Skip to content

Nanomesh integration #3239

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 190 commits into from
Closed

Nanomesh integration #3239

wants to merge 190 commits into from

Conversation

SeppoTakalo
Copy link
Contributor

@SeppoTakalo SeppoTakalo commented Nov 9, 2016

Description

  • Update Nanostack to v5.0.7
  • Update coap-service from master a1982c1de752c50410d975a03f505a69972539f5
  • Update nanostack-randlib from master 26cdd3904f3042c21155a39e940fafb266af20d2

All updates to sources were made by using git subtree commands so Git can actually track and show the history of those libraries.

For bigger libraries I will be using --squash to squash the history.

Tested on:

Application toolchain Board RF shield Mode Result
mesh-minimal GCC K64F Atmel 6LoWPAN OK
mesh-minimal GCC K64F MCR20A 6LoWPAN OK
mesh-minimal GCC K64F Atmel Thread Requires bigger heap, then OK. Tested with 30kB
mesh-minimal GCC NCS36510 - 6LoWPAN OK
mbed-client GCC K64F MCR20A 6LoWPAN Requires #3232 Then OK
mbed-client GCC K64F Atmel 6LoWPAN Requires #3232 Then OK

Status

IN DEVELOPMENT

Needs verification for other that GCC compiler.

I will also try within this PR to temporary change the Jenkinsfile to launch our CI smoke tests.

Migrations

NO

Todos

  • Tests

CC: @mikter @hasnainvirk @yogpan01 @kimlep01

ernotormikoski and others added 30 commits May 27, 2015 18:08
Change-Id: If6ab46485debc3a3e46578ce4894cb4c5adf7c66
Change-Id: Idf04d5670193ffc15c6eb02780fe16222963c6de
Change-Id: I8a6f66b5c6b6d3ef3db73f8fb5bf4191963be790
Change-Id: I7a8fa75c49f3c31d4db2d7c4d05830a678de7a2d
Change-Id: If72db0475395442041a3cf626269363a40806c5b
Change-Id: Iff0f837140af1a4c0f8eaa212e7761e52617bf42
Change-Id: I8f71a919e410e7b2883d3405da30f0ac60097115
Change-Id: I39ed1a81652d1d6951e19fa63f3fe89e641ca2af
Change-Id: I5d74ba7adbe44dd07eebd7f0052a43e72c1b4e73
Change-Id: If6d936fad0764415dcbe28608a26cf31934a846a
Add a makefile target needed for adding the library binary to given
tar archive, which is used by Makefile.simulator.

Change-Id: I700efaf51422664d0dde249d35e7228a327454b5
licence and copyrights updated
copyright and licence updates
kjbracey and others added 27 commits October 18, 2016 15:52
Add local pseudo-RNG to randLIB
size and nitems parameters were the wrong way around, so the call did
not return 1 as expected, meaning DEVICE_RANDOM functionality failed.
Don't just xor in the 64-bit number given, splitmix64 it across the entire
state. Also, make sure we don't accidentally set the state to all-zero.

RANDLIB_ASSUME_GOOD_SEED dropped - we now assume splitmix64 will be
present for the seed additions.

(Note that add_seed will be somewhat slow on platforms like MSP430 with
slow multipliers - don't call it too much.)
When receiving data, destination (own) address is stored and given to
socket when sending reply to make sure respone comes always from same
address where request was sent. This commit supports only real socket to
real socket messages, not virtual socket, or DTLS handshake messages.
Make connection handler deal with all addressing, and hide the internals
of security handler.

Will allow security handler code to be stubbed out if mbed TLS is not
available.
NS_USE_EXTERNAL_MBED_TLS now controls whether we attempt to include
mbedTLS header files at all, and after including them, we check whether
SSL/TLS is enabled. If not, we provide non-secure operation only.
Allow build without SSL
When handshake fails, or DTLS session is closed, all transactions must
be removed from coap protocol retransmission queue. Otherwise coap
retransmission will start new handshake.
Secure sending code was passing the remote address as the source
address, bizarrely. This records the local address last used as the
destination for incoming packets and uses that.

Other fix-ups:

* dest_addr (ie remote address) removed from internal_socket_t; this isn't
  safe, as one socket talks to multiple remote peers. Use address in
  secure_session_t instead.
* Some renaming: listen_socket->socket, send/receive callbacks,
  remote_address+remote_port -> remote_host
-Do not define mbedtls configuration in Makefile as the same makefile
 is used in target builds.
* As part of patch-2 for socket API update, we need to add 2nd parameter of socket_listen() API.
Addding backlog parameter to socket_listen
* Use default local address, if request is from multicast address

If response to multicast request is sent, local address must be set to
default.

* Fix unit tests

Fixed socket_listen stub.
* Pertaining to new socket API changes, socket_free is deprecated.
* socket_close() is used from now on.
* Fixing stubs too.
Using socket_close() instead of socket_free()
When secure session is deleted, transaction callback must be called
to inform request sender that response is not going to be received.
In some callbacks, secure session might be removed and transactions been
freed. That leads to double freeing, and reading from freed pointer.
Transaction is now removed from list before calling callback to avoid
that.
…6cdd3904f3042c21155a39e940fafb266af20d2'

git-subtree-dir: features/FEATURE_COMMON_PAL/mbed-client-randlib
git-subtree-mainline: 6aedb5a
git-subtree-split: 26cdd39
…'a1982c1de752c50410d975a03f505a69972539f5'

git-subtree-dir: features/nanostack/FEATURE_NANOSTACK/coap-service
git-subtree-mainline: c0adb06
git-subtree-split: a1982c1
@SeppoTakalo
Copy link
Contributor Author

@miklis Why the Jenkins pipeline build is not starting?

@SeppoTakalo
Copy link
Contributor Author

Will redo from local branch.

@SeppoTakalo SeppoTakalo closed this Nov 9, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

8 participants