2016-12-10 00:48:38 -05:00
|
|
|
/* CoAP server Example
|
|
|
|
|
|
|
|
This example code is in the Public Domain (or CC0 licensed, at your option.)
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, this
|
|
|
|
software is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
|
|
|
|
CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
*/
|
|
|
|
|
2019-04-13 07:15:28 -04:00
|
|
|
/*
|
|
|
|
* WARNING
|
|
|
|
* libcoap is not multi-thread safe, so only this thread must make any coap_*()
|
|
|
|
* calls. Any external (to this thread) data transmitted in/out via libcoap
|
|
|
|
* therefore has to be passed in/out by xQueue*() via this thread.
|
|
|
|
*/
|
|
|
|
|
2016-12-10 00:48:38 -05:00
|
|
|
#include <string.h>
|
2017-01-06 05:42:46 -05:00
|
|
|
#include <sys/socket.h>
|
2016-12-10 00:48:38 -05:00
|
|
|
|
|
|
|
#include "freertos/FreeRTOS.h"
|
|
|
|
#include "freertos/task.h"
|
|
|
|
#include "freertos/event_groups.h"
|
|
|
|
|
|
|
|
#include "esp_log.h"
|
|
|
|
#include "esp_wifi.h"
|
2018-11-20 11:43:52 -05:00
|
|
|
#include "esp_event.h"
|
2016-12-10 00:48:38 -05:00
|
|
|
|
|
|
|
#include "nvs_flash.h"
|
|
|
|
|
2018-11-20 11:43:52 -05:00
|
|
|
#include "protocol_examples_common.h"
|
2017-01-06 05:42:46 -05:00
|
|
|
|
2021-03-02 10:32:07 -05:00
|
|
|
#include "coap3/coap.h"
|
2017-01-06 05:42:46 -05:00
|
|
|
|
2019-04-13 07:15:28 -04:00
|
|
|
/* The examples use simple Pre-Shared-Key configuration that you can set via
|
2021-03-02 10:32:07 -05:00
|
|
|
'idf.py menuconfig'.
|
2019-04-13 07:15:28 -04:00
|
|
|
|
|
|
|
If you'd rather not, just change the below entries to strings with
|
|
|
|
the config you want - ie #define EXAMPLE_COAP_PSK_KEY "some-agreed-preshared-key"
|
|
|
|
|
|
|
|
Note: PSK will only be used if the URI is prefixed with coaps://
|
|
|
|
instead of coap:// and the PSK must be one that the server supports
|
|
|
|
(potentially associated with the IDENTITY)
|
|
|
|
*/
|
2019-07-31 06:52:49 -04:00
|
|
|
#define EXAMPLE_COAP_PSK_KEY CONFIG_EXAMPLE_COAP_PSK_KEY
|
2019-04-13 07:15:28 -04:00
|
|
|
|
|
|
|
/* The examples use CoAP Logging Level that
|
2021-03-02 10:32:07 -05:00
|
|
|
you can set via 'idf.py menuconfig'.
|
2019-04-13 07:15:28 -04:00
|
|
|
|
|
|
|
If you'd rather not, just change the below entry to a value
|
|
|
|
that is between 0 and 7 with
|
|
|
|
the config you want - ie #define EXAMPLE_COAP_LOG_DEFAULT_LEVEL 7
|
|
|
|
*/
|
|
|
|
#define EXAMPLE_COAP_LOG_DEFAULT_LEVEL CONFIG_COAP_LOG_DEFAULT_LEVEL
|
2016-12-10 00:48:38 -05:00
|
|
|
|
2019-07-31 06:52:49 -04:00
|
|
|
const static char *TAG = "CoAP_server";
|
|
|
|
|
2019-03-08 15:22:17 -05:00
|
|
|
static char espressif_data[100];
|
|
|
|
static int espressif_data_len = 0;
|
2016-12-10 00:48:38 -05:00
|
|
|
|
2019-07-31 06:52:49 -04:00
|
|
|
#ifdef CONFIG_COAP_MBEDTLS_PKI
|
|
|
|
/* CA cert, taken from coap_ca.pem
|
|
|
|
Server cert, taken from coap_server.crt
|
|
|
|
Server key, taken from coap_server.key
|
|
|
|
|
2021-03-02 10:32:07 -05:00
|
|
|
The PEM, CRT and KEY file are examples taken from
|
|
|
|
https://github.com/eclipse/californium/tree/master/demo-certs/src/main/resources
|
|
|
|
as the Certificate test (by default) for the coap_client is against the
|
|
|
|
californium server.
