File:  [ELWIX - Embedded LightWeight unIX -] / libaitmqtt / src / conn.c
Revision 1.3.12.2: download - view: text, annotated - select for diffs - revision graph
Tue Sep 13 22:20:59 2022 UTC (22 months, 2 weeks ago) by misho
Branches: mqtt1_8
Diff to: branchpoint 1.3: preferred, unified
rework headers
rework msgCONNECT

    1: /*************************************************************************
    2: * (C) 2011 AITNET ltd - Sofia/Bulgaria - <misho@aitbg.com>
    3: *  by Michael Pounov <misho@openbsd-bg.org>
    4: *
    5: * $Author: misho $
    6: * $Id: conn.c,v 1.3.12.2 2022/09/13 22:20:59 misho Exp $
    7: *
    8: **************************************************************************
    9: The ELWIX and AITNET software is distributed under the following
   10: terms:
   11: 
   12: All of the documentation and software included in the ELWIX and AITNET
   13: Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org>
   14: 
   15: Copyright 2004 - 2022
   16: 	by Michael Pounov <misho@elwix.org>.  All rights reserved.
   17: 
   18: Redistribution and use in source and binary forms, with or without
   19: modification, are permitted provided that the following conditions
   20: are met:
   21: 1. Redistributions of source code must retain the above copyright
   22:    notice, this list of conditions and the following disclaimer.
   23: 2. Redistributions in binary form must reproduce the above copyright
   24:    notice, this list of conditions and the following disclaimer in the
   25:    documentation and/or other materials provided with the distribution.
   26: 3. All advertising materials mentioning features or use of this software
   27:    must display the following acknowledgement:
   28: This product includes software developed by Michael Pounov <misho@elwix.org>
   29: ELWIX - Embedded LightWeight unIX and its contributors.
   30: 4. Neither the name of AITNET nor the names of its contributors
   31:    may be used to endorse or promote products derived from this software
   32:    without specific prior written permission.
   33: 
   34: THIS SOFTWARE IS PROVIDED BY AITNET AND CONTRIBUTORS ``AS IS'' AND
   35: ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   36: IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   37: ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
   38: FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   39: DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   40: OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   41: HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   42: LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   43: OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   44: SUCH DAMAGE.
   45: */
   46: #include "global.h"
   47: 
   48: 
   49: /*
   50:  * mqtt_msgCONNECT() Create CONNECT message
   51:  *
   52:  * @csConnID = ConnectID
   53:  * @Version = MQTT version
   54:  * @KASec = Keep alive timeout, if =0 default timeout for MQTT
   55:  * @csUser = Username if !=NULL
   56:  * @csPass = Password for Username, only if csUser is set
   57:  * @csWillTopic = Will Topic if !=NULL Will Flags set into message
   58:  * @csWillMessage = Will Message, may be NULL
   59:  * @ClrSess = Clear Session subscriptions after disconnect
