Azure RTOS 6.2.0
Azure RTOS NetX Duo 6.2.0 release contains the following features and changes:
Device Update for IoT Hub agent
Azure Device Update for IoT Hub (a.k.a ADU) is a service that enables you to deploy over-the-air updates (OTA) to your IoT devices. Azure RTOS has included the ADU agent as part of the IoT Middleware.
Improvements of NetX Duo
nx_utility.c Improved the internal logic.
nx_azure_iot* Supported Device Update for IoT Hub.
Supported mqtt over websocket.
nx_websocket_client.c Initial release.
nx_websocket_client.h Initial release.
nx_web_http_server.c Supported random nonce for digest authentication.
Fixed the issue of processing empty password.
nx_web_http_server.h Supported random nonce for digest authentication.
nxd_http_server.c Fixed the issue of processing empty password.
Supported random nonce for digest authentication.
nxd_http_server.h Supported random nonce for digest authentication.
nxd_mqtt_client.c Supported mqtt over websocket.
Improved the logic of sending packet.
nxd_mqtt_client.h Supported mqtt over websocket.
nxd_snmp.c Fixed compiler warnings.
nxd_sntp_client.c Fixed the typo of August string.
Files are modified or added to support HTTP Proxy:
nx_api.h
nx_http_proxy_client.h
nx_http_proxy_client.c
nx_tcp_socket_block_cleanup.c
nx_tcp_socket_packet_process.c
nx_tcp_socket_state_data_check.c
nx_tcp_socket_state_established.c
nx_tcp_socket_state_syn_sent.c
nx_tcp_socket_state_wait.c
nxd_tcp_client_socket_connect.c
Files are modified to fix handling of multiple handshake messages:
nx_secure_tls_1_3_server_handshake.c
nx_secure_tls_server_handshake.c
Files are modified to fix TLS 1.3 version negotiation with no extensions in hello message:
nx_secure_tls_process_clienthello.c
nx_secure_tls_process_serverhello.c
Files are modified to fix compilation error:
nx_secure_tls_send_clienthello_extensions.c
nx_secure_tls_session_sni_extension_set.c
Files are modified to fix renegotiation when receiving in non-blocking mode:
nx_secure_tls.h
nx_secure_tls_session_receive.c
nx_secure_tls_session_renegotiate.c
nx_secure_tls_session_reset.c
Files are modified or added to support custom key generation:
nx_secure_tls.h
nx_secure_generate_client_key_exchange.c
nx_secure_generate_master_secret.c
nx_secure_generate_premaster_secret.c
nx_secure_generate_server_key_exchange.c
nx_secure_generate_session_keys.c
nx_secure_process_client_key_exchange.c
nx_secure_process_server_key_exchange.c
nx_secure_remote_certificate_verify.c
nx_secure_session_keys_set.c
nx_secure_tls_1_3_crypto_init.c
nx_secure_tls_ecc_generate_keys.c
nx_secure_tls_find_curve_method.c
nx_secure_tls_generate_keys.c
nx_secure_tls_generate_premaster_secret.c
nx_secure_tls_hash_record.c
nx_secure_tls_process_certificate_verify.c
nx_secure_tls_process_client_key_exchange.c
nx_secure_tls_process_clienthello_extensions.c
nx_secure_tls_process_server_key_exchange.c
nx_secure_tls_process_serverhello_extensions.c
nx_secure_tls_psk_add.c
nx_secure_tls_remote_certificate_verify.c
nx_secure_tls_send_certificate_verify.c
nx_secure_tls_send_client_key_exchange.c
nx_secure_tls_send_server_key_exchange.c
nx_secure_tls_session_create_ext.c
nx_secure_tls_session_keys_set.c
nx_secure_tls_trusted_certificate_add.c
nx_secure_tls_verify_mac.c
nx_secure_trusted_certificate_add.c
nx_secure_verify_mac.c
Files are modified or added to add an API that sets a custom packet pool for TLS session:
nx_secure_tls.h
nx_secure_tls_api.h
nx_secure_tls_session_packet_pool_set.c
nx_secure_tls_session_start.c
nxe_secure_tls_session_packet_pool_set.c
File is modified to add macro of EC curve types:
nx_crypto_const.h
Other modified file:
nx_crypto_generic_ciphersuites.c Modified comments.
nx_crypto_aes.c Fixed compiler warnings.