|
2019-07-31 06:52:49 -04:00
|
|
|
|
|
|
|
To embed it in the app binary, the PEM, CRT and KEY file is named
|
|
|
|
in the component.mk COMPONENT_EMBED_TXTFILES variable.
|
|
|
|
*/
|
|
|
|
extern uint8_t ca_pem_start[] asm("_binary_coap_ca_pem_start");
|
|
|
|
extern uint8_t ca_pem_end[] asm("_binary_coap_ca_pem_end");
|
|
|
|
extern uint8_t server_crt_start[] asm("_binary_coap_server_crt_start");
|
|
|
|
extern uint8_t server_crt_end[] asm("_binary_coap_server_crt_end");
|
|
|
|
extern uint8_t server_key_start[] asm("_binary_coap_server_key_start");
|
|
|
|
extern uint8_t server_key_end[] asm("_binary_coap_server_key_end");
|
|
|
|
#endif /* CONFIG_COAP_MBEDTLS_PKI */
|
|
|
|
|
2019-04-13 07:15:28 -04:00
|
|
|
#define INITIAL_DATA "Hello World!"
|
|
|
|
|
2019-03-08 15:22:17 -05:00
|
|
|
/*
|
|
|
|
* The resource handler
|
|
|
|
*/
|
|
|
|
static void
|
2021-03-02 10:32:07 -05:00
|
|
|
hnd_espressif_get(coap_resource_t *resource,
|
2019-03-08 15:22:17 -05:00
|
|
|
coap_session_t *session,
|
2021-03-02 10:32:07 -05:00
|
|
|
const coap_pdu_t *request,
|
|
|
|
const coap_string_t *query,
|
|
|
|
coap_pdu_t *response)
|
2019-03-08 15:22:17 -05:00
|
|
|
{
|
2021-03-02 10:32:07 -05:00
|
|
|
coap_pdu_set_code(response, COAP_RESPONSE_CODE_CONTENT);
|
|
|
|
coap_add_data_large_response(resource, session, request, response,
|
|
|
|
query, COAP_MEDIATYPE_TEXT_PLAIN, 60, 0,
|
|
|
|
(size_t)espressif_data_len,
|
|
|
|
(const u_char *)espressif_data,
|
|
|
|
NULL, NULL);
|
2019-03-08 15:22:17 -05:00
|
|
|
}
|
2016-12-10 00:48:38 -05:00
|
|
|
|
|
|
|
static void
|
2021-03-02 10:32:07 -05:00
|
|
|
hnd_espressif_put(coap_resource_t *resource,
|
2019-03-08 15:22:17 -05:00
|
|
|
coap_session_t *session,
|
2021-03-02 10:32:07 -05:00
|
|
|
const coap_pdu_t *request,
|
|
|
|
const coap_string_t *query,
|
2019-03-08 15:22:17 -05:00
|
|
|
coap_pdu_t *response)
|
2016-12-10 00:48:38 -05:00
|
|
|
{
|
2019-03-08 15:22:17 -05:00
|
|
|
size_t size;
|
2021-03-02 10:32:07 -05:00
|
|
|
size_t offset;
|
|
|
|
size_t total;
|
|
|
|
const unsigned char *data;
|
2019-03-08 15:22:17 -05:00
|
|
|
|
|
|
|
coap_resource_notify_observers(resource, NULL);
|
|
|
|
|
2019-04-13 07:15:28 -04:00
|
|
|
if (strcmp (espressif_data, INITIAL_DATA) == 0) {
|
2021-03-02 10:32:07 -05:00
|
|
|
coap_pdu_set_code(response, COAP_RESPONSE_CODE_CREATED);
|
2019-07-31 06:52:49 -04:00
|
|
|
} else {
|
2021-03-02 10:32:07 -05:00
|
|
|
coap_pdu_set_code(response, COAP_RESPONSE_CODE_CHANGED);
|
2019-03-08 15:22:17 -05:00
|