   60:  * @WillQOS = Will QOS if csWillTopic is set
   61:  * @WillRetain = Will Retain Will Message if csWillTopic is set
   62:  * return: NULL error or allocated connect message
   63:  */
   64: mqtt_msg_t *
   65: mqtt_msgCONNECT(const char *csConnID, u_char Version, u_short KASec, 
   66: 		const char *csUser, const char *csPass, 
   67: 		const char *csWillTopic, const char *csWillMessage, 
   68: 		u_char ClrSess, u_char WillQOS, u_char WillRetain)
   69: {
   70: 	int len, siz = 0;
   71: 	u_int n, *l;
   72: 	mqtt_msg_t *msg = NULL;
   73: 	struct mqtthdr *hdr;
   74: 	mqtthdr_var_t *var, *cid, *topic, *wmsg, *user, *pass;
   75: 	mqtthdr_connflgs_t *flags;
   76: 	mqtt_len_t *ka;
   77: 	void *data;
   78: 
   79: 	if (!csConnID)
   80: 		return NULL;
   81: 	if (strlen(csConnID) >= MQTT_CONNID_MAX) {
   82: 		mqtt_SetErr(EINVAL, "Invalid argument ConnID is too long (max %d bytes)", 
   83: 				MQTT_CONNID_MAX - 1);
   84: 		return NULL;
   85: 	}
   86: 	if (Version < MQTT_PROTO_VER_3 || Version > MQTT_PROTO_VER_5) {
   87: 		mqtt_SetErr(EINVAL, "Unsupported version");
   88: 		return NULL;
   89: 	}
   90: 	if (csUser && strlen(csUser) >= MQTT_CRED_MAX) {
   91: 		mqtt_SetErr(EINVAL, "Invalid argument Username is too long (max %d bytes)", 
   92: 				MQTT_CRED_MAX - 1);
   93: 		return NULL;
   94: 	}
   95: 	if (csPass && strlen(csPass) >= MQTT_CRED_MAX) {
   96: 		mqtt_SetErr(EINVAL, "Invalid argument Password is too long (max %d bytes)", 
   97: 				MQTT_CRED_MAX - 1);
   98: 		return NULL;
   99: 	}
  100: 	if (WillQOS > MQTT_QOS_EXACTLY) {
  101: 		mqtt_SetErr(EINVAL, "Invalid argument WillQOS - unknown QOS value");
  102: 		return NULL;
  103: 	}
  104: 
  105: 	/* calculate message size */
  106: 	len = 10;	/* connect arguments: MQTT(6)+Version(1)+ConnFlags(1)+KeepAlive(2) */
  107: 	len += sizeof(mqtt_len_t) + strlen(csConnID);	/* connect id */
  108: 	if (csUser && *csUser) {			/* user/pass */
  109: 		len += sizeof(mqtt_len_t) + strlen(csUser);
  110: 		if (csPass)
  111: 			len += sizeof(mqtt_len_t) + strlen(csPass);
  112: 	}
  113: 	if (csWillTopic && *csWillTopic) {		/* will messages */
  114: 		len += sizeof(mqtt_len_t) + strlen(csWillTopic);
  115: 		len += sizeof(mqtt_len_t) + (csWillMessage ? strlen(csWillMessage) : 0);
  116: 	}
  117: 
  118: 	/* calculate header size */
  119: 	siz = sizeof(struct mqtthdr);			/* mqtt fixed header */
  120: 	n = mqtt_encodeLen(len);			/* message size */
  121: 	siz += mqtt_sizeLen(n) - 1;			/* length size */
  122: 
  123: 	if (!(msg = mqtt_msgAlloc(siz + len)))
  124: 		return NULL;
  125: 	else {
  126: 		data = msg->msg_base;
  127: 		hdr = (struct mqtthdr *) data;
  128: 	}
  129: 
  130: 	/* fixed header */
  131: 	hdr->mqtt_msg.type = MQTT_TYPE_CONNECT;
  132: 	l = (u_int*) hdr->mqtt_len;
  133: 	*l = n;
  134: 	data += siz;
  135: 
  136: 	/* variable header */
  137: 	var = (mqtthdr_var_t*) data;
  138: 	var->var_sb.val = htons(strlen(MQTT_PROTO_STR));
  139: 	memcpy(var->var_data, MQTT_PROTO_STR, ntohs(var->var_sb.val));
  140: 	data += MQTTHDR_VAR_SIZEOF(var);
  141: 
  142: 	/* protocol version */
  143: 	*(u_char*) data++ = Version;
  144: 
  145: 	/* CONNECT header */
  146: 	flags = (mqtthdr_connflgs_t*) data++;
  147: 	flags->clean_sess = ClrSess ? 1 : 0;
  148: 	if (csUser && *csUser) {
