- 23 Apr, 2020 1 commit
-
-
Kishen Maloor authored
Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
- 15 Apr, 2020 1 commit
-
-
Kishen Maloor authored
Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
- 25 Jan, 2020 1 commit
-
-
George Nash authored
Persistant storage is currently only enabled if OC_SECURITY is defined. This has lead implementation problems when implementing features like introspection, cloud, or software-update which also require persistant storage. This commit replaces the `#ifdef OC_SECURITY` with `#ifdef OC_STORAGE` in oc_storage.c. Inside config.h OC_STORAGE is defined if OC_SECURITY, OC_IDD_API OC_SOFTWARE_UPDATE, or OC_SECURITY is defined. Also updated samples that call oc_storage_config so they call it if OC_STORAGE is defined instead of OC_SECURITY. Removed the dummy storage implmentation from the oc_cloud_storage.c since OC_STORAGE is now defined by default when OC_CLOUD is defined. Some preprocessor check were added to check it one of the features that require OC_STORAGE is set but OC_STORAGE is not set. This will cause a build error and inform developers to check oc_config.h to make sure OC_STORAGE is set there. Change-Id: I9a9242349e939393f190cab373fe7d0252ae656c Signed-off-by:
George Nash <george.nash@intel.com>
-
- 23 Jan, 2020 1 commit
-
-
Kishen Maloor authored
Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
- 21 Nov, 2019 2 commits
-
-
Kishen Maloor authored
Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com> Change-Id: I92068dec435ee6cc139bf5994aa0afb44e5aa87d
-
Kishen Maloor authored
Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com> Change-Id: I25dd3b9922c9c22c9ef2b97265915ad593e661b8
-
- 13 Nov, 2019 2 commits
-
-
Kishen Maloor authored
Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com> Change-Id: I79d06187dc97faf74945beedcca154cf1a65f212
-
Kishen Maloor authored
Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com> Change-Id: I83f95098e4af328c8783368388e65e5e340d61d5
-
- 10 Oct, 2019 2 commits
-
-
Kishen Maloor authored
Change-Id: I27e35513b30f67f9ba2e035db415072c0f68abbc Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
George Nash authored
The reason oc_acl_common.h and oc_cred_common.h have the suffix common is because the code contained in the headers is common to both the public and private APIs. Using the suffix common is meaningless to the user of the iotivity-lite framework. What are the headers "common" to from the user perspective? For this reason the following files have been renamed include/oc_acl_common.h --> include/oc_acl.h include/oc_cred_common.h --> include/oc_cred.h security/oc_acl.h --> security/oc_acl_internal.h security/oc_cred.h --> security/oc_cred_internal.h This removes the confusing "common" suffix while adding the "internal" suffix for code that is already considered internal to the framework. The #include has been changed to reflect the new file name. Change-Id: I15df170f1172e3781dcf42e7716700f1bdea629a Signed-off-by:
George Nash <george.nash@intel.com>
-
- 30 Sep, 2019 1 commit
-
-
Iurii Metelytsia authored
Сode that compares "rt" and "if" in the ACL entries removed. Signed-off-by:
Iurii Metelytsia <i.metelytsia@samsung.com> Change-Id: I50116f9fda78b2d0d88d5caafdf192bbd5efccb0
-
- 24 Sep, 2019 3 commits
-
-
Larry Sachs authored
Make the maintenance resource optional Fix RESET behaviors and handle self-RESETs fully Change-Id: I6d9f0a9b8bf7a100d26bf182a8d2f291c9161909 Signed-off-by:
Larry Sachs <larry.j.sachs@intel.com>
-
Larry Sachs authored
Change-Id: I1cec60836743a3a4f8543ae5fc384267b9d214cf Signed-off-by:
Larry Sachs <larry.j.sachs@intel.com>
-
Kishen Maloor authored
Change-Id: I1724eaba76c96ea31bb9bf9ffa124945a15d97f7 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
- 23 Sep, 2019 2 commits
-
-
Kishen Maloor authored
Change-Id: I74dd7c814e483d7d8b6bc674b66536258e257193 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
Kishen Maloor authored
Change-Id: Id155e840fa447b62e6f53f984a332345ca9ef97a Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