|
|
}
|
|
|
|
|
2021-03-02 10:32:07 -05:00
|
|
|
/* coap_get_data_large() sets size to 0 on error */
|
|
|
|
(void)coap_get_data_large(request, &size, &data, &offset, &total);
|
2017-01-06 05:42:46 -05:00
|
|
|
|
2019-03-08 15:22:17 -05:00
|
|
|
if (size == 0) { /* re-init */
|
2019-04-13 07:15:28 -04:00
|
|
|
snprintf(espressif_data, sizeof(espressif_data), INITIAL_DATA);
|
2019-03-08 15:22:17 -05:00
|
|
|
espressif_data_len = strlen(espressif_data);
|
|
|
|
} else {
|
|
|
|
espressif_data_len = size > sizeof (espressif_data) ? sizeof (espressif_data) : size;
|
|
|
|
memcpy (espressif_data, data, espressif_data_len);
|
2017-01-06 05:42:46 -05:00
|
|
|
}
|
2016-12-10 00:48:38 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2021-03-02 10:32:07 -05:00
|
|
|
hnd_espressif_delete(coap_resource_t *resource,
|
2019-03-08 15:22:17 -05:00
|
|
|
coap_session_t *session,
|
2021-03-02 10:32:07 -05:00
|
|
|
const coap_pdu_t *request,
|
|
|
|
const coap_string_t *query,
|
2019-03-08 15:22:17 -05:00
|
|
|
coap_pdu_t *response)
|
2016-12-10 00:48:38 -05:00
|
|
|
{
|
2019-03-08 15:22:17 -05:00
|
|
|
coap_resource_notify_observers(resource, NULL);
|
2019-04-13 07:15:28 -04:00
|
|
|
snprintf(espressif_data, sizeof(espressif_data), INITIAL_DATA);
|
2019-03-08 15:22:17 -05:00
|
|
|
espressif_data_len = strlen(espressif_data);
|
2021-03-02 10:32:07 -05:00
|
|
|
coap_pdu_set_code(response, COAP_RESPONSE_CODE_DELETED);
|
2016-12-10 00:48:38 -05:00
|
|
|
}
|
|
|
|
|
2019-07-31 06:52:49 -04:00
|
|
|
#ifdef CONFIG_COAP_MBEDTLS_PKI
|
2019-04-13 07:15:28 -04:00
|
|
|
|
|
|
|
static int
|
|
|
|
verify_cn_callback(const char *cn,
|
2019-07-31 06:52:49 -04:00
|
|
|
const uint8_t *asn1_public_cert,
|
|
|
|
size_t asn1_length,
|
|
|
|
coap_session_t *session,
|
2019-04-13 07:15:28 -04:00
|
|
|
unsigned depth,
|
2019-07-31 06:52:49 -04:00
|
|
|
int validated,
|
|
|
|
void *arg
|
|
|
|
)
|
|
|
|
{
|
|
|
|
coap_log(LOG_INFO, "CN '%s' presented by server (%s)\n",
|
|
|
|
cn, depth ? "CA" : "Certificate");
|
|
|
|
return 1;
|
2019-04-13 07:15:28 -04:00
|
|
|
}
|
2019-07-31 06:52:49 -04:00
|
|
|
#endif /* CONFIG_COAP_MBEDTLS_PKI */
|
2019-04-13 07:15:28 -04:00
|
|
|
|
2021-03-02 10:32:07 -05:00
|
|
|
static void
|
|
|
|
coap_log_handler (coap_log_t level, const char *message)
|
|
|
|
{
|
|
|
|
uint32_t esp_level = ESP_LOG_INFO;
|
|
|
|
char *cp = strchr(message, '\n');
|
|
|
|
|
|
|
|
if (cp)
|
|
|
|
ESP_LOG_LEVEL(esp_level, TAG, "%.*s", (int)(cp-message), message);
|
|
|
|
else
|
|
|
|