  149: 		flags->username = 1;
  150: 		flags->password = csPass ? 1 : 0;
  151: 	} else {
  152: 		flags->username = 0;
  153: 		flags->password = 0;
  154: 	}
  155: 	if (csWillTopic && *csWillTopic) {
  156: 		flags->will_flg = 1;
  157: 		flags->will_qos = WillQOS;
  158: 		flags->will_retain = WillRetain ? 1 : 0;
  159: 	} else {
  160: 		flags->will_flg = 0;
  161: 		flags->will_qos = 0;
  162: 		flags->will_retain = 0;
  163: 	}
  164: 
  165: 	/* keep alive */
  166: 	ka = (mqtt_len_t*) data;
  167: 	ka->val = KASec ? htons(KASec) : htons(MQTT_KEEPALIVE);
  168: 	data += sizeof(mqtt_len_t);
  169: 
  170: 	/* ConnID */
  171: 	cid = (mqtthdr_var_t*) data;
  172: 	cid->var_sb.val = htons(strlen(csConnID));
  173: 	memcpy(cid->var_data, csConnID, ntohs(cid->var_sb.val));
  174: 	data += MQTTHDR_VAR_SIZEOF(cid);
  175: 
  176: 	/* If Will Flags setup */
  177: 	if (csWillTopic && *csWillTopic) {
  178: 		topic = (mqtthdr_var_t*) data;
  179: 		topic->var_sb.val = htons(strlen(csWillTopic));
  180: 		memcpy(topic->var_data, csWillTopic, ntohs(topic->var_sb.val));
  181: 		data += MQTTHDR_VAR_SIZEOF(topic);
  182: 
  183: 		wmsg = (mqtthdr_var_t*) data;
  184: 		if (csWillMessage && *csWillMessage) {
  185: 			wmsg->var_sb.val = htons(strlen(csWillMessage));
  186: 			memcpy(wmsg->var_data, csWillMessage, ntohs(wmsg->var_sb.val));
  187: 		} else
  188: 			wmsg->var_sb.val = 0;
  189: 		data += MQTTHDR_VAR_SIZEOF(wmsg);
  190: 	}
  191: 
  192: 	/* If defined Username & Password */
  193: 	if (csUser && *csUser) {
  194: 		user = (mqtthdr_var_t*) data;
  195: 		user->var_sb.val = htons(strlen(csUser));
  196: 		memcpy(user->var_data, csUser, ntohs(user->var_sb.val));
  197: 		data += MQTTHDR_VAR_SIZEOF(user);
  198: 
  199: 		if (csPass && *csPass) {
  200: 			pass = (mqtthdr_var_t*) data;
  201: 			pass->var_sb.val = htons(strlen(csPass));
  202: 			memcpy(pass->var_data, csPass, ntohs(pass->var_sb.val));
  203: 			data += MQTTHDR_VAR_SIZEOF(pass);
  204: 		}
  205: 	}
  206: 
  207: 	return msg;
  208: }
  209: #if 0
  210: /*
  211:  * mqtt_msgCONNACK() Create CONNACK message
  212:  *
  213:  * @buf = Message buffer
  214:  * @retcode = Return code
  215:  * return: -1 error or >-1 message size for send
  216:  */
  217: mqtt_msg_t *
  218: mqtt_msgCONNACK(u_char retcode)
  219: {
  220: 	int siz = 0;
  221: 	struct mqtthdr *hdr;
  222: 	mqtthdr_connack_t *ack;
  223: 	mqtt_msg_t *msg = NULL;
  224: 
  225: 	if (retcode > MQTT_RETCODE_DENIED) {
  226: 		mqtt_SetErr(EINVAL, "Invalid retcode");
  227: 		return NULL;
  228: 	}
  229: 
  230: 	if (!(msg = mqtt_msgAlloc(sizeof(struct mqtthdr) + sizeof(mqtthdr_connack_t))))
  231: 		return NULL;
  232: 	else {
  233: 		hdr = (struct mqtthdr *) (buf->msg_base + siz);
  234: 		siz += sizeof(struct mqtthdr);
  235: 		ack = (mqtthdr_connack_t*) (buf->msg_base + siz);
  236: 		siz += sizeof(mqtthdr_connack_t);
  237: 	}
  238: 
  239: 	/* fixed header */
  240: 	MQTTHDR_MSGINIT(hdr);
  241: 	hdr->mqtt_msg.type = MQTT_TYPE_CONNACK;
  242: 	*hdr->mqtt_len = sizeof(mqtthdr_connack_t);
  243: 
  244: 	/* CONNACK header */
  245: 	ack->reserved = 0;
  246: 	ack->retcode = retcode;
  247: 
  248: 	return siz;
  249: }
  250: 
  251: static int
  252: _mqtt_msgSIMPLE_(mqtt_msg_t * __restrict buf, u_char cmd)
  253: {
