-
Notifications
You must be signed in to change notification settings - Fork 3k
Nanomesh integration #3239
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Closed
Closed
Nanomesh integration #3239
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Change-Id: If6ab46485debc3a3e46578ce4894cb4c5adf7c66
Change-Id: Idf04d5670193ffc15c6eb02780fe16222963c6de
Change-Id: I8a6f66b5c6b6d3ef3db73f8fb5bf4191963be790
Change-Id: I7a8fa75c49f3c31d4db2d7c4d05830a678de7a2d
Change-Id: If72db0475395442041a3cf626269363a40806c5b
Change-Id: Iff0f837140af1a4c0f8eaa212e7761e52617bf42
Change-Id: I8f71a919e410e7b2883d3405da30f0ac60097115
Change-Id: I39ed1a81652d1d6951e19fa63f3fe89e641ca2af
Change-Id: I5d74ba7adbe44dd07eebd7f0052a43e72c1b4e73
Change-Id: If6d936fad0764415dcbe28608a26cf31934a846a
Add a makefile target needed for adding the library binary to given tar archive, which is used by Makefile.simulator. Change-Id: I700efaf51422664d0dde249d35e7228a327454b5
licence and copyrights updated
copyright and licence updates
Add local pseudo-RNG to randLIB
size and nitems parameters were the wrong way around, so the call did not return 1 as expected, meaning DEVICE_RANDOM functionality failed.
Don't just xor in the 64-bit number given, splitmix64 it across the entire state. Also, make sure we don't accidentally set the state to all-zero. RANDLIB_ASSUME_GOOD_SEED dropped - we now assume splitmix64 will be present for the seed additions. (Note that add_seed will be somewhat slow on platforms like MSP430 with slow multipliers - don't call it too much.)
When receiving data, destination (own) address is stored and given to socket when sending reply to make sure respone comes always from same address where request was sent. This commit supports only real socket to real socket messages, not virtual socket, or DTLS handshake messages.
Make connection handler deal with all addressing, and hide the internals of security handler. Will allow security handler code to be stubbed out if mbed TLS is not available.
NS_USE_EXTERNAL_MBED_TLS now controls whether we attempt to include mbedTLS header files at all, and after including them, we check whether SSL/TLS is enabled. If not, we provide non-secure operation only.
Allow build without SSL
When handshake fails, or DTLS session is closed, all transactions must be removed from coap protocol retransmission queue. Otherwise coap retransmission will start new handshake.
Secure sending code was passing the remote address as the source address, bizarrely. This records the local address last used as the destination for incoming packets and uses that. Other fix-ups: * dest_addr (ie remote address) removed from internal_socket_t; this isn't safe, as one socket talks to multiple remote peers. Use address in secure_session_t instead. * Some renaming: listen_socket->socket, send/receive callbacks, remote_address+remote_port -> remote_host
-Do not define mbedtls configuration in Makefile as the same makefile is used in target builds.
* As part of patch-2 for socket API update, we need to add 2nd parameter of socket_listen() API.
Addding backlog parameter to socket_listen
* Use default local address, if request is from multicast address If response to multicast request is sent, local address must be set to default. * Fix unit tests Fixed socket_listen stub.
* Pertaining to new socket API changes, socket_free is deprecated. * socket_close() is used from now on. * Fixing stubs too.
Using socket_close() instead of socket_free()
When secure session is deleted, transaction callback must be called to inform request sender that response is not going to be received.
In some callbacks, secure session might be removed and transactions been freed. That leads to double freeing, and reading from freed pointer. Transaction is now removed from list before calling callback to avoid that.
@miklis Why the Jenkins pipeline build is not starting? |
Will redo from local branch. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
a1982c1de752c50410d975a03f505a69972539f5
26cdd3904f3042c21155a39e940fafb266af20d2
All updates to sources were made by using
git subtree
commands so Git can actually track and show the history of those libraries.For bigger libraries I will be using
--squash
to squash the history.Tested on:
Status
IN DEVELOPMENT
Needs verification for other that GCC compiler.
I will also try within this PR to temporary change the Jenkinsfile to launch our CI smoke tests.
Migrations
NO
Todos
CC: @mikter @hasnainvirk @yogpan01 @kimlep01