ESP_LOG_LEVEL(esp_level, TAG, "%s", message);
|
|
|
|
}
|
|
|
|
|
2019-04-13 07:15:28 -04:00
|
|
|
static void coap_example_server(void *p)
|
2016-12-10 00:48:38 -05:00
|
|
|
{
|
2019-03-08 15:22:17 -05:00
|
|
|
coap_context_t *ctx = NULL;
|
2019-04-13 07:15:28 -04:00
|
|
|
coap_address_t serv_addr;
|
2019-03-08 15:22:17 -05:00
|
|
|
coap_resource_t *resource = NULL;
|
2017-01-06 05:42:46 -05:00
|
|
|
|
2019-04-13 07:15:28 -04:00
|
|
|
snprintf(espressif_data, sizeof(espressif_data), INITIAL_DATA);
|
2019-03-08 15:22:17 -05:00
|
|
|
espressif_data_len = strlen(espressif_data);
|
2021-03-02 10:32:07 -05:00
|
|
|
coap_set_log_handler(coap_log_handler);
|
2019-04-13 07:15:28 -04:00
|
|
|
coap_set_log_level(EXAMPLE_COAP_LOG_DEFAULT_LEVEL);
|
|
|
|
|
2017-01-06 05:42:46 -05:00
|
|
|
while (1) {
|
2019-04-13 07:15:28 -04:00
|
|
|
coap_endpoint_t *ep = NULL;
|
2019-03-08 15:22:17 -05:00
|
|
|
unsigned wait_ms;
|
|
|
|
|
2017-01-06 05:42:46 -05:00
|
|
|
/* Prepare the CoAP server socket */
|
|
|
|
coap_address_init(&serv_addr);
|
2021-03-02 10:32:07 -05:00
|
|
|
serv_addr.addr.sin6.sin6_family = AF_INET6;
|
|
|
|
serv_addr.addr.sin6.sin6_port = htons(COAP_DEFAULT_PORT);
|
2017-01-06 05:42:46 -05:00
|
|
|
|
2019-03-08 15:22:17 -05:00
|
|
|
ctx = coap_new_context(NULL);
|
|
|
|
if (!ctx) {
|
2019-07-31 06:52:49 -04:00
|
|
|
ESP_LOGE(TAG, "coap_new_context() failed");
|
|
|
|
continue;
|
2019-03-08 15:22:17 -05:00
|
|
|
}
|
2021-03-02 10:32:07 -05:00
|
|
|
coap_context_set_block_mode(ctx,
|
|
|
|
COAP_BLOCK_USE_LIBCOAP|COAP_BLOCK_SINGLE_BODY);
|
2019-07-31 06:52:49 -04:00
|
|
|
#ifdef CONFIG_COAP_MBEDTLS_PSK
|
2019-04-13 07:15:28 -04:00
|
|
|
/* Need PSK setup before we set up endpoints */
|
|
|
|
coap_context_set_psk(ctx, "CoAP",
|
2019-07-31 06:52:49 -04:00
|
|
|
(const uint8_t *)EXAMPLE_COAP_PSK_KEY,
|
|
|
|
sizeof(EXAMPLE_COAP_PSK_KEY) - 1);
|
|
|
|
#endif /* CONFIG_COAP_MBEDTLS_PSK */
|
|
|
|
|
|
|
|
#ifdef CONFIG_COAP_MBEDTLS_PKI
|
2021-03-02 10:32:07 -05:00
|
|
|
/* Need PKI setup before we set up endpoints */
|
2019-07-31 06:52:49 -04:00
|
|
|
unsigned int ca_pem_bytes = ca_pem_end - ca_pem_start;
|
|
|
|
unsigned int server_crt_bytes = server_crt_end - server_crt_start;
|
|
|
|
unsigned int server_key_bytes = server_key_end - server_key_start;
|
|
|
|
coap_dtls_pki_t dtls_pki;
|
|
|
|
|
|
|
|
memset (&dtls_pki, 0, sizeof(dtls_pki));
|
|
|
|
dtls_pki.version = COAP_DTLS_PKI_SETUP_VERSION;
|
|
|
|
if (ca_pem_bytes) {
|
|
|
|
/*
|
|
|
|
* Add in additional certificate checking.
