amore2025-04-27
| | | | This replaces the convey style test.
* Fix typos in TLS test names.Garrett D'Amore2025-04-27
|
* TLS: break up the TLS layer a bit to refactor for DTLS.Garrett D'Amore2025-04-27
| | | | | | | | | | | This allows us to break the assumption that the bottom half is TCP, or even an nng_stream, since the DTLS layer will use a totally different layer. Only nng_stream neeeds to support dial and listen. Also: UDP: Make the sockaddr arguments to open const. Also: Align the IPv6 address in the sockaddr (this allows for efficient 64-bit or even 128-bit operations on these values.)
* fix aio_reap_list use of nni_aio_free() pointer to incorrect function type ↵shikokuchuo2025-04-27
| | | | UBSAN warning
* Make pointers to data that is not modified const. (#2117)Søren Holm2025-04-27
| | | | | | This allow to pass constrant string i particular and constant data in general to nng functions. Co-authored-by: Garrett D'Amore <garrett@damore.org>
* * FIX [HTTP] fix a blocking case when freeing http clientJaylin2025-04-27
| | | basically when aio timeout before the connaio of dialer, and users try to free the http_client obj will end in infinite blocking at nni_http_client_fini. Possibly at nni_aio_free(c->aio); or nng_stream_dialer_free(c->dialer); Both racing case is due to the ingnored aio aborting here. Because the aio_begin is called before it is put into the nni_list. I assume you shall abort it no matter if it is in the dialing list.
* Set server name for TLS test.Garrett D'Amore2025-04-19
|
* Fix typo in NNG_TLS_MAX_RECV_SIZEGarrett D'Amore2025-04-13
|