  254: 	int siz = 0;
  255: 	struct mqtthdr *hdr;
  256: 
  257: 	if (!buf)
  258: 		return -1;
  259: 
  260: 	if (mqtt_msgRealloc(buf, sizeof(struct mqtthdr)) == -1)
  261: 		return -1;
  262: 	else {
  263: 		hdr = (struct mqtthdr *) (buf->msg_base + siz);
  264: 		siz += sizeof(struct mqtthdr);
  265: 	}
  266: 
  267: 	/* fixed header */
  268: 	MQTTHDR_MSGINIT(hdr);
  269: 	hdr->mqtt_msg.type = cmd;
  270: 	*hdr->mqtt_len = 0;
  271: 
  272: 	return siz;
  273: }
  274: 
  275: /*
  276:  * mqtt_msgPINGREQ() Create PINGREQ message
  277:  *
  278:  * @buf = Message buffer
  279:  * return: -1 error or >-1 message size for send
  280:  */
  281: int
  282: mqtt_msgPINGREQ(mqtt_msg_t * __restrict buf)
  283: {
  284: 	return _mqtt_msgSIMPLE_(buf, MQTT_TYPE_PINGREQ);
  285: }
  286: 
  287: /*
  288:  * mqtt_msgPINGRESP() Create PINGRESP message
  289:  *
  290:  * @buf = Message buffer
  291:  * return: -1 error or >-1 message size for send
  292:  */
  293: int
  294: mqtt_msgPINGRESP(mqtt_msg_t * __restrict buf)
  295: {
  296: 	return _mqtt_msgSIMPLE_(buf, MQTT_TYPE_PINGRESP);
  297: }
  298: 
  299: /*
  300:  * mqtt_msgDISCONNECT() Create DISCONNECT message
  301:  *
  302:  * @buf = Message buffer
  303:  * return: -1 error or >-1 message size for send
  304:  */
  305: int
  306: mqtt_msgDISCONNECT(mqtt_msg_t * __restrict buf)
  307: {
  308: 	return _mqtt_msgSIMPLE_(buf, MQTT_TYPE_DISCONNECT);
  309: }
  310: 
  311: /* ============= decode ============ */
  312: 
  313: /*
  314:  * mqtt_readCONNECT() Read elements from CONNECT message
  315:  *
  316:  * @buf = Message buffer
  317:  * @kasec = Keep Alive in seconds for current connection
  318:  * @psConnID = ConnectID
  319:  * @connLen = ConnectID length
  320:  * @psUser = Username if !=NULL
  321:  * @userLen = Username length
  322:  * @psPass = Password for Username, only if csUser is set
  323:  * @passLen = Password length
  324:  * @psWillTopic = Will Topic if !=NULL Will Flags set into message and must be free()
  325:  * @psWillMessage = Will Message, may be NULL if !NULL must be free() after use!
  326:  * return: .reserved == 1 is error or == 0 connection flags & msg ok
  327:  */
  328: mqtthdr_connack_t
  329: mqtt_readCONNECT(mqtt_msg_t * __restrict buf, u_short *kasec, char * __restrict psConnID, int connLen, 
  330: 		char * __restrict psUser, int userLen, char * __restrict psPass, int passLen,  
  331: 		char ** __restrict psWillTopic, char ** __restrict psWillMessage)
  332: {
  333: 	mqtthdr_connflgs_t flg = { MQTT_CONNFLGS_INIT };
  334: 	mqtthdr_connack_t cack = { 1, MQTT_RETCODE_DENIED };
  335: 	struct mqtthdr *hdr;
  336: 	mqtthdr_var_t *var;
  337: 	mqtt_len_t *ka;
  338: 	int len, ret;
  339: 	caddr_t pos;
  340: 
  341: 	if (!buf || !buf->msg_base || !buf->msg_len || !psConnID || !connLen)
  342: 		return cack;
  343: 
  344: 	hdr = _mqtt_readHEADER(buf, MQTT_TYPE_CONNECT, &ret, &len);
  345: 	if (!hdr)
  346: 		return cack;
  347: 	if (len < 12) {
  348: 		mqtt_SetErr(EINVAL, "Short message length %d", len);
  349: 		return cack;
  350: 	} else {
  351: 		pos = buf->msg_base + ret + 1;
  352: 		var = (mqtthdr_var_t*) pos;
  353: 	}
  354: 	/* check init string & protocol */
  355: 	if (var->var_sb.sb.l != 6 || strncmp((char*) var->var_data, MQTT_CONN_STR, 6)) {