|
|
|
|
* This list of enabled can be tuned for the specific
|
|
|
|
* requirements - see 'man coap_encryption'.
|
|
|
|
*
|
|
|
|
* Note: A list of root ca file can be setup separately using
|
|
|
|
* coap_context_set_pki_root_cas(), but the below is used to
|
|
|
|
* define what checking actually takes place.
|
|
|
|
*/
|
|
|
|
dtls_pki.verify_peer_cert = 1;
|
2021-03-02 10:32:07 -05:00
|
|
|
dtls_pki.check_common_ca = 1;
|
2019-07-31 06:52:49 -04:00
|
|
|
dtls_pki.allow_self_signed = 1;
|
|
|
|
dtls_pki.allow_expired_certs = 1;
|
|
|
|
dtls_pki.cert_chain_validation = 1;
|
|
|
|
dtls_pki.cert_chain_verify_depth = 2;
|
|
|
|
dtls_pki.check_cert_revocation = 1;
|
|
|
|
dtls_pki.allow_no_crl = 1;
|
|
|
|
dtls_pki.allow_expired_crl = 1;
|
|
|
|
dtls_pki.allow_bad_md_hash = 1;
|
|
|
|
dtls_pki.allow_short_rsa_length = 1;
|
|
|
|
dtls_pki.validate_cn_call_back = verify_cn_callback;
|
|
|
|
dtls_pki.cn_call_back_arg = NULL;
|
|
|
|
dtls_pki.validate_sni_call_back = NULL;
|
|
|
|
dtls_pki.sni_call_back_arg = NULL;
|
|
|
|
}
|
|
|
|
dtls_pki.pki_key.key_type = COAP_PKI_KEY_PEM_BUF;
|
|
|
|
dtls_pki.pki_key.key.pem_buf.public_cert = server_crt_start;
|
|
|
|
dtls_pki.pki_key.key.pem_buf.public_cert_len = server_crt_bytes;
|
|
|
|
dtls_pki.pki_key.key.pem_buf.private_key = server_key_start;
|
|
|
|
dtls_pki.pki_key.key.pem_buf.private_key_len = server_key_bytes;
|
|
|
|
dtls_pki.pki_key.key.pem_buf.ca_cert = ca_pem_start;
|
|
|
|
dtls_pki.pki_key.key.pem_buf.ca_cert_len = ca_pem_bytes;
|
2019-04-13 07:15:28 -04:00
|
|
|
|
2019-07-31 06:52:49 -04:00
|
|
|
coap_context_set_pki(ctx, &dtls_pki);
|
|
|
|
#endif /* CONFIG_COAP_MBEDTLS_PKI */
|
2019-04-13 07:15:28 -04:00
|
|
|
|
|
|
|
ep = coap_new_endpoint(ctx, &serv_addr, COAP_PROTO_UDP);
|
|
|
|
if (!ep) {
|
2019-07-31 06:52:49 -04:00
|
|
|
ESP_LOGE(TAG, "udp: coap_new_endpoint() failed");
|
|
|
|
goto clean_up;
|
2019-03-08 15:22:17 -05:00
|
|
|
}
|
2019-04-13 07:15:28 -04:00
|
|
|
ep = coap_new_endpoint(ctx, &serv_addr, COAP_PROTO_TCP);
|
|
|
|
if (!ep) {
|
2019-07-31 06:52:49 -04:00
|
|
|
ESP_LOGE(TAG, "tcp: coap_new_endpoint() failed");
|
|
|
|
goto clean_up;
|
2019-03-08 15:22:17 -05:00