- 20 Sep, 2019 2 commits
-
-
Kishen Maloor authored
Change-Id: I94f6e6739d55a0da36be8eed62d6c827a002a973 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
Kishen Maloor authored
Change-Id: I2ce1017ad8b88618ba18528112f7ca8be34578b4 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
- 19 Aug, 2019 1 commit
-
-
Kishen Maloor authored
Change-Id: I85a91b25c4e9b742f3d21934010b6111846ffee4 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
- 16 Aug, 2019 1 commit
-
-
Aleksey authored
DER encoding using is removed Handle encoding type is added Signed-off-by:
Aleksey Volkov <a.volkov@samsung.com> Change-Id: Ibf8ad403a7f70e05c90e579d6871319d15325cce
-
- 08 Aug, 2019 1 commit
-
-
George Nash authored
Once OTM is successful the oc_obt_device_status_cb_t callback is called to indicate success. The end user expects to be able to act on the owned device. (i.e. provision the device since its owned) If the user tries to make any method call that expects the uuid of the device in the oc_devices list from inside the callback that function will fail. Example: - user calls oc_obt_perform_just_works_otm with cb - cb is called indicating successfull OTM - from inside the cb user tries to provision the just device by calling oc_obt_provision_ace Without out this change the call to oc_obt_provision_ace call will fail since the uuid of the device is not in the oc_devices list. With this change the call to oc_obt_provision_ace will succeed. Change-Id: I2581b85cb27477556f57df049936c4605ebf34c5 Signed-off-by:
George Nash <george.nash@intel.com>
-
- 01 Aug, 2019 6 commits
-
-
Kishen Maloor authored
Change-Id: Iba8ac93efadd2161f2c2935153c5ced9dffb3d87 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
Kishen Maloor authored
Change-Id: If84b8ea1e46acb4c75b57b927684cc992819444d Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
Kishen Maloor authored
Change-Id: I1a03fc0d0c55c00270c654cd6358a7e4e4cd9db0 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
Kishen Maloor authored
Change-Id: I4028e395d63131296c16a957d37f02ebee5abca1 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
Kishen Maloor authored
Change-Id: Ib3907146c1889337bad5ca3a9794ccf63cf82e9c Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
Kishen Maloor authored
Change-Id: I074870783429b99843847883ad9cb04d0c1dab3b Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
- 26 Jul, 2019 1 commit
-
-
Kishen Maloor authored
Change-Id: I0d778e71fada88972ad47153096c5d8fe6cc2015 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
- 23 Jul, 2019 2 commits
-
-
Kishen Maloor authored
Change-Id: I74a03a03a74ecebe5311529e40b3e6d1238e2eda Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
Kishen Maloor authored
This change enforces an internal record in OBTs and Devices on which cred entries represent owner credentials. This information facilitates an OBT's multicast discovery of its owned devices through /oic/res without access to /oic/sec/doxm on devices. Change-Id: I98446a610ca5af99f1655bfbee7da29a11a4cb04 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
- 14 Jul, 2019 1 commit
-
-
Kishen Maloor authored
Change-Id: Ibe38b439c8376b26bb6ee1de19119e1e04d1f451 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
- 11 Jul, 2019 1 commit
-
-
Kishen Maloor authored
-During the first OBT initialization, oc_obt_init() generates a self-signed root certificate for use in the local security domain. -Added new provisioning APIs to oc_obt for: -Identity certificates signed by the OBT's root certificate. -Role certificates signed by the OBT's root certificate. -auth-crypt ACE for wildcard "*" resource with RW permissions. -Role ACE for wildcard "*" resource with RW permissions. These are all single API calls which subsume entire sequences of requests that are executed underneath and return the final result to the application (OBT). -Updated discover_owned_devices() to work through /oic/res instead of /oic/sec/doxm. -Update sample onboarding_tool with new set of options that exercises all of the above functions. Change-Id: I43000bebe554faf17e652b1563111be284b404e5 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