  356: 		mqtt_SetErr(EINVAL, "Invalid init string %.6s(%d)", 
  357: 				var->var_data, var->var_sb.sb.l);
  358: 		cack.retcode = MQTT_RETCODE_REFUSE_UNAVAIL;
  359: 		return cack;
  360: 	} else {
  361: 		pos += var->var_sb.sb.l + sizeof(mqtt_len_t);
  362: 		proto = (mqtthdr_protover_t*) pos;
  363: 	}
  364: 	if (*proto != MQTT_PROTO_VER) {
  365: 		mqtt_SetErr(EINVAL, "Invalid protocol version %d", *pos);
  366: 		cack.retcode = MQTT_RETCODE_REFUSE_VER;
  367: 		return cack;
  368: 	} else
  369: 		pos++;
  370: 	flg = *(mqtthdr_connflgs_t*) pos;
  371: 	pos++;
  372: 	ka = (mqtt_len_t*) pos;
  373: 	*kasec = ntohs(ka->val);
  374: 	pos += sizeof(mqtt_len_t);
  375: 
  376: 	len -= pos - (caddr_t) var;
  377: 
  378: 	/* get ConnID */
  379: 	var = (mqtthdr_var_t*) pos;
  380: 	len -= MQTTHDR_VAR_SIZEOF(var);
  381: 	if (len < 0 || var->var_sb.sb.l > 23) {
  382: 		mqtt_SetErr(EINVAL, "Unexpected EOM at Connection ID %d", len);
  383: 		cack.retcode = MQTT_RETCODE_REFUSE_ID;
  384: 		return cack;
  385: 	} else {
  386: 		memset(psConnID, 0, connLen--);
  387: 		memcpy(psConnID, var->var_data, ntohs(var->var_sb.val) > connLen ? connLen : ntohs(var->var_sb.val));
  388: 		pos += MQTTHDR_VAR_SIZEOF(var);
  389: 	}
  390: 
  391: 	/* get Willz */
  392: 	if (flg.will_flg) {
  393: 		var = (mqtthdr_var_t*) pos;
  394: 		len -= MQTTHDR_VAR_SIZEOF(var);
  395: 		if (len < 0) {
  396: 			mqtt_SetErr(EINVAL, "Unexpected EOM at Will Topic %d", len);
  397: 			cack.retcode = MQTT_RETCODE_REFUSE_ID;
  398: 			return cack;
  399: 		} else {
  400: 			if (psWillTopic) {
  401: 				*psWillTopic = malloc(ntohs(var->var_sb.val) + 1);
  402: 				if (!*psWillTopic) {
  403: 					LOGERR;
  404: 					cack.retcode = MQTT_RETCODE_REFUSE_UNAVAIL;
  405: 					return cack;
  406: 				} else
  407: 					memset(*psWillTopic, 0, ntohs(var->var_sb.val) + 1);
  408: 				memcpy(*psWillTopic, var->var_data, ntohs(var->var_sb.val));
  409: 			}
  410: 			pos += MQTTHDR_VAR_SIZEOF(var);
  411: 		}
  412: 
  413: 		var = (mqtthdr_var_t*) pos;
  414: 		len -= MQTTHDR_VAR_SIZEOF(var);
  415: 		if (len < 0) {
  416: 			mqtt_SetErr(EINVAL, "Unexpected EOM at Will Message %d", len);
  417: 			cack.retcode = MQTT_RETCODE_REFUSE_ID;
  418: 			return cack;
  419: 		} else {
  420: 			if (psWillMessage) {
  421: 				*psWillMessage = malloc(ntohs(var->var_sb.val) + 1);
  422: 				if (!*psWillMessage) {
  423: 					LOGERR;
  424: 					cack.retcode = MQTT_RETCODE_REFUSE_UNAVAIL;
  425: 					return cack;
  426: 				} else
  427: 					memset(*psWillMessage, 0, ntohs(var->var_sb.val) + 1);
  428: 				memcpy(*psWillMessage, var->var_data, ntohs(var->var_sb.val));
  429: 			}
  430: 			pos += MQTTHDR_VAR_SIZEOF(var);
  431: 		}
  432: 	}
  433: 
  434: 	/* get User/Pass */
  435: 	if (flg.username) {
  436: 		var = (mqtthdr_var_t*) pos;
  437: 		len -= MQTTHDR_VAR_SIZEOF(var);
  438: 		if (len < 0 || var->var_sb.sb.l > 12) {
  439: 			mqtt_SetErr(EINVAL, "Unexpected EOM at Username %d", len);
  440: 			cack.retcode = MQTT_RETCODE_REFUSE_USERPASS;
  441: 			return cack;
  442: 		} else {
  443: 			if (psUser && userLen) {
  444: 				memset(psUser, 0, userLen--);
  445: 				memcpy(psUser, var->var_data, 
  446: 						ntohs(var->var_sb.val) > userLen ? userLen : ntohs(var->var_sb.val));
  447: 			}