|
|
|
}
|
2019-07-31 06:52:49 -04:00
|
|
|
#if defined(CONFIG_COAP_MBEDTLS_PSK) || defined(CONFIG_COAP_MBEDTLS_PKI)
|
|
|
|
if (coap_dtls_is_supported()) {
|
2019-08-28 05:03:17 -04:00
|
|
|
#ifndef CONFIG_MBEDTLS_TLS_SERVER
|
|
|
|
/* This is not critical as unencrypted support is still available */
|
|
|
|
ESP_LOGI(TAG, "MbedTLS (D)TLS Server Mode not configured");
|
|
|
|
#else /* CONFIG_MBEDTLS_TLS_SERVER */
|
2021-03-02 10:32:07 -05:00
|
|
|
serv_addr.addr.sin6.sin6_port = htons(COAPS_DEFAULT_PORT);
|
2019-04-13 07:15:28 -04:00
|
|
|
ep = coap_new_endpoint(ctx, &serv_addr, COAP_PROTO_DTLS);
|
|
|
|
if (!ep) {
|
2019-07-31 06:52:49 -04:00
|
|
|
ESP_LOGE(TAG, "dtls: coap_new_endpoint() failed");
|
|
|
|
goto clean_up;
|
2019-04-13 07:15:28 -04:00
|
|
|
}
|
2019-08-28 05:03:17 -04:00
|
|
|
#endif /* CONFIG_MBEDTLS_TLS_SERVER */
|
|
|
|
} else {
|
|
|
|
/* This is not critical as unencrypted support is still available */
|
|
|
|
ESP_LOGI(TAG, "MbedTLS (D)TLS Server Mode not configured");
|
2019-04-13 07:15:28 -04:00
|
|
|
}
|
2021-03-02 10:32:07 -05:00
|
|
|
#endif /* CONFIG_COAP_MBEDTLS_PSK || CONFIG_COAP_MBEDTLS_PKI */
|
2019-03-08 15:22:17 -05:00
|
|
|
resource = coap_resource_init(coap_make_str_const("Espressif"), 0);
|
|
|
|
if (!resource) {
|
2019-07-31 06:52:49 -04:00
|
|
|
ESP_LOGE(TAG, "coap_resource_init() failed");
|
|
|
|
goto clean_up;
|
2019-03-08 15:22:17 -05:00
|
|
|
}
|
|
|
|
coap_register_handler(resource, COAP_REQUEST_GET, hnd_espressif_get);
|
|
|
|
coap_register_handler(resource, COAP_REQUEST_PUT, hnd_espressif_put);
|
|
|
|
coap_register_handler(resource, COAP_REQUEST_DELETE, hnd_espressif_delete);
|
|
|
|
/* We possibly want to Observe the GETs */
|
|
|
|
coap_resource_set_get_observable(resource, 1);
|
|
|
|
coap_add_resource(ctx, resource);
|
|
|
|
|
2021-03-02 10:32:07 -05:00
|
|
|
#if defined(CONFIG_EXAMPLE_COAP_MCAST_IPV4) || defined(CONFIG_EXAMPLE_COAP_MCAST_IPV6)
|
|
|
|
esp_netif_t *netif = NULL;
|
|
|
|
for (int i = 0; i < esp_netif_get_nr_of_ifs(); ++i) {
|
|
|
|
char buf[8];
|
|
|
|
netif = esp_netif_next(netif);
|
|
|
|
esp_netif_get_netif_impl_name(netif, buf);
|
|
|
|