- 04 Jul, 2019 1 commit
-
-
Kishen Maloor authored
Change-Id: I6980deb8cd7bdc22a6ff822acf84e6035e72c4d3 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com>
-
- 10 Jun, 2019 1 commit
-
-
Kishen Maloor authored
This change adds new Client APIs for performing resource discovery over the realm-local and site-local IPV6 scopes. The Linux IP adapter has been updated to set a hop limit of 255 for discovery over the wider IPv6 scopes. This change also adds similar APIs for issuing generalized mutlicast requests to any resource over the realm and site-local scopes. Lastly, oc_obt has been updated with new discovery APIs for owned and unowned devices over these wider scopes. The sample OBT has been updated with the new discovery options. Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com> Change-Id: Ib5c0adfb2f2c033a0a2dc2dc24796d3669acf1ec
-
- 17 Apr, 2019 1 commit
-
-
Kishen Maloor authored
Change-Id: I55a5723a2fe706b06f84b30bc82308b6c8096892 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com> Reviewed-on: https://gerrit.iotivity.org/gerrit/29445Tested-by:
IoTivity Jenkins <jenkins-daemon@iotivity.org>
-
- 08 Apr, 2019 1 commit
-
-
Kishen Maloor authored
This change restructures oc_obt to seaprate out the core request sequences for the different OTMs from common functions that apply to all OTM sequences and other horizontal security provisioning functions. As a result, each OTM may be implemented in individual modules thus improving their maintainability. A new internal header oc_obt_internal.h contains all the common internal structures and APIs to be harnessed by all OTM implementations. Change-Id: Ib8eea60a63423f64ab62e9cd1da90d200cf9ba0b Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com> Reviewed-on: https://gerrit.iotivity.org/gerrit/29387Tested-by:
IoTivity Jenkins <jenkins-daemon@iotivity.org>
-
- 05 Apr, 2019 1 commit
-
-
Kishen Maloor authored
Change-Id: I025baab209362fe8324c9f8ef1dbb966989d681a Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com> Reviewed-on: https://gerrit.iotivity.org/gerrit/29377Tested-by:
IoTivity Jenkins <jenkins-daemon@iotivity.org>
-
- 19 Mar, 2019 1 commit
-
-
Kishen Maloor authored
* Store an int64_t in oc_rep_t for integer values. This addresses bug LITE-32 which points out that OCF Specs permit values in the range [-2^53,2^53] for integers in OCF's data models. * Add value setter APIs e.g.: oc_rep_set_value_int() for supported value types to allow apps to use in conjunction with oc_rep_set_key() to encode objects where keys and values are supplied at runtime through variables. * Modified oc_rep_{begin/end}_{object/array}() macros to allow callers to directly pass in a pointer to the "parent" parameter. This change also makes code look cleaner. * Updated all sample apps and modules across the stack that were impacted by the above changes. Change-Id: I9e43a1b87b8f9504ca6524c393700a92dcfd1378 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com> Reviewed-on: https://gerrit.iotivity.org/gerrit/29341Tested-by:
IoTivity Jenkins <jenkins-daemon@iotivity.org>
-
- 07 Jan, 2019 1 commit
-
-
Kishen Maloor authored
Change-Id: I1668ec997dffd850c951de705d41d425080fd5c4 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com> Reviewed-on: https://gerrit.iotivity.org/gerrit/27824
-
- 31 Dec, 2018 1 commit
-
-
Kishen Maloor authored
Fix logic to refresh endpoints of known owned/unowned devices upon every discovery call. While owned/unowned deivces are cached internally in oc_obt, previously their endpoints were not refreshed on subsequent re-discovery. As a result, a device that was momentarily offline and got back online during a single run of an OBT wouldn't have a chance to provide its new endpoints to the OBT, and hence the OBT couldn't access it until it was itself restarted. This has been fixed. Change-Id: Ia2973cab6cf24164cb30de28136d34d3044219f9 Signed-off-by:
Kishen Maloor <kishen.maloor@intel.com> Reviewed-on: https://gerrit.iotivity.org/gerrit/27807
-