  448: 			pos += MQTTHDR_VAR_SIZEOF(var);
  449: 		}
  450: 	}
  451: 	if (flg.password) {
  452: 		var = (mqtthdr_var_t*) pos;
  453: 		len -= MQTTHDR_VAR_SIZEOF(var);
  454: 		if (len < 0 || var->var_sb.sb.l > 12) {
  455: 			mqtt_SetErr(EINVAL, "Unexpected EOM at Password %d", len);
  456: 			cack.retcode = MQTT_RETCODE_REFUSE_USERPASS;
  457: 			return cack;
  458: 		} else {
  459: 			if (psPass && passLen) {
  460: 				memset(psPass, 0, passLen--);
  461: 				memcpy(psPass, var->var_data, 
  462: 						ntohs(var->var_sb.val) > passLen ? passLen : ntohs(var->var_sb.val));
  463: 			}
  464: 			pos += MQTTHDR_VAR_SIZEOF(var);
  465: 		}
  466: 	}
  467: 
  468: 	flg.reserved = 0;
  469: 	cack.reserved = flg.flags;
  470: 	cack.retcode = MQTT_RETCODE_ACCEPTED;
  471: 	return cack;
  472: }
  473: 
  474: /*
  475:  * mqtt_readCONNACK() Read CONNACK message
  476:  *
  477:  * @buf = Message buffer
  478:  * return: -1 error or >-1 CONNECT message return code
  479:  */
  480: u_char
  481: mqtt_readCONNACK(mqtt_msg_t * __restrict buf)
  482: {
  483: 	int len, ret;
  484: 	struct mqtthdr *hdr;
  485: 	mqtthdr_connack_t *ack;
  486: 	caddr_t pos;
  487: 
  488: 	if (!buf || !buf->msg_base || !buf->msg_len)
  489: 		return (u_char) -1;
  490: 
  491: 	hdr = _mqtt_readHEADER(buf, MQTT_TYPE_CONNACK, &ret, &len);
  492: 	if (!hdr)
  493: 		return (u_char) -1;
  494: 	if (len < sizeof(mqtthdr_connack_t)) {
  495: 		mqtt_SetErr(EINVAL, "Short message length %d", len);
  496: 		return (u_char) -1;
  497: 	} else {
  498: 		pos = buf->msg_base + ret + 1;
  499: 		ack = (mqtthdr_connack_t*) pos;
  500: 	}
  501: 
  502: 	if (ack->retcode > MQTT_RETCODE_DENIED) {
  503: 		mqtt_SetErr(EINVAL, "Invalid retcode %u", ack->retcode);
  504: 		return (u_char) -1;
  505: 	}
  506: 
  507: 	return ack->retcode;
  508: }
  509: 
  510: /*
  511:  * mqtt_readDISCONNECT() Read DISCONNECT message
  512:  *
  513:  * @buf = Message buffer
  514:  * return: -1 error, 0 ok, >0 undefined result
  515:  */
  516: int
  517: mqtt_readDISCONNECT(mqtt_msg_t * __restrict buf)
  518: {
  519: 	int len, ret;
  520: 	struct mqtthdr *hdr;
  521: 
  522: 	hdr = _mqtt_readHEADER(buf, MQTT_TYPE_DISCONNECT, &ret, &len);
  523: 	if (!hdr || ret != 1)
  524: 		return -1;
  525: 
  526: 	return len;
  527: }
  528: 
  529: /*
  530:  * mqtt_readPINGREQ() Read PINGREQ message
  531:  *
  532:  * @buf = Message buffer
  533:  * return: -1 error, 0 ok, >0 undefined result
  534:  */
  535: int
  536: mqtt_readPINGREQ(mqtt_msg_t * __restrict buf)
  537: {
  538: 	int len, ret;
  539: 	struct mqtthdr *hdr;
  540: 
  541: 	hdr = _mqtt_readHEADER(buf, MQTT_TYPE_PINGREQ, &ret, &len);
  542: 	if (!hdr || ret != 1)
  543: 		return -1;
  544: 
  545: 	return len;
  546: }
  547: 
  548: /*
  549:  * mqtt_readPINGRESP() Read PINGRESP message
  550:  *
  551:  * @buf = Message buffer
  552:  * return: -1 error, 0 ok, >0 undefined result
  553:  */
  554: int
  555: mqtt_readPINGRESP(mqtt_msg_t * __restrict buf)
  556: {
  557: 	int len, ret;
  558: 	struct mqtthdr *hdr;
  559: 
  560: 	hdr = _mqtt_readHEADER(buf, MQTT_TYPE_PINGRESP, &ret, &len);
  561: 	if (!hdr || ret != 1)
  562: 		return -1;
  563: 
  564: 	return len;
  565: }
  566: #endif

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>