#if defined(CONFIG_EXAMPLE_COAP_MCAST_IPV4)
|
|
|
|
coap_join_mcast_group_intf(ctx, CONFIG_EXAMPLE_COAP_MULTICAST_IPV4_ADDR, buf);
|
|
|
|
#endif /* CONFIG_EXAMPLE_COAP_MCAST_IPV4 */
|
|
|
|
#if defined(CONFIG_EXAMPLE_COAP_MCAST_IPV6)
|
|
|
|
/* When adding IPV6 esp-idf requires ifname param to be filled in */
|
|
|
|
coap_join_mcast_group_intf(ctx, CONFIG_EXAMPLE_COAP_MULTICAST_IPV6_ADDR, buf);
|
|
|
|
#endif /* CONFIG_EXAMPLE_COAP_MCAST_IPV6 */
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_EXAMPLE_COAP_MCAST_IPV4 || CONFIG_EXAMPLE_COAP_MCAST_IPV6 */
|
|
|
|
|
2019-03-08 15:22:17 -05:00
|
|
|
wait_ms = COAP_RESOURCE_CHECK_TIME * 1000;
|
|
|
|
|
|
|
|
while (1) {
|
2021-03-02 10:32:07 -05:00
|
|
|
int result = coap_io_process(ctx, wait_ms);
|
2019-03-08 15:22:17 -05:00
|
|
|
if (result < 0) {
|
|
|
|
break;
|
|
|
|
} else if (result && (unsigned)result < wait_ms) {
|
|
|
|
/* decrement if there is a result wait time returned */
|
|
|
|
wait_ms -= result;
|
|
|
|
}
|
|
|
|
if (result) {
|
|
|
|
/* result must have been >= wait_ms, so reset wait_ms */
|
|
|
|
wait_ms = COAP_RESOURCE_CHECK_TIME * 1000;
|
|
|
|
}
|
2017-01-06 05:42:46 -05:00
|
|
|
}
|
2016-12-10 00:48:38 -05:00
|
|
|
}
|
2019-03-08 15:22:17 -05:00
|
|
|
clean_up:
|
|
|
|
coap_free_context(ctx);
|
|
|
|
coap_cleanup();
|
2017-01-06 05:42:46 -05:00
|
|
|
|
|
|
|
vTaskDelete(NULL);
|
2016-12-10 00:48:38 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
void app_main(void)
|
|
|
|
{
|
2017-03-14 09:39:44 -04:00
|
|
|
ESP_ERROR_CHECK( nvs_flash_init() );
|
2019-11-29 04:54:02 -05:00
|
|
|
ESP_ERROR_CHECK(esp_netif_init());
|
2018-11-20 11:43:52 -05:00
|
|
|
ESP_ERROR_CHECK(esp_event_loop_create_default());
|
|
|
|
|
|
|
|
/* This helper function configures Wi-Fi or Ethernet, as selected in menuconfig.
|
|
|
|
* Read "Establishing Wi-Fi or Ethernet Connection" section in
|
|
|
|
* examples/protocols/README.md for more information about this function.
|
|
|
|
*/
|
|
|
|
ESP_ERROR_CHECK(example_connect());
|
2017-01-06 05:42:46 -05:00
|
|
|
|
2019-04-13 07:15:28 -04:00
|
|
|
xTaskCreate(coap_example_server, "coap", 8 * 1024, NULL, 5, NULL);
|
2016-12-10 00:48:38 -05:00
|
|
|
}
|